CompTIA A+ Exam  >  CompTIA A+ Notes  >   Core 2  >  Windows Operating System

Windows Operating System

Overview

This chapter covers Microsoft Windows operating systems tested on the CompTIA A+ Core 2 exam, including Windows 10 and Windows 11 editions, features, system requirements, installation methods, and core administrative tools. You'll learn how to navigate Windows interfaces, configure system settings, manage user accounts, and use built-in utilities for system maintenance and troubleshooting. Mastering Windows OS fundamentals is essential because most exam scenarios involve Windows-based environments.

Core Concepts

Windows Editions and Features

Windows comes in different editions, each designed for specific use cases. Windows 10 Home is the basic consumer edition with core features. Windows 10 Pro adds business features like domain joining, BitLocker encryption, Group Policy management, and Remote Desktop Protocol (RDP) host capabilities. Windows 10 Pro for Workstations supports high-end hardware and ReFS file system. Windows 10 Enterprise includes advanced security and management features for large organizations, available only through volume licensing. Windows 11 follows similar edition structures but requires TPM 2.0, UEFI firmware, and Secure Boot.

Key feature differences by edition:

  • BitLocker - full disk encryption available in Pro, Enterprise, and Education editions only
  • Domain Join - Pro and above can join Active Directory domains
  • Group Policy Editor (gpedit.msc) - available in Pro and Enterprise, not in Home
  • Remote Desktop - Home can only connect as a client; Pro and above can host RDP sessions
  • Hyper-V - virtualization platform in Pro and Enterprise editions
  • Windows Sandbox - isolated desktop environment in Pro and Enterprise (Windows 10 version 1903 and later)

System Requirements

Windows 10 minimum requirements include a 1 GHz processor, 1 GB RAM for 32-bit or 2 GB for 64-bit, 16 GB storage for 32-bit or 32 GB for 64-bit, and DirectX 9 graphics. Windows 11 requires a compatible 64-bit processor (1 GHz with 2+ cores), 4 GB RAM, 64 GB storage, UEFI firmware with Secure Boot capability, TPM version 2.0, and a DirectX 12 compatible graphics card. The TPM 2.0 requirement is a major change from Windows 10.

Windows User Interface Components

The Desktop displays icons, taskbar, and system tray. The Start Menu provides access to programs, settings, and power options. The Taskbar shows running applications and pinned programs. The Action Center (Windows 10) or Notification Center displays system notifications and quick settings. File Explorer manages files and folders with navigation pane, ribbon interface, and quick access. Task View enables virtual desktop management and timeline viewing. Settings app replaced many Control Panel functions for modern system configuration.

Administrative Tools

Computer Management (compmgmt.msc) consolidates system tools, storage, services, and applications into one console. It includes Task Scheduler, Event Viewer, Shared Folders, Local Users and Groups, Performance Monitor, Device Manager, and Disk Management.

Task Manager (Ctrl+Shift+Esc or taskmgr.exe) shows running processes, performance metrics, startup programs, and services. The Processes tab displays active applications and background processes with CPU, memory, disk, and network usage. The Performance tab graphs real-time system resource utilization. The Startup tab manages programs that launch at boot. The Services tab shows Windows services status.

Event Viewer (eventvwr.msc) logs system events in categories: Application (program events), Security (audit events), Setup (installation events), and System (Windows component events). Events have severity levels: Information, Warning, Error, and Critical. Use Custom Views to filter specific event types.

Services (services.msc) manages Windows background processes. Service startup types include Automatic (starts at boot), Automatic (Delayed Start) (starts after boot completes), Manual (starts when needed), and Disabled (cannot start). Service states are Running, Stopped, or Paused. Critical services like Windows Update, Print Spooler, and DHCP Client require specific startup configurations.

Device Manager (devmgmt.msc) manages hardware devices and drivers. Yellow exclamation marks indicate device problems. Red X marks show disabled devices. Unknown devices appear when drivers are missing. You can update, roll back, disable, or uninstall drivers. Scan for hardware changes detects newly connected devices.

Disk Management (diskmgmt.msc) configures storage devices, creates partitions, formats volumes, assigns drive letters, and manages dynamic disks. You can shrink, extend, or delete volumes. Disk types include Basic (standard partitions) and Dynamic (supports software RAID).

