Operating Systems Final Review - Farris

Similar documents
Chapter 8 Operating Systems and Utility Programs

Operating System Installation Guidelines

Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright Lismore Software Systems, Ltd. All rights reserved.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Lab - Dual Boot - Vista & Windows XP

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems

Fall Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS

Chapter 5: Fundamental Operating Systems

Windows XP/Vista/7 Directory Structures

CentreWare Internet Services Setup and User Guide. Version 2.0

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Installing the Microsoft Network Driver Interface

Getting Started with VMware Fusion. VMware Fusion for Mac OS X

TOSHIBA GA Printing from Windows

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

VMware Horizon FLEX User Guide

Product Description. Licenses Notice. Introduction TC-200

User Guide for Windows 10

VERITAS Backup Exec TM 10.0 for Windows Servers

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

Getting Started with VMware Fusion

Installing Windows XP Professional

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Windows XP Pro: Basics 1

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU Key Features

Fiery EX4112/4127. Printing from Windows

Red Hat Linux 7.2 Installation Guide

Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Brother Automatic Printing OPERATION MANUAL

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Easy Setup Guide for the Sony Network Camera

Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13

Parallels Transporter Agent

Installing GFI FAXmaker

User s Manual. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved.

Windows 2003 Server Installation Guide

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Instrument Software Update Instructions. Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Upgrading an older version to A.12.

C. Implementing, Managing and Troubleshooting Hardware Devices and Drivers

OFFICE KEYBOARD (MT1210 & MT1405) OFFICE FEATURES

Freshservice Discovery Probe User Guide

Course: WIN310. Student Lab Setup Guide. Summer Microsoft Windows Server 2003 Network Infrastructure (70-291)

Chapter 15: Advanced Networks

Understanding the Boot Process and Command Line Chapter #3

Operating Instructions

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

Operating Systems. and Windows

Windows 2000 Security Configuration Guide

Networking Best Practices Guide. Version 6.5

MFC7840W Windows Network Connection Repair Instructions

Server & Workstation Installation of Client Profiles for Windows

How To Install And Configure Windows Server 2003 On A Student Computer

Installation and Configuration Guide

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

NSi Mobile Installation Guide. Version 6.2

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

Windows Sever 2008: 32Bit For ADC Device Server and File Server Implementations Release: 9-February-2012 Rebrand: 30-April-2014

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command Document Revision History... 10

Guest Operating System. Installation Guide

Driver Upgrade Instructions

PREFACE iss.01 -

Network Printing In Windows 95/98/ME

Installation Guide - Client. Rev 1.5.0

technical brief Multiple Print Queues

Hypercom Key Loading and Management (HKLM) RS232 PPP Key Injection PC Setup Guide

3.5 EXTERNAL NETWORK HDD. User s Manual

PaperClip32. Installation Guide. for Workgroup and Enterprise Editions. Document Revision 2.1 1

OPERATING SYSTEMS Software in the Background. Chapter 2

Non-ThinManager Components

System Area Manager. Remote Management

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

Operating System Installation Guide

ilaw Installation Procedure

Installing a Second Operating System

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

Getting Started with Vision 6

Diamond II v2.3 Service Pack 4 Installation Manual

Installing the Operating System or Hypervisor

Lecture 6: Operating Systems and Utility Programs

A+ Practical Applications Solution Key

NetWrix Password Manager. Quick Start Guide

Preparing the Computers for TCP/IP Networking

Appendix B Lab Setup Guide

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

HL2170W Windows Network Connection Repair Instructions

Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature

VMware Horizon FLEX User Guide

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Universal Management Service 2015

LPR for Windows 95/98/Me/2000/XP TCP/IP Printing User s Guide. Rev. 03 (November, 2001)

Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations

IT Essentials v4.1 LI Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI Windows OS directory structures

Introduction 1-1 Installing FAS 500 Asset Accounting the First Time 2-1 Installing FAS 500 Asset Accounting: Upgrading from a Prior Version 3-1

