View on GitHub

Tutorials

Simple Markdown Tutorials

My CompTIA A+ Certification Journey

Greetings, everyone! I’m diving into the world of IT and taking you along for the ride. What’s on the agenda? Conquering the CompTIA A+ certification, step by step. Join me as I break down the exam into bite-sized chunks, and I’ll be sharing the resources and tips that are helping me level up my skills. Whether you’re a tech enthusiast or just someone looking to learn something new, let’s tackle this certification together.

I think it only makes sense to start at the beginning, so let’s tackle the first objective and identify the basic features of Microsoft Windows editions.

1.1. Identify basic features of Microsoft Windows editions.

Windows 10 Home: Designed for the average consumer, Windows 10 Home offers a user-friendly experience with features like Cortana, Microsoft Edge, and the Start Menu. It’s suitable for everyday tasks and entertainment and is a popular choice for home users.

Windows 10 Pro: Windows 10 Pro is built for business and power users. It includes all the features of Windows 10 Home plus additional security and management tools like BitLocker, remote desktop access, and the ability to join a domain. It’s an excellent choice for small businesses and professionals.

Windows 10 Pro for Workstations: This edition is designed for high-performance PCs and workstations. It includes features like ReFS (Resilient File System) and support for high-end hardware configurations, making it ideal for users who need exceptional performance and reliability.

Windows 10 Enterprise: Geared towards large organizations and businesses, Windows 10 Enterprise offers advanced security, management, and deployment features. It includes Windows Defender Credential Guard, AppLocker, and Windows To Go, making it suitable for enterprises with complex IT infrastructures.

Windows 10 Education: Windows 10 Education builds on the commercial version of Windows 10 Pro but is tailored for educational institutions. It provides tools for educators and students, including enhanced security, simplified deployment, and access to Microsoft’s education-specific apps and services.

1.1.1. Upgrade Paths

Upgrade paths, in the context of Windows 10, refer to the routes or options available for transitioning from an older Windows operating system, such as Windows 7 or Windows 8, to Windows10. These paths outline which editions of Windows 10 are accessible based on the edition of the older Windows OS you are currently using. The upgrade path also specifies whether it’s a full upgrade ( which includes preserving personal data, settings, and applications) or a downgrade (where personal data is maintained, but applications and settings are removed). Understanding upgrade paths is essential for individuals planning to migrate to Windows 10, as it helps them determine which edition they can move to and what data they should expect to retain during the upgrade process.

1.1.2. BitLocker

BitLocker is a built-in feature in Windows operating systems that provides data encryption and security for your computer’s hard drive or other storage devices. It works by encrypting the entire drive, making it nearly impossible for unauthorized users to access your data without the appropriate encryption key. Sample BitLocker use-case from a user’s perspective: Enable BitLocker: Go to the Control Panel, select “System and Security,” and click on “BitLocker Drive Encryption.” From there, you can choose which drive you want to encrypt and follow the setup wizard. Choose Your Unlock Method: You’ll be asked to choose how you want to unlock the drive. Options typically include using a password, a PIN, or a USB drive. Select the one that suits your preference and security needs. Backup Your Recovery Key: BitLocker will generate a recovery key that you should store in a safe place. This key is essential in case you forget your password or PIN, as it allows you to regain access to your encrypted drive. Start Encryption: Once you’ve configured your settings and saved the recovery key, BitLocker will begin encrypting your drive in the background. This process may take some time, depending on the size of the drive. Restart Your Computer: After the encryption is complete, you may need to restart your computer. BitLocker will prompt you to enter your password, PIN, or insert the USB drive to unlock the encrypted drive every time you boot your computer.

BitLocker provides an added layer of security to protect your data from unauthorized access, especially in the event that your computer or storage device is lost or stolen.

1.1.3. Remote Desktop Protocol (RDP)

First introduced in 1998 for Windows NT 4.0 Terminal Server Edition, Remote Desktop Protocol (RDP) is a technology developed by Microsoft that allows users to connect to and control a remote computer or server over a network. With RDP, you can access and interact with a remote desktop as if you were physically present in front of it. This technology is commonly used for remote administration, technical support, or accessing resources on a remote machine. To use RDP, the remote computer must be running a Windows operating system, and you need proper credentials and permissions to establish a secure connection. RDP provides a convenient way to work on distant computers, troubleshoot issues, or manage remote servers efficiently. Remote Desktop Protocol (RDP) is not available in Windows 10 Home Edition. It is a feature included in Windows 10 Pro, Windows 10 Pro Education, Windows 10 Education, and Windows 10 Enterprise editions. These editions are designed to provide more advanced networking and remote access capabilities, which include RDP, making them suitable for business and professional use cases. Windows 10 Home, on the other hand, is intended for consumer and basic home use and lacks some of these advanced networking features.

1.1.4. Domain Access vs. Workgroup

Access Domain access and workgroup access are two different ways to manage networked computers in a Windows environment. In a domain, computers are part of a centralized network managed by a server, often referred to as a domain controller. This setup allows for centralized user authentication, security policies, and resource management. Users log in using domain credentials, and administrators can control access, enforce security policies, and manage resources centrally. On the other hand, in a workgroup, computers are more decentralized. Each computer maintains its own user accounts and security settings, and users typically log in with local accounts unique to each machine. Workgroups are suitable for small networks or peer-to-peer setups where centralized management and security aren’t as critical. Domain access provides more robust control and scalability, making it suitable for larger networks and organizations, while workgroups are simpler and easier to set up for smaller, less complex environments. In Windows 10, every edition except for Windows 10 Home supports domain access. Windows 10 Pro, Windows 10 Pro Education, Windows 10 Education, and Windows 10 Enterprise editions all have the capability to join and connect to domains, making them suitable for business and enterprise environments where centralized network management and security are essential. Windows 10 Home, being more consumer-oriented, doesn’t include this feature.

1.1.5. Group Policy Editor

gpedit.msc stands for Group Policy Editor. It’s a Microsoft Management Console (MMC) application that allows users to manage various Windows system settings and policies in a centralized and organized way. Group policies are a set of rules and configurations that control the working environment of user accounts and computer accounts in Windows. Here’s a brief explanation: Group Policy Editor is primarily used by system administrators and advanced users to: Manage System Policies: It enables administrators to configure policies that affect the behavior and settings of Windows operating systems. These policies can control security settings, application settings, network configurations, and more. Enforce Security: Administrators can use Group Policy to enforce security measures across a network, such as password policies, access controls, and firewall rules. Customize User Experience: Group Policy allows for the customization of the Windows user interface, including hiding or showing specific elements of the operating system. Deploy Software: Administrators can use Group Policy to deploy and manage software installations and updates across a network of Windows computers. Centralized Management: It provides a centralized location to configure and manage these policies across multiple computers in an Active Directory domain or on a local computer.

To access gpedit.msc, you can open the Run dialog (Windows Key + R), type gpedit.msc, and press Enter. Please note that gpedit.msc is not available in Windows Home editions; it’s typically found in Windows Pro, Education, and Enterprise editions.

1.2. Given a scenario, use the appropriate Microsoft command-line tool.

1.2.1. cd / chdir: Full Microsoft doc here.