Registry Editor (regedit.exe) accesses the Windows registry database. Five root keys: HKEY_LOCAL_MACHINE (HKLM) stores computer-wide settings, HKEY_CURRENT_USER (HKCU) stores current user settings, HKEY_USERS contains all user profiles, HKEY_CLASSES_ROOT holds file associations, and HKEY_CURRENT_CONFIG stores hardware profile data. Always backup registry before modifications.

Group Policy Editor (gpedit.msc) configures security and system policies. Only available in Pro and Enterprise editions. Policies apply to Computer Configuration (affects all users) or User Configuration (affects specific users). Common policy locations include Windows Settings, Administrative Templates, and Security Settings.

System Configuration Tools

System Configuration (msconfig.exe) manages startup options and boot settings. The General tab selects startup type: Normal, Diagnostic (minimal drivers), or Selective. The Boot tab configures boot options like Safe Mode, No GUI boot, and Boot log. The Services tab enables/disables services, with "Hide all Microsoft services" option. The Startup tab redirects to Task Manager in Windows 10/11. The Tools tab provides quick access to administrative utilities.

System Information (msinfo32.exe) displays detailed hardware, software, and system component information. Shows OS version, processor, BIOS version, RAM, and loaded drivers. Use for hardware inventory and troubleshooting compatibility issues.

Resource Monitor (resmon.exe) provides detailed real-time monitoring of CPU, memory, disk, and network resource usage by processes. More granular than Task Manager for identifying resource bottlenecks.

Performance Monitor (perfmon.msc) collects performance data using counters. Create Data Collector Sets to log performance metrics over time. Use for baseline establishment and long-term performance analysis.

Windows File Systems

FAT32 has maximum file size of 4 GB and maximum partition size of 32 GB (Windows formatting limit). Compatible with most operating systems but lacks security features and journaling.

NTFS is the primary Windows file system supporting encryption (EFS), compression, disk quotas, file permissions, and large files/partitions. Includes journaling for crash recovery. Required for system drives and BitLocker encryption.

exFAT designed for flash drives and external storage. Supports large files (no 4 GB limit) with better compatibility than NTFS for non-Windows devices. No journaling or built-in security features.

ReFS (Resilient File System) available in Pro for Workstations and Enterprise. Designed for fault tolerance, large volumes, and data integrity. Not bootable in most configurations.

File and Folder Permissions

NTFS permissions control access to files and folders. Full Control allows all actions including permission changes. Modify permits read, write, delete, and execute. Read & Execute allows viewing and running files. Read permits viewing only. Write allows creating files and folders. Permissions are Allow or Deny, with Deny overriding Allow. Permissions accumulate from group memberships, except when Deny is present.

Inheritance flows permissions from parent folders to child objects. You can disable inheritance or convert inherited permissions to explicit permissions. Effective permissions show the actual access a user has after combining all group memberships and inheritance.

Share permissions apply only over the network. They include Full Control, Change, and Read. When combining NTFS and share permissions, the most restrictive permission applies.

User Account Control (UAC)

UAC prevents unauthorized changes by prompting for approval when administrative tasks occur. Standard users see a credential prompt requiring administrator password. Administrators see a consent prompt requiring confirmation. UAC levels range from Always Notify to Never Notify (not recommended). Disable UAC only in isolated lab environments, never in production.

Windows Update Settings

Windows Update downloads and installs operating system patches, driver updates, and security fixes. Quality updates include security patches and bug fixes, released monthly on Patch Tuesday (second Tuesday). Feature updates add new capabilities, released semi-annually for Windows 10 and annually for Windows 11. Update channels include General Availability Channel (standard release) and Long-Term Servicing Channel (LTSC, Enterprise only, minimal feature updates).

Configure update settings through Settings > Update & Security > Windows Update. Options include active hours, pause updates (up to 35 days), and defer feature updates. Windows Update for Business provides additional controls in Pro and Enterprise editions through Group Policy.

Windows Activation and Licensing

Windows activation verifies genuine software installation. Retail licenses transfer between computers. OEM licenses tie to original hardware and don't transfer. Volume licenses use Key Management Service (KMS) or Multiple Activation Key (MAK) for enterprise deployments. Check activation status in Settings > Update & Security > Activation or run slmgr.vbs /xpr from elevated command prompt.

Control Panel vs Settings App

Windows 10/11 transition many Control Panel functions to the Settings app. Control Panel still contains advanced configurations like Device Manager, Programs and Features, and System Properties. Settings app handles most user-facing configurations: displays, personalization, accounts, network, and updates. Some functions appear in both interfaces. For exam purposes, know both access methods.