Configure thin client settings locally

How to Remotely View Security Cameras Using the Internet

Advanced Diploma In Hardware, Networking & Server Configuration

Configuring NXT Hardware with Mercury Inside into Doors.NET TM Application Note

BIGPOND ONLINE STORAGE USER GUIDE Issue August 2005

Transcription:

1. The is the software layer, sometimes called the shell, through which the user communicates with the OS, which, in turn, communicates with the computer. 2. A user interface that takes advantage of a computer s graphics capabilities to make it easier to use is a. 3. The operating system function that controls the order and time in which programs are run is known as. An example would be a print program that manages and prioritizes multiple print jobs. 4. The central circuit board of a computer is the. All other devices are connected to it in one way or another. 5. Software that enhances a basic operating system by adding networking features that allow you to connect to a network is called a. 6. is a very broad term most often used to refer to nonessential add-on computer devices such as digital cameras, printers, scanners, pointing devices, external modems, and disk drives. 7. A is a microcomputer that complies with the Microsoft / Intel set of standards. 8. means that the source code of a computer program is made available free of charge to the general public. 9. are often also called directories. 10. A graphical pointer that can be moved around a GUI by manipulating a pointing device is a. 11. A is a method of starting up a computer by turning on the power switch. 12. A is a portion of a physical hard drive that appears to be a drive with a letter assigned to it. 13. A text-mode screen showing, at minimum, the current drive letter followed by a blinking cursor, indicating that the command interpreter is ready for input is the. 14. The is the top-level directory on a logical drive. 15. is the mode in which an Intel processor starts up when the computer is turned on. It is very limited, offers the operating system just a small amount of memory to work with, and does not allow for multitasking, protection of the hardware from other software, or support for virtual machines. 1-1

16. A is an area of a physical hard disk that defines space that will be used for logical drives. 17. The is a small ROM-BIOS program that searches for a boot sector on disk. Once it finds one, it loads it into memory. The boot sector program then looks on the disk from which it was loaded for system files, which it will, in turn, load into memory. 18. The inability to run more than one task at a time is called. 19. A command program stored on disk instead of within DOS is an. 20. Restarting a computer without a power-down and power-up cycle, using CTRL-ALT-DELETE or a reset button is called a. 21. Microsoft released Windows NT Workstation 4.0 in. 22. An important feature of the NTFS file system is the ability to make the local files more secure by assigning such as Read Only, Full Control or No Access. 23. The floppy disk the user is prompted to create during installation for use when catastrophic problems occur is the. 24. Service packs are collections of multiple updates and which are software fixes to problems with software 25. If you install Windows NT Workstation 4.0 as a/an to an older version of Windows, you risk inheriting the problems of the older installation. 26. When performing a/an installation, you must be prepared to interact with the setup program and provide answers to its questions in order for the installation to proceed. 27. A/an is a special file created by the Virtual Memory Manager. 28. Unlike previous Microsoft operating systems, Windows NT will allow you to create up to four on a single hard disk. 29. A/an can have multiple logical drive letters. 30. A print job that fails to complete and cannot be deleted from the print queue may be the result of a stalled. 31. The is a code printed on the package of an installation disk that must be entered into the system during installation to enable the software to be installed on the computer. 1-2