Allows you to view or change the current directory. If you provide a drive letter (e.g., cd C:), it shows the current directory in that drive, and without any parameters, it displays the current drive and directory.

C:\>cd Documents 
C:\Documents>cd D:\
D:\
C:\Documents>cd \d D:\
D:\

1.2.2 dir: Full Microsoft doc here.

The dir command in Microsoft is a versatile tool used for listing and displaying the contents of a directory. It provides valuable information such as file names, sizes, attributes (including hidden or read-only status), creation times, and modification dates.

C:/temp> dir

 Volume in drive C is OS 
 Volume Serial Number is XXXX-XXXX

 Directory of C:\Temp

12/06/2023 04:30 PM    <DIR>          . 
12/06/2023 04:30 PM    <DIR>          .. 
12/06/2023 04:30 PM                 0 example_file.txt 
              1 File(s)              0 bytes 
              2 Dir(s)  XXX,XXX,XXX,XXX bytes free 

1.2.3 md: Full Microsoft doc here.

The md command is used to create a new directory (folder) in the specified path.

Command Syntax:

md [drive:]path

Create a new folder named NewFolder in C:\Temp:

C:\>md C:\Temp\NewFolder 

After executing the command, the specified directory will be created, and you can then navigate to it using File Explorer or other command-line tools.

1.2.4 rmdir: Full Microsoft doc here.

The rmdir command is used to remove (delete) a directory.

Command Syntax:

rmdir [/s][/q] [drive:]path

Remove a directory named “OldFolder” in C:\Temp:

C:\>rmdir C:\Temp\OldFolder 

Remember to exercise caution when using the /s option, as it will remove the specified directory and its subdirectories, including all files within them.

1.2.5. Drive Navigation Inputs: Full Microsoft doc here.

To change the drive, simply type the drive letter followed by a colon and press Enter. For example:

C:\>D:
D:\> 

This command will switch to the D: drive. Replace D: with the letter of the drive you want to navigate to. If you want to change to a specific directory on the newly selected drive, you can use the cd command. For example:

C:\>cd \Path\To\Your\Directory 

Replace \Path\To\Your\Directory with the actual path of the directory you want to navigate to. To verify that you have successfully switched to the desired drive and directory, you can use the cd command without any arguments to display the current directory. For example:

C:\>cd 

This command will display the current directory on the selected drive.

1.2.6. ipconfig: Full Microsoft doc here.

The ipconfig command in Windows is used to display information about the computer’s network configuration. It provides details such as the IP address, subnet mask, and default gateway for all network interfaces on the system. Additionally, ipconfig can show information about DNS servers and other network-related settings. This command is useful for troubleshooting network connectivity issues and obtaining information about the computer’s network configuration. Command Syntax:

ipconfig [/all]

Options:

C:\>ipconfig /all

Windows IP Configuration 
Ethernet adapter Local Area Connection:
   Connection-specific DNS Suffix  . : example.com 
   IPv4 Address. . . . . . . . . . . : 192.168.1.2
   Subnet Mask . . . . . . . . . . . : 255.255.255.0 
   Default Gateway . . . . . . . . . : 192.168.1.1
Wireless LAN adapter Wi-Fi:
   Connection-specific DNS Suffix  . : example.com 
   IPv4 Address. . . . . . . . . . . : 192.168.1.5
   Subnet Mask . . . . . . . . . . . : 255.255.255.0 
   Default Gateway . . . . . . . . . : 192.168.1.1
Tunnel adapter Teredo Tunneling Pseudo-Interface:
   Connection-specific DNS Suffix  . :
   IPv6 Address. . . . . . . . . . . : 2001:0:9d38:953c:2428:1a2f:acd9:1234 
   Link-local IPv6 Address . . . . . : fe80::2428:1a2f:acd9:1234%12 
   Default Gateway . . . . . . . . . : ::

1.2.7. ping: Full Microsoft doc here.

The ping command in the Windows command line is used to test the reachability of a network host and measure the round-trip time for messages sent from the source to the destination.

Command Syntax:

ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS] [-r count] [-s count] [-w timeout] [hostname or IP address]

Options:

Ping a server or website (e.g., www.example.com):

C:\>ping -t www.example.com

Pinging www.example.com [93.184.216.34] with 32 bytes of data:
Reply from 93.184.216.34: bytes=32 time=10ms TTL=57 
Reply from 93.184.216.34: bytes=32 time=12ms TTL=57 
Reply from 93.184.216.34: bytes=32 time=11ms TTL=57 
Reply from 93.184.216.34: bytes=32 time=10ms TTL=57

Ping statistics for 93.184.216.34:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), 
Approximate round trip times in milli-seconds:
    Minimum = 16ms, Maximum = 20ms, Average = 18ms 

1.2.8. hostname: Full Microsoft doc here.

The hostname command in the Windows command line is used to display the name of the current host ( computer) on a network.

Command Syntax:

hostname 

The command outputs the host (computer) name assigned to the system, which is typically used for identification on a network.

Get the hostname of the current system:

C:\>hostname 
My-Computer-Name 

1.2.9. netstat: Full Microsoft doc here. The netstat command in the

The netstat command displays network-related information, such as active connections, listening ports, and routing tables.

Command Syntax:

netstat [-a] [-b] [-n] [-o] [-p protocol] [-r] [-s] [interval]

Options:

Display All Active Connections:

C:\>netstat -a

Active Connections

Proto Local Address Foreign Address State 
TCP 192.128.1.2.52011 151.101.129.69:http ESTABLISHED 
TCP 192.128.1.2.52012 151.101.129.69:http ESTABLISHED 

Display Executable Involved in Connection:

C:\>netstat -b

Active Connections

  Proto Local Address Foreign Address State
  TCP 192.168.0.2:49152 52.124.164.21:https ESTABLISHED 1234
 [svchost.exe]
  TCP 192.168.0.2:49153 52.124.164.22:https ESTABLISHED 5678
 [chrome.exe]
  TCP 192.168.0.2:49154 52.124.164.23:https ESTABLISHED 9012
 [firefox.exe]

Display Routing Table:

C:\>netstat -r

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.1.1      192.168.1.2    25
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
      192.168.1.0    255.255.255.0         On-link       192.168.1.2    281
      192.168.1.2  255.255.255.255         On-link       192.168.1.2    281
    192.168.1.255  255.255.255.255         On-link       192.168.1.2    281
      192.168.2.0    255.255.255.0      192.168.1.1      192.168.1.2    26
      192.168.3.0    255.255.255.0      192.168.1.1      192.168.1.2    26
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
        224.0.0.0        240.0.0.0         On-link       192.168.1.2    281
        224.0.0.0        240.0.0.0         On-link       192.168.1.2    281
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
  255.255.255.255  255.255.255.255         On-link       192.168.1.2    281
  255.255.255.255  255.255.255.255         On-link       192.168.1.2    281
Default Gateway:   192.168.1.1

Interface List
 18...00 50 56 91 11 22 ......Intel(R) Ethernet Connection I219-V
 25...00 1f 16 8c 11 22 ......Microsoft Wi-Fi Direct Virtual Adapter
 22...02 00 54 74 68 72 ......Microsoft Teredo Tunneling Adapter
  1...........................Software Loopback Interface 1

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 18    331 ::/0                     fe80::1
  1    331 ::1/128                  On-link
 18    331 2001::/32                On-link

The specific details in the output may vary based on the system’s network configuration and active connections.