Windows Installation Methods

Clean installation erases existing data and installs fresh OS. Requires bootable media (USB or DVD). Use when replacing OS or removing persistent malware.

Upgrade installation preserves files, settings, and applications while updating Windows version. Requires compatible edition upgrade path (e.g., Home to Pro, Windows 10 to Windows 11).

In-place upgrade repairs Windows installation while keeping personal files and applications. Use when system files are corrupted but data needs preservation.

Network installation deploys Windows over network using Windows Deployment Services (WDS) or Microsoft Deployment Toolkit (MDT). Requires PXE boot support.

Image deployment uses pre-configured system images (.wim files) deployed via tools like DISM (Deployment Image Servicing and Management). Common in enterprise environments.

Unattended installation automates setup using answer files (unattend.xml). Eliminates manual configuration during deployment.

Boot Methods and Options

Safe Mode loads minimal drivers and services for troubleshooting. Access by holding Shift while clicking Restart, then Troubleshoot > Advanced options > Startup Settings. Three Safe Mode variants: Safe Mode (basic), Safe Mode with Networking (includes network drivers), and Safe Mode with Command Prompt (text interface only).

Windows Recovery Environment (WinRE) provides troubleshooting tools when Windows won't boot. Includes System Restore, System Image Recovery, Startup Repair, Command Prompt, and UEFI Firmware Settings. Access by interrupting boot three times, using bootable media, or Settings > Update & Security > Recovery > Restart now.

Advanced Boot Options accessed through Startup Settings in WinRE. Options include Enable Boot Logging (creates ntbtlog.txt), Enable low-resolution video, Last Known Good Configuration (older Windows versions), Disable driver signature enforcement, and Disable automatic restart on system failure.

Windows Command-Line Tools

cmd.exe opens Command Prompt. powershell.exe launches PowerShell with advanced scripting capabilities. Run with administrative privileges when needed (right-click > Run as administrator).

Essential commands for Core 2 exam:

  • ipconfig - displays IP configuration; ipconfig /all shows detailed info; ipconfig /release and ipconfig /renew manage DHCP leases; ipconfig /flushdns clears DNS cache
  • ping - tests network connectivity; ping -t pings continuously; ping 127.0.0.1 tests TCP/IP stack
  • tracert - traces route to destination showing each hop
  • netstat - displays network connections; netstat -a shows all connections; netstat -b shows executable creating connection
  • nslookup - queries DNS records
  • net user - manages local user accounts; net user username password /add creates user; net user username /delete removes user
  • net use - maps network drives; net use Z: \\server\share maps drive; net use Z: /delete removes mapping
  • gpupdate - refreshes Group Policy; gpupdate /force reapplies all policies
  • gpresult - displays applied Group Policy; gpresult /r shows summary; gpresult /h report.html generates HTML report
  • sfc - System File Checker; sfc /scannow scans and repairs system files (requires admin)
  • chkdsk - checks disk for errors; chkdsk /f fixes errors; chkdsk /r locates bad sectors and recovers data
  • diskpart - disk partitioning utility; use list disk, select disk, clean, create partition primary, format, assign
  • tasklist - displays running processes; taskkill terminates processes; taskkill /IM processname.exe /F force kills process
  • shutdown - powers off or restarts; shutdown /s /t 0 shuts down immediately; shutdown /r /t 0 restarts immediately; shutdown /a aborts shutdown
  • xcopy - copies files and directories; xcopy /s includes subdirectories; xcopy /e includes empty directories
  • robocopy - robust file copy; robocopy source destination /mir mirrors directories
  • format - formats drives; format D: /fs:NTFS /q quick formats drive as NTFS
  • dism - services Windows images; DISM /Online /Cleanup-Image /RestoreHealth repairs Windows image (run before sfc)
  • winver - displays Windows version information

Windows Networking Features

Workgroup is a peer-to-peer network where each computer manages its own security. Default workgroup name is WORKGROUP. Suitable for small networks (fewer than 10 computers).

Domain is centralized network managed by Active Directory Domain Services. Requires Windows Server. Provides centralized authentication, Group Policy management, and resource sharing. Computers must join domain using Pro or Enterprise editions.

HomeGroup simplified home network sharing in Windows 7-10 (removed in Windows 10 version 1803). Use standard file sharing instead.

Network Discovery allows computer to find other network devices. File and Printer Sharing enables sharing resources. Configure through Network and Sharing Center or Settings > Network & Internet > Sharing options.