32. A feature that enables Windows to automatically find and run the program needed to open and run a CD or other application is called. 33. A type of protection for files, folders, and other objects. define what a user or group can with an object. 34. When a problem occurs, all symptoms and error messages. 35. One way to test whether Windows 2000 is compatible with your hardware and software is to run the compatibility test that comes with Windows 2000, called the. 36. The make a Windows 2000 computer easier to use for someone with restricted vision, hearing loss, or mobility difficulties. 37. When a Windows 2000 Professional computer is a member of a Windows NT or Active Directory domain, local security components can send a local user's authentication request to a domain controller, in using a feature called. 38. By setting a in Disk Management, an entire volume can be mounted as a folder on another volume (which must be NTFS). 39. Windows 95, Windows 98, Windows NT Workstation 3.51, and can be upgraded to Windows 2000 Professional. 40. One method of automating the Windows 2000 installation is to create which are called up using special switches with the WINNT or WINNT32 programs. 41. Windows XP must be within 30 days of installation. 42. is an optional process that involves the sending of identifying information to Microsoft. 43. Windows XP runs applications approximately 25% faster than Windows 98 due, in part, to a process called. 44. will connect to the Microsoft site and, depending on its settings, will download and install updates without user intervention. 45. By default, the only icon on the Windows XP desktop is the. 46. Through the Startup and Recovery settings, a Windows XP system can be configured to create a containing all or part of the contents of memory at the time of a stop error. 47. If certain hardware is replaced or upgraded, or if Windows XP is installed on another computer using the same CD, may be required. 1-3

48. The is a searchable list of hardware and software known to work with Windows. 49. You are allowed to install Windows XP on one computer for each that you own. 50. Use the administrative tool to create partitions, format logical drives, and change drive letters. 51. In Windows 98, Windows NT, and Windows 2000 you should click to allow Windows to properly finish its operations before using the on/off switch. 52. Although you can launch programs from the command prompt you should not use it to. Instead use My Computer or Windows Explorer. 53. If a dialog box disappears while you are trying to change fields, you probably pressed the by mistake. Use tab or click with the mouse instead to move between fields. 54. The two primary input devices in Windows are the and the keyboard. 55. In Windows XP the function has been expanded to allow searching for almost anything over the Internet. 56. Apple and Microsoft both borrowed ideas for their operating system interfaces from the. 57. When you open My Computer in view it takes a double-click of the mouse to open objects. 58. In the broadest sense, there are two types of files: and. Users should only manage the latter. 59. The taskbar can be and resized in all versions of Windows but in Windows XP it must first be unlocked. 60. Windows Explorer displays two panes. The left pane is the folders pane and the right pane is the pane. 61. permission allows a user to pause and restart the printer, change spooler settings, share the printer, assign printer permissions, and change printer properties. 62. My Documents, My Pictures, and My Computer are all examples of. 63. The term "brute force" is used to describe one category of. 1-4

64. While browsing the Internet, the student answered survey questions that appeared in a pop-up window and inadvertently became the recipient of a. 65. Harry's personal digital assistant became the target of, which resulted in a stranger acquiring Harry's address book. 66. If your computer connects directly to the Internet, it is important for you to turn on and configure a. 67. The Windows XP Internet Connection Firewall was replaced by the in Service Pack 2. 68., added to Windows XP by Service Pack 2, manages security settings for Firewall, Automatic Updates, and Virus Protections. 69. On a home PC, the applet should be sufficient for managing security accounts. 70. Log on locally is an example of a. 71. The file, found in the CONFIG folder with the registry hives is not a registry hive, but a file that plays a role when Windows XP has been upgraded from an earlier version. 72. Each user's personal folders contain the file, which contains the user profile settings for that user. 73. When a device driver is available without a companion installation program, simply use the Wizard, and provide the location of the driver when prompted. 74. When viewing a device in Device Manager, a red X indicates that the device is. 75. displays performance information in real time, while Performance Logs will generate log files that can be viewed after-the-fact. 76. As a general rule, the in the System Properties dialog box should not be manually changed. 77. The driver is a file system driver required for Windows to read DVD ROMs and to read and write DVD-R and DVD-RW. 78. During startup, NTLDR finds the location of the system files by reading the file. 1-5