1.2.10 nslookup: Full Microsoft doc here.

The nslookup command in the Windows command line is used for querying Domain Name System (DNS) servers to obtain domain name or IP address information.

Command Syntax:

nslookup [hostname or IP address] [DNS server]

Options:

Querying for IP Address of a Domain:

C:\> nslookup www.example.com
Server:  dns.example.com
Address:  192.168.1.1

Non-authoritative answer:
Name:    www.example.com
Addresses:  93.184.216.34

Reverse DNS Lookup (IP to Hostname):

C:\> nslookup 93.184.216.34
Server:  dns.example.com
Address:  192.168.1.1

Non-authoritative answer:
Name:    www.example.com
Addresses:  93.184.216.34

Using a Different DNS Server:

C:\> nslookup www.example.com 8.8.8.8
Server:  dns.google
Address:  8.8.8.8

Non-authoritative answer:
Name:    www.example.com
Addresses:  93.184.216.34

1.2.11. chkdsk: Full Microsoft doc here.

The chkdsk command in the Windows command line is used to check a disk for errors and fix issues with the file system and the physical storage.

Command Syntax:

chkdsk [drive:] [/f] [/r] [/x]

Options:

Check Disk on Drive C: with Automatic Repair:

C:> chkdsk C:

Checking file system on C:
The type of the file system is NTFS.

Volume label is System.

Stage 1: Examining basic file system structure ...
  123456 file records processed.
File verification completed.
  7890 large file records processed.
  0 bad file records processed.

Stage 2: Examining file name linkage ...
  123456 index entries processed.
Index verification completed.
  0 unindexed files scanned.
  0 unindexed files recovered to lost and found.

Stage 3: Examining security descriptors ...
Security descriptor verification completed.
  7890 data files processed.
CHKDSK is verifying Usn Journal...
  45678912 USN bytes processed.
Usn Journal verification completed.

Windows has checked the file system and found no problems.

 97656448 KB total disk space.
 65432100 KB in 123456 files.
     56789 KB in 7890 indexes.
         0 KB in bad sectors.
    987654 KB in use by the system.
     65536 KB occupied by the log file.
 32109876 KB available on disk.

      4096 bytes in each allocation unit.
 24414112 total allocation units on disk.
  8024697 allocation units available on disk.

Internal Info:
00 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff

Windows has finished checking your disk.
Please wait while your computer restarts.

Check Disk with Automatic Repair and Bad Sector Recovery:

C:> chkdsk C: /r

Checking file system on C:
The type of the file system is NTFS.

Volume label is System.

Stage 1: Examining basic file system structure ...
  123456 file records processed.
File verification completed.
  7890 large file records processed.
  0 bad file records processed.

Stage 2: Examining file name linkage ...
  123456 index entries processed.
Index verification completed.
  0 unindexed files scanned.
  0 unindexed files recovered to lost and found.

Stage 3: Examining security descriptors ...
Security descriptor verification completed.
  7890 data files processed.
CHKDSK is verifying Usn Journal...
  45678912 USN bytes processed.
Usn Journal verification completed.

Stage 4: Looking for bad sectors in user file data ...
  45678912 KB in 987654 recoverable files.
CHKDSK discovered free space marked as allocated in the
master file table (MFT) bitmap.
Correcting errors in the master file table's (MFT) BITMAP attribute.
Correcting errors in the Volume Bitmap.

Windows has made corrections to the file system.

 97656448 KB total disk space.
 65432100 KB in 123456 files.
     56789 KB in 7890 indexes.
         0 KB in bad sectors.
    987654 KB in use by the system.
     65536 KB occupied by the log file.
 32109876 KB available on disk.

      4096 bytes in each allocation unit.
 24414112 total allocation units on disk.
  8024697 allocation units available on disk.

Internal Info:
00 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff

Windows has finished checking your disk.
Please wait while your computer restarts.

The command output provides information about the file system type, the progress of the check, and any corrections made to the file system. The user might also be prompted to schedule a disk check on the next system restart if the drive is currently in use.

1.2.12. net user: Full Microsoft doc here.

The net user command in the Windows command line is used to manage user accounts. It allows you to view user account information, change user passwords, and perform other account-related tasks.

Command Syntax:

net user [username [password | *] [options]] [/domain]

Options:

View User Account Information:

C:\>net user John

User name                    John
Full Name                    John Doe
Comment                      Example User Account
User's comment
Country/region code          000 (System Default)
Account active               Yes
Account expires              Never

Password last set            MM/DD/YYYY
Password expires             MM/DD/YYYY
Password changeable          MM/DD/YYYY
Password required            Yes
User may change password     Yes

Workstations allowed         All
Logon script
User profile
Home directory
Last logon                   MM/DD/YYYY
Logon hours allowed          All

Local Group Memberships      *LocalGroupName1       *LocalGroupName2
Global Group memberships     *GlobalGroupName1      *GlobalGroupName2

The command completed successfully.

Change User Password:

C:\>net user John newpassword
The command completed successfully.

Prompt for new Password:

C:\>net user John *
Type a password for the user:
Retype the password to confirm:
The command completed successfully.

Add User to a Group:

C:\>net user John \add
The command completed successfully.

If you need to provide additional details such as a password, user profile path, or other settings, you would include those as part of the command. The actual output may vary based on the specific user accounts and settings on the system.

1.2.13. net use: Full Microsoft doc here.

The net use command in the Windows command line is used to connect or disconnect a computer from a shared resource or to display information about existing connections. Command Syntax:

net use [device_name | *] [\\computer_name\share_name[\volume] [password | *]] [/user:[domain_name\]user_name] [/persistent:{yes | no}]

Map Network Drive:

C:\>net use Z: \\sever\share
The command completed successfully.

Disconnect from a Network:

C:\>net use Z: /delete
The command completed successfully.

Display Information about Network Connections:

C:\>net use
New connections will be remembered.

Status       Local     Remote                    Network

-------------------------------------------------------------------------------
OK           Z:        \\server\share            Microsoft Windows Network
The command completed successfully.

1.2.14 tracert: Full Microsoft doc here.

The tracert (trace route) command in the Windows command line is used to trace the route that packets take to reach a destination on the network. It shows the sequence of routers or hops that the packets traverse to reach the target.

Command Syntax:

tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name

Options:

Basic Trace Route:

C:\>tracert www.example.com
Tracing route to www.example.com [93.184.216.34]
over a maximum of 30 hops:

  1    <1 ms    <1 ms    <1 ms  your_router_IP
  2     5 ms     4 ms     3 ms  ISP_router_IP
  3     8 ms     9 ms     8 ms  some_other_router_IP
  4    15 ms    14 ms    16 ms  destination_router_IP

Trace complete.