Network profiles include Public (restrictive security), Private (trusted network, enables discovery and sharing), and Domain (managed by domain policies). Choose appropriate profile based on network trust level.

Local Security Policy

Configure security settings through secpol.msc (Pro and Enterprise editions). Key policy areas include:

  • Account Policies - password requirements, account lockout thresholds
  • Local Policies - audit policies, user rights assignments, security options
  • Windows Firewall with Advanced Security - inbound/outbound rules
  • Software Restriction Policies - control which applications can run
  • Application Control Policies - AppLocker rules (Enterprise only)

Common password policy settings: minimum password length, password complexity requirements, maximum password age, minimum password age, and password history enforcement.

Windows Defender and Security Features

Windows Defender Antivirus provides real-time malware protection. Configure through Windows Security app. Features include real-time protection, cloud-delivered protection, automatic sample submission, and controlled folder access (ransomware protection).

Windows Defender Firewall filters inbound and outbound traffic. Configure per network profile (Domain, Private, Public). Create rules to allow/block specific programs or ports.

Windows Security (formerly Windows Defender Security Center) centralizes security management: virus protection, firewall status, device security, app/browser control, and device performance.

Troubleshooting

1. Symptom: User receives "Windows is not activated" watermark in bottom-right corner of desktop, and personalization features are disabled.
Likely Cause: Windows activation failed or expired, often due to hardware changes, invalid product key, or KMS server connectivity issues in enterprise environments.
Fix: Open Settings > Update & Security > Activation and verify activation status; if using retail key, click "Change product key" and enter valid key; if domain-joined, ensure connectivity to KMS server and run slmgr.vbs /ato from elevated command prompt to force activation; if hardware changed significantly, may need to contact Microsoft support or reactivate.

2. Symptom: Application fails to launch with error stating it requires administrator privileges, even though user is logged in as administrator.
Likely Cause: User Account Control (UAC) is blocking elevated execution because the application wasn't launched with explicit administrative rights.
Fix: Right-click the application executable or shortcut and select "Run as administrator"; alternatively, open Properties of the executable, go to Compatibility tab, check "Run this program as an administrator," click Apply, then launch normally; verify UAC is enabled through Control Panel > User Accounts > Change User Account Control settings.

3. Symptom: Computer boots to black screen with cursor visible but desktop never loads; Safe Mode boots successfully.
Likely Cause: Third-party startup program or service is crashing Explorer.exe or preventing desktop from loading; recently installed software or driver may be incompatible.
Fix: Boot to Safe Mode, open Task Manager (Ctrl+Shift+Esc), navigate to Startup tab and disable all non-Microsoft startup items; open Services (services.msc) and disable recently installed non-Microsoft services; restart normally and if desktop loads, re-enable startup items one at a time to identify culprit; if issue persists, run System Restore from WinRE to restore to previous working state.

Step-by-Step Procedures

Task: Creating a New Local User Account and Configuring Permissions

  1. Right-click Start button and select "Computer Management" or run compmgmt.msc
  2. Expand "Local Users and Groups" in left navigation pane
  3. Right-click "Users" folder and select "New User"
  4. Enter username in "User name" field (required)
  5. Enter full name and description (optional)
  6. Enter password in "Password" field and confirm in "Confirm password" field
  7. Configure password options: uncheck "User must change password at next logon" if you want user to keep assigned password; check "User cannot change password" to prevent password changes; check "Password never expires" to disable password expiration (not recommended for security)
  8. Click "Create" button to create account, then click "Close"
  9. Right-click newly created user account and select "Properties"
  10. Click "Member Of" tab to configure group memberships
  11. Click "Add" button, type "Users" (for standard user) or "Administrators" (for admin privileges), click "Check Names," then click "OK"
  12. Remove default groups if needed by selecting and clicking "Remove"
  13. Click "Apply" then "OK" to save changes
  14. Close Computer Management console

Practice Questions

Q1: A user reports that their Windows 10 laptop cannot join the corporate domain. Upon investigation, you discover the laptop is running Windows 10 Home edition. What is the most appropriate solution?
(a) Upgrade to Windows 10 Pro or Enterprise edition
(b) Configure the laptop to use a workgroup instead
(c) Enable domain join through Group Policy
(d) Install Active Directory services on the laptop

Ans: (a)
Windows 10 Home edition does not support domain join functionality; only Pro, Enterprise, and Education editions can join Active Directory domains, requiring an edition upgrade.