79. Windows finds instructions to run programs during startup by looking at certain locations in the. 80. A startup disk for Windows XP only contains the files. 81. A/an is a network device to which media from each node connects. 82. A/an is a computer that plays one or more of several important roles in a network, providing one or more services to other computers. 83. An online discussion group that stores discussion messages on a server, allowing users to view the messages online and participate anytime, is a/an. 84. A/An is a listing of information about a user or group used for authentication and/or assigning permissions. 85. A/An is two or more networks connected over long distances. 86. A/an is a network service that can manage all types of network resources. 87. A/An is a private internal network using Internet technologies, such as web servers. 88. UNIX and OSs are available as enhanced products through vendors and also in open-source code. 89. Microsoft and are long-term competitors in the server OS market. 90. A Domain Local group is local to an entire Active Directory domain, while in a Windows NT domain, the Local groups were local to the. 91. Luis, suspecting that he had a connection problem used the IPCONFIG command and discovered that his IP address started with "169" in the first octet, an address in the range of addresses used for. 92. When configuring a Windows computer to connect to a Novell server, one choice an administrator must make is which to use, Microsoft's or Novell's. 93. A/an allows users to access it without requiring that they supply a user name and password. 94. A/an client receives its IP address over the network from a special server. 95. Working from home, Bryan determined that the connection to the school web site was too slow, so he ran the command to see if he could find where the bottleneck might be. 1-6

96. Roland was able to connect to servers on the LAN, but discovered that an incorrect address was preventing him from communicating beyond his local network. 97. "Mcgraw-hill.com" is a name in the. 98. A quick way to test the communications between your desktop computer and another computer is to use the command. 99. On a TCP/IP network, a server will most likely have a IP address. 100. The feature allows connections to shared printers using a URL. 1-7

Answers 1. The user interface is the software layer, sometimes called the shell, through which the user communicates with the OS, which, in turn, communicates with the computer. 2. A user interface that takes advantage of a computer s graphics capabilities to make it easier to use is a graphical user interface (GUI). 3. The operating system function that controls the order and time in which programs are run is known as job management. An example would be a print program that manages and prioritizes multiple print jobs. 4. The central circuit board of a computer is the motherboard. All other devices are connected to it in one way or another. 5. Software that enhances a basic operating system by adding networking features that allow you to connect to a network is called a network operating system (NOS). 6. Peripheral device is a very broad term most often used to refer to nonessential add-on computer devices such as digital cameras, printers, scanners, pointing devices, and external modems and disk drives. 7. A personal computer (PC) is a microcomputer that complies with the Microsoft / Intel set of standards. 8. Open source means that the source code of a computer program is made available free of charge to the general public. 9. Folders are often also called directories. 10. A graphical pointer that can be moved around a GUI by manipulating a pointing device is a cursor. 11. A cold boot is a method of starting up a computer by turning on the power switch. 12. A logical drive is a portion of a physical hard drive that appears to be a drive with a letter assigned to it. 13. A text-mode screen showing, at minimum, the current drive letter followed by a blinking cursor, indicating that the command interpreter is ready for input is the DOS prompt. 14. The root directory is the top-level directory on a logical drive. 1-8

15. Real mode is the mode in which an Intel processor starts up when the computer is turned on. It is very limited, offers the operating system just a small amount of memory to work with, and does not allow for multitasking, protection of the hardware from other software, or support for virtual machines. 16. A partition is an area of a physical hard disk that defines space that will be used for logical drives. 17. The bootstrap loader is a small ROM-BIOS program that searches for a boot sector on disk. Once it finds one, it loads it into memory. The boot sector program then looks on the disk from which it was loaded for system files, which it will, in turn, load into memory. 18. The inability to run more than one task at a time is called single-tasking. 19. A command program stored on disk instead of within DOS is an external command. 20. Restarting a computer without a power-down and power-up cycle, using CTRL-ALT-DELETE or a reset button is called a warm boot. 21. Microsoft released Windows NT Workstation 4.0 in 1996. 22. An important feature of the NTFS file system is the ability to make the local files more secure by assigning permissions such as Read Only, Full Control or No Access. 23. The floppy disk the user is prompted to create during installation for use when catastrophic problems occur is the emergency repair disk (ERD). 24. Service packs are collections of multiple updates and patches which are software fixes to problems with software. 25. If you install Windows NT Workstation 4.0 as an upgrade to an older version of Windows, you risk inheriting the problems of the older installation. 26. When performing a manual installation, you must be prepared to interact with the setup program and provide answers to its questions in order for the installation to proceed. 27. A swap file is a special file created by the Virtual Memory Manager. 28. Unlike previous Microsoft operating systems, Windows NT will allow you to create up to four partitions on a single hard disk. 29. An extended partition can have multiple logical drive letters. 30. A print job that fails to complete and cannot be deleted from the print queue may be the result of a stalled print spooler. 1-9