Trace Route with Maximum Hops and Timeout:

C:\>tracert -h 15 -w 500 www.example.com
Tracing route to www.example.com [93.184.216.34]
over a maximum of 15 hops:

  1    <1 ms    <1 ms    <1 ms  your_router_IP
  2     5 ms     4 ms     3 ms  ISP_router_IP
  3     *        9 ms     8 ms  some_other_router_IP
  4    15 ms    14 ms    16 ms  destination_router_IP

Trace complete.

Any timeouts are indicated by an *. A timeout can occur for various reasons, such as network congestion, router configuration, or a firewall blocking the ICMP packets used by tracert. It’s not uncommon to see occasional timeouts, especially on the public internet where there are many factors affecting packet delivery.

1.2.15 format: Full Microsoft doc here.

The format command in the Windows command line is used to prepare a disk volume for use by creating a new file system. It is often used to format removable storage devices such as USB drives or SD cards.

Command Syntax:

format [/fs:filesystem] [/v:label] [/q] [/c] [/x] [/p:passes] [/l] [/y]

Options:

Quick Format with Default File System:

C:\>format E: \q
The type of the file system is NTFS.
Enter current volume label for drive E: MY_DRIVE
WARNING, ALL DATA ON NON-REMOVABLE DISK
DRIVE E: WILL BE LOST!
Proceed with Format (Y/N)? Y
QuickFormatting 1024M
Creating file system structures.
Format complete.
1,024.00 MB total disk space.
1,024.00 MB are available.
        4.00 KB in 2 files.
        64 KB in 16 indexes.
           512 KB in bad sectors.
       1,024.00 MB in use by the system.
  1,022.98 MB available on disk.
          4,096 bytes in each allocation unit.
        262,143 allocation units available on disk.
           256 bytes in each index.
        1,023 indexes available on disk.

Full Format with Specified File System and Volume Label:

C:\>format F: /fs:FAT32 /v:MyDrive /p:1
Insert new disk for drive F:
and press ENTER when ready...
The type of the file system is FAT32.
Verifying 1.44M
Format cannot run because the volume is in use by another
process.  Format may run if this volume is dismounted first.
ALL OPENED HANDLES TO THIS VOLUME WOULD THEN BE INVALID.
Would you like to force a dismount on this volume? (Y/N) Y
Volume dismounted.  All opened handles to this volume are now invalid.
Volume label (11 characters, ENTER for none)? MyDrive
QuickFormatting 1.4M
Creating file system structures.
Format complete.
1.4M total disk space.
1.4M are available.
          512 bytes in each allocation unit.
        2,880 allocation units available on disk.
           16 bits in each FAT entry.
           1,440 bytes in each reserved sector.
           1 FATs.
           2 sectors in each cluster.
        1,471 total clusters on disk.
        1,440 clusters available on disk.

1.2.16 xcopy: Full Microsoft doc here.

The xcopy command in Windows is used to copy files and directories from one location to another. It provides more advanced features compared to the basic copy command, including the ability to copy entire directory structures, preserve file attributes, and copy files selectively based on various criteria.

Command Syntax:

XCOPY source [destination] [/A | /M] [/D[:date]] [/P] [/S [/E]] [/V] [/W]
                           [/C] [/I] [/Q] [/F] [/L] [/G] [/H] [/R] [/T] [/U]
                           [/K] [/N] [/O] [/X] [/Y] [/-Y] [/Z] [/B] [/J]
                           [/EXCLUDE:file1[+file2][+file3]...] [/COMPRESS]

Options:

Basic File Copy:

C:\>xcopy C:\Source\file.txt D:\Destination\
1 File(s) copied

Copy Directory with Subdirectories:

C:\>xcopy C:\Source\Directory D:\Destination\ /e
C:\Source\Directory\file1.txt
C:\Source\Directory\file2.txt
C:\Source\Directory\Subdirectory1\file3.txt
C:\Source\Directory\Subdirectory1\file4.txt
C:\Source\Directory\Subdirectory2\file5.txt
5 File(s) copied

Copy Files Modified After a Certain Date:

C:\>xcopy C:\Source\* D:\Destination\ /d:12-01-2023
C:\Source\file1.txt
C:\Source\Subdirectory1\file3.txt
C:\Source\Subdirectory2\file5.txt
3 File(s) copied

The date format may vary depending on your regional settings, but in this example, it’s represented as “MM-DD-YYYY.”

1.2.17 copy: Full Microsoft doc here.

The copy command in the Windows command line is used to copy one or more files from one location to another. It’s a basic file copy command with simpler functionalities compared to xcopy.

Command Syntax:

COPY [/D] [/V] [/N] [/Y | /-Y] [/Z] [/L] [/A | /B ] source [/A | /B]
     [+ source [/A | /B] [+ ...]] [destination [/A | /B]]

Options:

Basic File Copy:

C:\>copy C:\Source\file.txt D:\Destination\
1 file(s) copied.

Copy With Confirmation Prompt:

C:\>copy C:\Source\file.txt D:\Destination\ /-y

Overwrite D:\Destination\file.txt? (Yes/No/All): 
Yes

        1 file(s) copied.

Copy Multiple Files:

copy C:\Source\file1.txt C:\Source\file2.txt D:\Destination\
2 file(s copied.

1.2.18 robocopy: Full Microsoft doc here.

The robocopy command in the Windows command line is a robust utility for copying files and directories. It provides advanced features and is often used for tasks such as mirroring directories or copying files with specific attributes. Here is a summary of its key functionalities:

Command Syntax:

robocopy source destination [file [file]…] [options]

Options:

Basic Directory Mirror:

C:\>robocopy C:\Source D:\Destination /mir
-------------------------------------------------------------------------------
   ROBOCOPY     ::     Robust File Copy for Windows                              
-------------------------------------------------------------------------------

  Started : Date Time
   Source : C:\Source\
     Dest : D:\Destination\

    Files : *.*

  Options : *.* /MIR /R:1000000 /W:30 

------------------------------------------------------------------------------

                           1    C:\Source\
        Newer                     10    D:\Destination\
------------------------------------------------------------------------------

------------------------------------------------------------------------------

               Total    Copied   Skipped  Mismatch    FAILED    Extras
    Dirs :         1         0         0         0         0         0
   Files :         1         0         0         0         0         0
   Bytes :         0         0         0         0         0         0
   Times :   0:00:00   0:00:00                       0:00:00   0:00:00

   Speed :                  0 Bytes/sec.
   Speed :                 0.000 MegaBytes/min.

   Ended : Date Time

In this example:

Copy Files with Specific Attributes:

C:\>robocopy C:\Source D:\Destination *.txt /a+
-------------------------------------------------------------------------------
   ROBOCOPY     ::     Robust File Copy for Windows                              
-------------------------------------------------------------------------------

  Started : Date Time
   Source : C:\Source\
     Dest : D:\Destination\

    Files : *.txt

  Options : *.* /A+

------------------------------------------------------------------------------

                           1    C:\Source\
        Newer                      5    D:\Destination\
------------------------------------------------------------------------------

------------------------------------------------------------------------------

               Total    Copied   Skipped  Mismatch    FAILED    Extras
    Dirs :         1         1         0         0         0         0
   Files :         5         5         0         0         0         0
   Bytes :         0         0         0         0         0         0
   Times :   0:00:01   0:00:00                       0:00:00   0:00:00

   Speed :                  0 Bytes/sec.
   Speed :                 0.000 MegaBytes/min.