Q2: A technician needs to identify which process is using the most CPU resources and terminate it. Which two tools can accomplish this task? (Select TWO)
(a) Event Viewer
(b) Task Manager
(c) System Information
(d) Command Prompt with tasklist and taskkill commands
(e) Disk Management

Ans: (b) and (d)
Task Manager displays CPU usage by process with ability to end tasks; tasklist command shows running processes and taskkill terminates them, providing command-line alternative to Task Manager.

Q3: Which command would you run from an elevated command prompt to repair corrupted Windows system files?
(a) chkdsk /f
(b) sfc /scannow
(c) diskpart
(d) gpupdate /force

Ans: (b)
System File Checker (sfc /scannow) scans and repairs corrupted Windows system files using cached copies from the component store.

Q4: Performance-Based Task - Configure Windows Update to pause updates for 14 days:
Environment: You are working on a Windows 10 Pro computer. The Settings app is open to the home screen. The computer is connected to the internet.

Expected steps:

  1. Click "Update & Security" from Settings home screen
  2. Select "Windows Update" from left navigation pane
  3. Click "Pause updates for 7 days" link or click "Advanced options"
  4. If Advanced options selected, locate "Pause updates" section
  5. Use dropdown menu to select date 14 days from current date
  6. Verify pause status shows in Windows Update main screen

Q5: An organization requires that all workstations prevent users from changing their passwords and force password changes every 90 days. Which tool should be used to configure this policy on standalone workstations?
(a) User Account Control settings
(b) Local Security Policy (secpol.msc)
(c) Computer Management
(d) Registry Editor

Ans: (b)
Local Security Policy (secpol.msc) configures password policies including maximum password age and user rights; navigate to Account Policies > Password Policy to set these requirements.

Q6: A user accidentally deleted important files from their Documents folder two days ago. The files are not in Recycle Bin. What Windows feature could recover these files if it was previously enabled?
(a) Windows Defender
(b) File History or System Restore
(c) Disk Cleanup
(d) Storage Spaces

Ans: (b)
File History creates backup copies of files in user libraries and can restore previous versions; alternatively, System Restore can return system to previous state if restore point exists from before deletion.

Q7: A technician needs to determine the exact Windows version, build number, and edition installed on a computer. Which command provides this information in a graphical window?
(a) msinfo32
(b) winver
(c) systeminfo
(d) msconfig

Ans: (b)
Winver command opens "About Windows" dialog displaying Windows version, edition, build number, and installation date in user-friendly graphical format.

Quick Review

  • Windows 10/11 Home cannot join domains, use BitLocker, host Remote Desktop, or access Group Policy Editor - upgrade to Pro minimum for these features
  • Windows 11 requires TPM 2.0, UEFI with Secure Boot, 64-bit processor (1 GHz, 2+ cores), and 4 GB RAM minimum - non-negotiable hardware requirements
  • Run sfc /scannow to repair corrupted system files; run DISM /Online /Cleanup-Image /RestoreHealth first if sfc fails to repair issues
  • Safe Mode loads minimal drivers and services - access by Shift+Restart, then Troubleshoot > Advanced options > Startup Settings > Enable Safe Mode
  • NTFS permissions: Deny always overrides Allow; effective permissions combine all group memberships; most restrictive between share and NTFS permissions applies over network
  • UAC prompts standard users for credentials but only asks administrators for consent - Never Notify disables UAC completely and creates security risk
  • gpupdate /force immediately applies updated Group Policy without waiting for background refresh; gpresult /r shows currently applied policies
  • Event Viewer categories: Application (program events), Security (audit logs), Setup (installation), System (Windows components) - check Event ID for specific error troubleshooting
  • msconfig manages startup programs and boot options including Safe Mode; Startup tab redirects to Task Manager in Windows 10/11
  • Activation methods: retail licenses transfer between computers, OEM licenses tie to original hardware, volume licenses use KMS or MAK for enterprise deployment
The document Windows Operating System is a part of the CompTIA A+ Course CompTIA A+ Core 2.
All you need of CompTIA A+ at this link: CompTIA A+
Explore Courses for CompTIA A+ exam
Get EduRev Notes directly in your Google search
Related Searches
Sample Paper, Important questions, Windows Operating System, practice quizzes, video lectures, pdf , shortcuts and tricks, Objective type Questions, Windows Operating System, Extra Questions, past year papers, Summary, Free, study material, Windows Operating System, mock tests for examination, MCQs, Previous Year Questions with Solutions, Semester Notes, Exam, Viva Questions, ppt;