31. The CD key is a code printed on the package of an installation disk that must be entered into the system during installation to enable the software to be installed on the computer. 32. A feature that enables Windows to automatically find and run the program needed to open and run a CD or other application is called autorun. 33. A type of protection for files, folders, and other objects. Permissions define what a user or group can with an object. 34. When a problem occurs, observe and record all symptoms and error messages. 35. One way to test whether Windows 2000 is compatible with your hardware and software is to run the compatibility test that comes with Windows 2000, called the Readiness Analyzer. 36. The Accessibility Options make a Windows 2000 computer easier to use for someone with restricted vision, hearing loss, or mobility difficulties. 37. When a Windows 2000 Professional computer is a member of a Windows NT or Active Directory domain, local security components can send a local user's authentication request to a domain controller, in using a feature called passthrough authentication. 38. By setting a drive path in Disk Management, an entire volume can be mounted as a folder on another volume (which must be NTFS). 39. Windows 95, Windows 98, Windows NT Workstation 3.51, and Windows NT Workstation 4.0 can be upgraded to Windows 2000 Professional. 40. One method of automating the Windows 2000 installation is to create scripts which are called up using special switches with the WINNT or WINNT32 programs. 41. Windows XP must be activated within 30 days of installation. 42. Registration is an optional process that involves the sending of identifying information to Microsoft. 43. Windows XP runs applications approximately 25% faster than Windows 98 due, in part, to a process called prefetching. 44. Automatic Update will connect to the Microsoft site, and, depending on its settings, will download and install updates without user intervention. 45. By default, the only icon on the Windows XP desktop is the Recycle Bin. 46. Through the Startup and Recovery settings, Windows XP can be configured to create a dump file containing all or part of the contents of memory at the time of a stop error. 1-10

47. If certain hardware is replaced or upgraded, or if Windows XP is installed on another computer using the same CD, reactivation may be required. 48. The Windows Catalog is a searchable list of hardware and software known to work with Windows. 49. You are allowed to install Windows XP on one computer for each license that you own. 50. Use the Disk Management administrative tool to create partitions, format logical drives, and change drive letters. 51. In Windows 98, Windows NT, and Windows 2000 you should click Start Shut Down to allow Windows to properly finish its operations before using the on/off switch. 52. Although you can launch programs from the command prompt you should not use it to manage files. Instead use My Computer or Windows Explorer. 53. If a dialog box disappears while you are trying to change fields, you probably pressed the enter key by mistake. Use tab or click with the mouse instead to move between fields. 54. The two primary input devices in Windows are the mouse and the keyboard 55. In Windows XP the Find/Search function has been expanded to allow searching for almost anything over the Internet. 56. Apple and Microsoft both borrowed ideas for their operating system interfaces from the Palo Alto Research Center (PARC). 57. When you open My Computer in folder view it takes a double-click of the mouse to open objects. 58. In the broadest sense, there are two types of files: program files and data files. Users should only manage the latter. 59. The taskbar can be positioned and resized in all versions of Windows but in Windows XP it must first be unlocked. 60. Windows Explorer displays two panes. The left pane is the folders pane and the right pane is the contents pane. 61. Manage Printer permission allows a user to pause and restart the printer, change spooler settings, share the printer, assign printer permissions, and change printer properties. 62. My Documents, My Pictures, and My Computer are all examples of personal folders. 63. The term "brute force" is used to describe one category of password cracker. 64. While browsing the Internet, the student answered survey questions that appeared in a pop-up window and inadvertently became the recipient of a pop-up download. 1-11