   Ended : Date Time

In this example:

Limit Copy Speed:

The /IPG switch in robocopy (Inter-Packet Gap) is used to specify the inter-packet gap to control the rate of sending requests to a server.

1.2.19 gpupdate: Full Microsoft doc here.

The gpupdate command in the Windows command line is used to manually force a group policy update on a local computer or a remote computer in a network. It ensures that the latest group policy settings are applied without waiting for the automatic refresh interval.

Command Syntax:

gpupdate [/target:{computer | user}] [/force] [/wait:value] [/logoff] [/boot]

Options:

Force Immediate Update for Both Computer and User Settings:

C:\>gpupdate /force
Updating policy...

Computer Policy update has completed successfully.
User Policy update has completed successfully.

The command completed successfully.

Update User Settings Only and Wait for 30 Seconds:

C:\> gpupdate /target:user /wait:30
Updating policy...

User Policy update has completed successfully.

The command completed successfully.

Force Immediate Update and Restart the Computer:

C:\> gpupdate /force /boot
Updating policy...

Computer Policy update has completed successfully.
User Policy update has completed successfully.

The computer needs to be restarted to apply these changes.
Restart now? (Y/N)

1.2.20 gpresult: Full Microsoft doc here.

The gpresult command in the Windows command line is used to display the Resultant Set of Policy (RSoP) for a user or computer. It shows the applied group policy settings and summarizes the effective policies in effect on the system.

Command Syntax:

gpresult [/s computer] [/user username] [/scope {user | computer | both}] [/v] [/z] [/h filename] [/f]

Options:

Display Group Policy Results for the Current User:

C:\> gpresult
Microsoft (R) Windows (c) 2023 Microsoft Corporation. All rights reserved.

INFO: The user "DOMAIN\Username" does not have RSOP data.

INFO: The computer "COMPUTERNAME" does not have RSOP data.

User Rights:
[...]
Group Policy Objects:
-------------------
    Local Group Policy
        Filtered out (Unknown Reason)
    Default Domain Policy
        Filtered out (Unknown Reason)
    Group Policy Object
        Filtering:  Not Applied (Empty)

Local Group Policy
Filtering:  Not Applied (Empty)

-----------------

Computer Settings
----------------
    Last time Group Policy was applied: [Date and Time]
    Group Policy was applied from:      N/A
    Group Policy slow link threshold:   500 kbps
    Domain Name:                        DOMAIN
    Domain Type:                        Windows 2023
    Applied Group Policy Objects:
    The computer is a part of the following security groups:
        [...]
    Resultant Set Of Policies for Computer:
        N/A

User Settings
--------------
    Last time Group Policy was applied: [Date and Time]
    Group Policy was applied from:      N/A
    Group Policy slow link threshold:   500 kbps
    Domain Name:                        DOMAIN
    Domain Type:                        Windows 2023
    Applied Group Policy Objects:
    The user is a part of the following security groups:
        [...]
    Resultant Set Of Policies for User:
        N/A

Display Verbose Output for Computer Settings:

C:\> gpresult /scope computer /v
Microsoft (R) Windows (c) 2023 Microsoft Corporation. All rights reserved.

INFO: The user "DOMAIN\Username" does not have RSOP data.

INFO: The computer "COMPUTERNAME" does not have RSOP data.

Computer Settings
----------------
    Last time Group Policy was applied: [Date and Time]
    Group Policy was applied from:      N/A
    Group Policy slow link threshold:   500 kbps
    Domain Name:                        DOMAIN
    Domain Type:                        Windows 2023
    Applied Group Policy Objects:
        Local Group Policy
        Default Domain Policy
        Group Policy Object
    The computer is a part of the following security groups:
        [...]
    Resultant Set Of Policies for Computer:
        N/A

Save HTML Report for Both User and Computer Settings:

C:\> gpresult /scope both /h C:\Reports\GPReport.html
Microsoft (R) Windows (c) 2023 Microsoft Corporation. All rights reserved.

The GPResult tool will be used to generate a report. Please wait...

The report has been successfully created at C:\Reports\GPReport.html.

1.2.21 shutdown: Full Microsoft doc here.

The shutdown command in the Windows command line is used to shut down, restart, or log off a local or remote computer. It provides options for specifying the shutdown type, time delay, and optional messages.

Command Syntax:

shutdown [/s [/t timeout] [/c "comment"] [/d up:xx:yy] [/f] [/m \\computer] [/r] [/g] [/l] [/a]]

Options:

Immediate Shutdown with a Comment:

C:\> shutdown /s /c "Shutting down for maintenance"
Shutting down for maintenance

Shutdown with a 5-Minute Delay and Forced Closure of Applications:

C:\> shutdown /s /t 300 /f
Shutting down in 5 minutes. (Press Ctrl+C to cancel)

Be cautious when using the /f option, as it forcefully closes applications without warning.

Restart the Computer and Force Running Applications to Close:

C:\> shutdown /r /fC:\> shutdown /a
Restarting the system. (Press Ctrl+C to cancel)

Abort a Planned Shutdown:

C:\> shutdown /a
Abort system shutdown.

Please note that for the /a (abort) option to work, it must be executed before the actual shutdown or restart process takes effect. If no shutdown or restart is in progress, the command will display a message stating that no shutdown is in progress.

1.2.22 sfc: Full Microsoft doc here.

The sfc (System File Checker) command in the Windows command line is used to scan and repair corrupted or missing system files on a Windows system. It is a useful tool for maintaining the integrity of the operating system.

Command Syntax:

sfc [/scannow] [/verifyonly] [/scanfile=file] [/verifyfile=file] [/offwindir=offline-windows-directory] [/offbootdir=offline-boot-directory]

Options:

Scan and Repair System Files:

C:\> sfc /scannow
Beginning system scan. This process will take some time.

Beginning verification phase of system scan.
Verification % complete.

Windows Resource Protection found corrupt files and successfully repaired them.
Details are included in the CBS.Log %WinDir%\Logs\CBS\CBS.log.

The scan and repair were successful. Restart your computer to complete the process.

Verify System Files Without Repair:

C:\> sfc /verifyonly
Beginning system scan. This process will take some time.

Verification % complete.

Windows Resource Protection did not find any integrity violations.

Scan and Repair a Specific File:

C:\> sfc /scanfile=C:\Windows\System32\kernel32.dll
Verification % complete.

Windows Resource Protection found corrupt files and successfully repaired them.
Details are included in the CBS.Log %WinDir%\Logs\CBS\CBS.log.

Verify a Specific File Without Repair C:> sfc

C:\> sfc /verifyfile=C:\Windows\System32\ntdll.dll
Beginning verification of system file. This process will take some time.

Verification % complete.

Windows Resource Protection did not find any integrity violations.

Scan and Repair System Files onan Offline Windows Installation:

C:\> sfc /scannow /offwindir=D:\Windows /offbootdir=D:\
Beginning system scan. This process will take some time.

Beginning verification phase of system scan.
Verification % complete.

Windows Resource Protection found corrupt files and successfully repaired them.
Details are included in the CBS.Log %WinDir%\Logs\CBS\CBS.log.

The scan and repair were successful. Restart your computer to complete the process.

Running sfc may require administrative privleges.

1.2.23 [command name] /?: Full Microsoft doc here.

In the Windows command line, appending /? to most commands provides a quick help or usage information about that specific command. Command Syntax:

command /?

Replace command with the actual command you want to get help for. The /? option is a common convention in the Windows command line to request information about a command’s usage, options, and syntax. The specific help output will depend on the command and its implementation.

1.2.24 diskpart: Full Microsoft doc here.

The diskpart command is a Windows command-line utility that allows users to manage disk partitions, volumes, and related configurations. It provides a command-line interface to interact with the Disk Management tool and perform various disk-related operations.

Command Syntax:

diskpart

This opens the diskpart utility, where you can then enter specific commands for disk management.

diskpart Commands:

List Available Disks:

DISKPART> list disk

  Disk ###  Status         Size     Free     Dyn  Gpt
  --------  -------------  -------  -------  ---  ---
  Disk 0    Online          238 GB      0 B        *
  Disk 1    Online          931 GB      0 B

Select and Clean a Disk:

DISKPART> select Disk 1

Disk 1 is now the selected disk.

DISKPART> clean

DiskPart succeeded in cleaning the disk.

Create a Primary Partition:

DISKPART> select Disk 1

Disk 1 is now the selected disk.

DISKPART> create partition primary size=1000

DiskPart succeeded in creating the specified partition.

Format and Assign a Drive Letter:

DISKPART> select Disk 1

Disk 1 is now the selected disk.

DISKPART> format fs=ntfs label=Data quick

100 percent completed

DiskPart successfully formatted the volume.

DISKPART> assign letter=D

DiskPart successfully assigned the drive letter or mount point.

Extend a Partition:

DISKPART> select Disk 1

Disk 1 is now the selected disk.

DISKPART> select partition 2

Partition 2 is now the selected partition.

DISKPART> extend size=10240

DiskPart successfully extended the volume.

Administrative privileges are often required to use diskpart.

1.2.25 pathping: Full Microsoft doc here.

The pathping command in the Windows command line is a network diagnostic tool that combines features of both the ping and tracert commands. It provides information about the path that network packets take to reach a destination, similar to tracert, but it also includes performance information about each hop, like ping.

Command Syntax:

pathping [-n] [-h maximum_hops] [-g host-list] [-p period] [-q num_queries] [-w timeout] target_name

Options:

Basic Pathping to a Destination:

C:\> pathping www.example.com
Tracing route to www.example.com [192.0.2.1]
over a maximum of 30 hops:

  0  YourComputer [192.168.1.2]
  1  Router [192.168.1.1]
  2  ISP-Gateway [203.0.113.1]
  3  ISP-Router [203.0.113.2]
  4  ISP-Server [198.51.100.1]
  5  Example-Server [192.0.2.1]

Computing statistics for 125 seconds...
            Source to Here   This Node/Link
Hop  RTT    Lost/Sent = Pct  Lost/Sent = Pct  Address
  0                                           YourComputer [192.168.1.2]
                                0/ 100 =  0%   |
  1   10ms     0/ 100 =  0%     0/ 100 =  0%  Router [192.168.1.1]
                                0/ 100 =  0%   |
  2   15ms     0/ 100 =  0%     0/ 100 =  0%  ISP-Gateway [203.0.113.1]
                                0/ 100 =  0%   |
  3   20ms     0/ 100 =  0%     0/ 100 =  0%  ISP-Router [203.0.113.2]
                                0/ 100 =  0%   |
  4   25ms     0/ 100 =  0%     0/ 100 =  0%  ISP-Server [198.51.100.1]
                                0/ 100 =  0%   |
  5   30ms     0/ 100 =  0%     0/ 100 =  0%  Example-Server [192.0.2.1]

Trace complete.

Pathping with Maximum Hops and Periodic Pings:

C:\> pathping -h 15 -p 500 www.example.com
Tracing route to www.example.com [192.0.2.1]
over a maximum of 15 hops:
0  Your_Computer [192.168.1.1]
1  Router1 [203.0.113.1]
2  Router2 [203.0.113.2]
3  Example_Router [198.51.100.1]
4  ISP_Router [192.0.2.2]
5  Destination_Router [192.0.2.1]

Computing statistics for 500ms...
Source to Here   This Node/Link
Hop  RTT    Lost/Sent = Pct  Lost/Sent = Pct  Address
0                                            Your_Computer [192.168.1.1]
                               0/ 100 =  0%   |
1  ---     100/ 100 =100%    0/ 100 =  0%  Router1 [203.0.113.1]
                               0/ 100 =  0%   |
2  ---     100/ 100 =100%    0/ 100 =  0%  Router2 [203.0.113.2]
                               0/ 100 =  0%   |
3  ---     100/ 100 =100%    0/ 100 =  0%  Example_Router [198.51.100.1]
                               0/ 100 =  0%   |
4  ---     100/ 100 =100%    0/ 100 =  0%  ISP_Router [192.0.2.2]
                               0/ 100 =  0%   |
5  ---     100/ 100 =100%    0/ 100 =  0%  Destination_Router [192.0.2.1]

Trace complete.

Pathping with Custom Number of Queries:

C:\> pathping -q 5 www.example.com
Tracing route to www.example.com [192.0.2.1]
over a maximum of 30 hops:
0  Your_Computer [192.168.1.1]
1  Router1 [203.0.113.1]
2  Router2 [203.0.113.2]
3  Example_Router [198.51.100.1]
4  ISP_Router [192.0.2.2]
5  Destination_Router [192.0.2.1]

Computing statistics for 125 seconds...
            Source to Here   This Node/Link
Hop  RTT    Lost/Sent = Pct  Lost/Sent = Pct  Address
0                                            Your_Computer [192.168.1.1]
                               0/   5 =  0%   |
1   10ms     0/   5 =  0%    0/   5 =  0%  Router1 [203.0.113.1]
                               0/   5 =  0%   |
2   20ms     0/   5 =  0%    0/   5 =  0%  Router2 [203.0.113.2]
                               0/   5 =  0%   |
3   30ms     0/   5 =  0%    0/   5 =  0%  Example_Router [198.51.100.1]
                               0/   5 =  0%   |
4   40ms     0/   5 =  0%    0/   5 =  0%  ISP_Router [192.0.2.2]
                               0/   5 =  0%   |
5   50ms     0/   5 =  0%    0/   5 =  0%  Destination_Router [192.0.2.1]

Trace complete.

1.2.26. winver: Full Microsoft doc here.

The winver command in the Windows command line is used to display the version and build information of the Windows operating system. It provides details such as the edition, version number, and build number.

Command Syntax:

C:\>winver

Sample Usage:

C:\>winver

Microsoft Windows
Version 10.0.xxxx
© Year Microsoft Corporation. All rights reserved.