65. Harry's personal digital assistant became the target of Bluesnarfing, which resulted in a stranger acquiring Harry's address book. 66. If your computer connects directly to the Internet, it is important for you to turn on and configure a personal firewall. 67. The Windows XP Internet Connection Firewall was replaced by the Windows Firewall in Service Pack 2. 68. Windows Security Center, added to Windows XP by Service Pack 2, manages security settings for Firewall, Automatic Updates, and Virus Protections. 69. On a home PC, the User Accounts applet should be sufficient for managing security accounts. 70. Log on locally is an example of a user right. 71. The file USERDIFF found in the CONFIG folder with the registry hives is not a registry hive, but a file that plays a role when Windows XP has been upgraded from an earlier version. 72. Each user's personal folders contain the file NTUSER.DAT which contains the user profile settings for that user. 73. When a device driver is available without a companion installation program, simply use the Add Hardware Wizard, and provide the location of the driver when prompted. 74. When viewing a device in Device Manager, a red X indicates that the device is disabled. 75. System Monitor displays performance information in real time, while Performance Logs will generate log files that can be viewed after-the-fact. 76. As a rule, the Windows Performance Settings in the System Properties dialog box should not be manually changed. 77. The universal disk format (UDF) driver is a file system driver required for Windows to read DVD ROMs and to read and write DVD-R and DVD-RW. 78. During startup, NTLDR finds the location of the system files by reading the BOOT.INI file. 79. Windows finds instructions to run programs during startup by looking at certain locations in the registry. 80. A startup disk for Windows XP only contains the boot files. 81. A hub is a network device to which media from each node connects 82. A server is a computer that plays one or more of several important roles in a network, providing one or more services to other computers. 1-12

83. An online discussion group that stores discussion messages on a server, allowing users to view the messages online and participate anytime, is a list server. 84. A/An account is a listing of information about a user or group used for authentication and/or assigning permissions. 85. A/An WAN is two or more networks connected over long distances. 86. A directory service is a network service that can manage all types of network resources. 87. A/An intranet is a private internal network using Internet technologies, such as web servers. 88. UNIX and Linux OSs are available as enhanced products through vendors and also in open-source code. 89. Microsoft and Novell are long-term competitors in the server OS market. 90. A Domain Local group is local to an entire Active Directory domain, while in a Windows NT domain, the Local groups were local to the domain controllers. 91. Luis, suspecting that he had a connection problem used the IPCONFIG command and discovered that his IP address started with "169" in the first octet, an address in the range of addresses used for Automatic Private IP Addressing (APIPA). 92. When configuring a Windows computer to connect to a Novell server, one choice an administrator must make is which Novell Client to use, Microsoft's or Novell's. 93. An anonymous FTP site allows users to access it without requiring that they supply a user name and password. 94. A DHCP client receives its IP address over the network from a special server. 95. Working from home, Bryan determined that the connection to the school web site was too slow, so he ran the TRACERT command to see if he could find where the bottleneck might be. 96. Roland was able to connect to servers on the LAN, but discovered that an incorrect default gateway address was preventing him from communicating beyond his local network. 97. "Mcgraw-hill.com" is a name in the Domain Name System (DNS). 98. A quick way to test the communications between your desktop computer and another computer is to use the PING command. 99. On a TCP/IP network, a server will most likely have a static IP address. 100. The Internet Protocol Printing (IPP) feature allows connections to shared printers using a URL. 1-13