1.3. Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS).

1.3.1. Task Manager Task Manager is a powerful tool for monitoring and managing system resources, identifying

performance issues, and controlling startup programs. Familiarizing yourself with its features is essential for troubleshooting and optimizing system performance in Windows 10.

Accessing Task Manager:

1.3.1.1. Services Tab

The Services tab in the Windows Task Manager provides information about system services running on your Windows 10 computer. Services are background processes that perform specific functions to support the operating system and applications. For each service you will see several pieces of information:

Key Actions:

Importance in Troubleshooting:

1.3.1.2. Startup Tab

The Startup tab in Task Manager provides information about programs and processes that automatically launch when your computer starts up, and the means to manage them. For each program you will see several pieces of information:

Key Actions:

Use In Troubleshooting:

The Startup tab in Task Manager is important in troubleshooting for several reasons. When encountering issues with system performance, slow boot times, or unexpected behavior, reviewing and managing startup programs can help identify and resolve problems.

1.3.1.3. Performance Tab

The Performance tab in the Windows Task Manager provides a comprehensive overview of the system’s performance metrics and resource usage. It is divided into several sections:

CPU

The CPU section of the Performance tab in Task Manager provides a real-time graphical representation of the system’s CPU usage over time. It includes a dynamic graph illustrating the fluctuation in CPU utilization and a detailed breakdown of individual processes consuming CPU resources. This section is crucial for identifying processes or applications that may be taxing the CPU, allowing users to monitor performance, diagnose potential bottlenecks, and optimize system responsiveness. The color-coded graph and numerical details make it easy to assess the current CPU load and quickly pinpoint resource-intensive tasks.

CPU Monitor 1

Right-Clicking on the graph allows you to overall CPU utilization, and logical processor utilization.

CPU Monitor 2

Memory

In the Memory section of the Performance tab in Task Manager, users can observe the real-time status of the system’s memory usage. The graphical display illustrates the dynamic nature of memory consumption, while detailed information presents the total installed memory, currently in use, and the available memory. This empowers users to make informed decisions to enhance overall system responsiveness and stability.

Memory Monitor

Disk

The Disk section on the Performance tab in Task Manager provides real-time insights into the system’s disk activity. Through a graphical display and data on read and write speeds, users can quickly assess the performance and identify processes impacting disk usage.

Disk Monitor

Network

Under the Performance tab in Task Manager, you’ll find individual subsections for each network interface present on your system, such as Ethernet, Wi-Fi, or any additional network adapters. These subsections offer real-time monitoring of network activity specific to each interface, allowing users to analyze and manage network resources efficiently.

Network Monitor

Each network interface subsection typically includes:

By providing detailed insights into the performance of individual network interfaces, these subsections enable users to monitor network activity, diagnose network-related issues, and optimize network performance as needed.

GPU

The GPU monitoring section in Task Manager provides real-time insights into the usage and performance of the graphics processing unit (GPU) on the system. It displays graphical representations and data on GPU utilization, memory usage, and GPU engine activity. Users can quickly assess GPU performance and identify processes that are utilizing GPU resources.

GPU Monitor

1.3.1.4 Processes Tab

The Processes tab in Task Manager offers detailed insights into the running processes on your Windows 10 system. Processes represent individual programs or services currently active in memory. Understanding and managing processes can aid in troubleshooting system issues, identifying resource-intensive applications, and improving overall system performance.

Process List

The Process List displays a comprehensive list of all running processes, including both user-initiated applications and system services. Each process entry provides valuable information such as:

Managing Processes

Task Manager offers several actions to manage processes effectively, including:

Performance Metrics

The Processes tab also provides real-time performance metrics for CPU and memory usage, allowing users to monitor resource utilization and identify potential bottlenecks. The sortable columns enable users to prioritize processes based on their impact on system performance.

1.3.1.5 Users Tab

The Users tab in Task Manager displays information about active user sessions on the system. It provides insights into user activity, resource usage, and session status, making it a valuable tool for system administrators and troubleshooting purposes.

User Sessions

The User Sessions section lists all active user sessions currently logged into the system. Each session entry includes:

Resource Usage

The Resource Usage section provides insights into resource consumption for each user session, including CPU and memory usage. By monitoring resource usage per session, administrators can identify heavy resource consumers and optimize system performance accordingly.

Session Management

Task Manager offers session management capabilities, allowing administrators to perform actions such as:

The Users tab facilitates efficient user session management, enhancing system security and performance monitoring.

1.3.2. Microsoft Management Console (MMC) Snap-ins

Microsoft Management Console (MMC) snap-ins are powerful administrative tools that allow users to manage various aspects of their Windows 10 system. Each snap-in provides a specialized interface for configuring specific system components and settings.

1.3.2.1. Event Viewer (eventvwr.msc)

The Event Viewer snap-in is a system utility tool used for viewing and managing event logs on Windows systems. Event logs contain information about system events, errors, warnings, and other noteworthy occurrences. This tool is essential for system administrators and advanced users for troubleshooting issues, diagnosing problems, and monitoring system health.

Event Viewer

Access Methods:

1.3.2.2. Disk Management (diskmgmt.msc)

Disk Management snap-in is a Windows utility used for managing disk drives and volumes on your computer. It allows users to perform various disk-related tasks such as creating, deleting, formatting, and resizing partitions. Additionally, Disk Management provides tools for initializing new disks, changing drive letters, and marking partitions as active or inactive.

Access Methods:

1.3.2.3. Task Scheduler (taskschd.msc)

The Task Scheduler snap-in is a utility that enables users to automate tasks and processes on their Windows system. It allows users to schedule programs, scripts, or commands to run at specific times or events, making it useful for automating routine maintenance tasks, backups, and application launches.

Access Methods:

1.3.2.4. Device Manager (devmgmt.msc)

Device Manager snap-in is a system utility tool used for managing hardware devices installed on a Windows system. It provides a centralized interface for viewing and configuring device properties, updating drivers, troubleshooting device issues, and managing device resources.

Access Methods:

1.3.2.5. Certificate Manager (certmgr.msc)

Certificate Manager snap-in is a utility used for managing digital certificates on a Windows system. It allows users to view, import, export, and manage certificates for various purposes, including secure communication, authentication, and encryption.

Access Methods:

1.3.2.6. Local Users and Groups (lusrmgr.msc)

Local Users and Groups snap-in is a management tool used for managing user accounts and group memberships on a local Windows system. It allows administrators to create, modify, and delete user accounts and groups, assign permissions, and manage user passwords.

Access Methods:

1.3.2.7. Performance Monitor (perfmon.msc)

Performance Monitor snap-in is a system monitoring tool used for analyzing and monitoring system performance metrics in real-time. It provides customizable performance counters, graphs, and reports to help identify performance bottlenecks, optimize system resources, and troubleshoot performance issues.

Access Methods:

1.3.2.8. Group Policy Editor (gpedit.msc)

Group Policy Editor snap-in is a management tool used for managing group policies on a Windows system. It provides a centralized interface for configuring security settings, enforcing policies, and controlling user access and permissions across the network.

Access Methods:

1.3.3. Additional Tools

In addition to the Microsoft Management Console (MMC) snap-ins discussed earlier, Windows 10 provides various additional tools that offer functionalities for system information, resource monitoring, system configuration, disk maintenance, and registry management.

1.3.3.1. System Information (msinfo32.exe)

System Information is a built-in Windows utility that provides a comprehensive overview of system hardware, software, and configuration details. It gathers information about the computer’s hardware resources, components, installed software, drivers, and system settings. System Information is useful for troubleshooting hardware issues, verifying system specifications, and gathering information for technical support purposes.

Access Method:

1.3.3.2. Resource Monitor (resmon.exe)

Resource Monitor is a system monitoring tool that provides real-time insights into the usage of system resources such as CPU, memory, disk, and network. It offers detailed information about running processes, active network connections, disk activity, and system performance metrics. Resource Monitor helps users identify resource-intensive applications, diagnose performance issues, and optimize system performance.

Access Method:

1.3.3.3. System Configuration (msconfig.exe)

System Configuration, also known as msconfig, is a system utility that allows users to configure various system startup options and troubleshoot boot-related issues. It provides options to manage startup programs, services, boot settings, and system configuration parameters. System Configuration is useful for optimizing system startup, diagnosing startup problems, and troubleshooting software conflicts.

Access Method:

1.3.3.4. Disk Cleanup (cleanmgr.exe)

Disk Cleanup is a built-in Windows utility that helps users reclaim disk space by removing temporary files, system files, and other unnecessary items from their computer. It scans the system for files that can be safely deleted and provides options to remove them, freeing up valuable disk space. Disk Cleanup is useful for optimizing disk usage, improving system performance, and maintaining system cleanliness.

Access Method:

1.3.3.5. Disk Defragment (dfrgui.exe)

Disk Defragmenter, also known as dfrgui, is a Windows utility that optimizes the layout of files on a disk to improve access times and overall system performance. It rearranges fragmented files and free space on the disk, reducing the time it takes to read and write data. Disk Defragmenter is useful for maintaining disk health, preventing performance degradation, and improving file system efficiency.

Access Method:

1.3.3.6. Registry Editor (regedit.exe)

Registry Editor is a powerful tool that allows users to view, edit, and modify the Windows Registry, a hierarchical database that stores configuration settings and system information. It provides access to registry keys and values, allowing users to customize system settings, tweak system behavior, and troubleshoot registry-related issues. Registry Editor is a critical tool for advanced users and system administrators but should be used with caution as improper changes can potentially damage the system.

Access Method:

1.4. Microsoft Windows 10 Control Panel Utilities

In various scenarios, understanding and utilizing the appropriate Microsoft Windows 10 Control Panel utility can be instrumental. Below are several Control Panel utilities along with their respective functionalities and usage scenarios:

1.4.1. Internet Options

Internet Options is a Control Panel utility that allows users to configure settings related to their internet connection, web browser, and security preferences. It provides options to manage browser history, security settings, privacy settings, and more.

1.4.2. Devices and Printers

Devices and Printers is a Control Panel utility that provides a centralized location to manage all connected devices and printers. It allows users to view, add, remove, and configure both hardware devices and printers.

1.4.3. Programs and Features

Programs and Features is a Control Panel utility that enables users to view and manage installed programs and applications on their Windows 10 system. It provides options to uninstall, repair, or change installed programs.

1.4.4. Network and Sharing Center

Network and Sharing Center is a Control Panel utility that provides a graphical overview of network connections and settings. It allows users to manage network adapters, view network status, set up network connections, and troubleshoot network-related issues.

1.4.5. System

System is a Control Panel utility that provides information about the computer’s hardware, operating system, and system settings. It allows users to view and configure system properties, device manager, remote settings, and more.

1.4.6. Windows Defender Firewall

Windows Defender Firewall is a Control Panel utility that allows users to manage firewall settings and control inbound and outbound network traffic. It provides options to create firewall rules, allow or block specific programs or ports, and customize firewall profiles.

1.4.7. Mail

Mail is a Control Panel utility that allows users to configure and manage email accounts and settings. It provides options to add, remove, or modify email accounts, configure server settings, and customize email preferences.

1.4.8. Sound

Sound is a Control Panel utility that enables users to configure audio devices, playback settings, and recording preferences. It provides options to adjust volume levels, set default audio devices, configure sound enhancements, and troubleshoot audio issues.

1.4.9. User Accounts

User Accounts is a Control Panel utility that allows users to manage user accounts, passwords, and account settings on their Windows 10 system. It provides options to create, delete, or modify user accounts, change passwords, and configure user privileges.

1.4.10. Device Manager

Device Manager is a Control Panel utility that provides a centralized location to view and manage hardware devices installed on the computer. It allows users to update device drivers, disable or enable devices, view device properties, and troubleshoot hardware issues.

1.4.11. Indexing Options

Indexing Options is a Control Panel utility that allows users to manage and customize the indexing settings for the Windows Search feature. It provides options to add or remove indexed locations, modify advanced indexing options, and troubleshoot indexing-related issues.

1.4.12. Administrative Tools

Administrative Tools is a Control Panel utility that provides access to various system administration tools and utilities. It includes tools such as Computer Management, Event Viewer, Task Scheduler, Services, and more.

1.4.13. File Explorer Options

File Explorer Options is a Control Panel utility that allows users to customize and configure settings related to File Explorer, the file management tool in Windows 10. It provides options to show or hide hidden files, display file extensions, configure general file explorer options, and customize view settings.

1.4.13.1. Show Hidden Files

The “Show Hidden Files” option allows users to toggle the visibility of hidden files within File Explorer. Hidden files are typically system files or files that the operating system deems unnecessary for regular user interaction. Enabling this option will display hidden files alongside regular files in File Explorer, making them accessible for viewing or modification.

1.4.13.2. Hide Extensions

The “Hide Extensions” option allows users to toggle the visibility of file extensions within File Explorer. File extensions are the suffixes appended to filenames that denote the file type or format. Enabling this option will hide file extensions for known file types, making filenames appear cleaner and more user-friendly. However, it may also make it harder to differentiate between file types at a glance.

1.4.13.3. General Options

The “General Options” section within File Explorer Options allows users to configure various general settings related to File Explorer behavior. This may include options such as choosing whether to open each folder in the same window or a new window, setting the default folder view, customizing the navigation pane, and configuring file operation settings.

1.4.13.4. View Options

The “View Options” section within File Explorer Options allows users to customize the appearance and layout of File Explorer. It provides options to choose different view styles such as icons, list, details, or tiles, as well as to customize the size and appearance of icons. Users can also configure sorting and grouping options, adjust column widths, and set folder options such as whether to display full path in the title bar.

1.4.14. Power Options

Power Options is a Control Panel utility that allows users to configure power settings and options for their Windows 10 system. It provides options to manage power plans, adjust sleep and hibernate settings, customize power button actions, and optimize power usage.

1.4.14.1. Hibernate

1.4.14.2. Power Plans

1.4.14.3. Sleep/Suspend

1.4.14.4. Standby

1.4.14.5