Powershell in Depth

Total Page:16

File Type:pdf, Size:1020Kb

Powershell in Depth Covers PowerShell 3.0 An administrator’s guide Don Jones Richard Siddaway Jeffery Hicks MANNING www.it-ebooks.info PowerShell in Depth www.it-ebooks.info www.it-ebooks.info PowerShell in Depth AN ADMINISTRATOR’S GUIDE DON JONES RICHARD SIDDAWAY JEFFERY HICKS MANNING SHELTER ISLAND www.it-ebooks.info For online information and ordering of this and other Manning books, please visit www.manning.com. The publisher offers discounts on this book when ordered in quantity. For more information, please contact Special Sales Department Manning Publications Co. 20 Baldwin Road PO Box 261 Shelter Island, NY 11964 Email: [email protected] ©2013 by Manning Publications Co. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps. Recognizing the importance of preserving what has been written, it is Manning’s policy to have the books we publish printed on acid-free paper, and we exert our best efforts to that end. Recognizing also our responsibility to conserve the resources of our planet, Manning books are printed on paper that is at least 15 percent recycled and processed without the use of elemental chlorine. Manning Publications Co. Development editor: Cynthia Kane 20 Baldwin Road Copyeditor: Liz Welch PO Box 261 Technical proofreader: Aleksandar Nikolic Shelter Island, NY 11964 Proofreader: Linda Recktenwald Typesetter: Dennis Dalinnik Cover designer: Marija Tudor ISBN: 9781617290558 Printed in the United States of America 1 2 3 4 5 6 7 8 9 10 – MAL – 19 18 17 16 15 14 13 www.it-ebooks.info brief contents PART 1 POWERSHELL FUNDAMENTALS . .....................................1 1 ■ Introduction 3 2 ■ PowerShell hosts 7 3 ■ Using the PowerShell help system 17 4 ■ The basics of PowerShell syntax 29 5 ■ Working with PSSnapins and modules 39 6 ■ Operators 46 7 ■ Working with objects 60 8 ■ The PowerShell pipeline 93 9 ■ Formatting 111 PART 2 POWERSHELL MANAGEMENT ......................................127 10 ■ PowerShell Remoting 129 11 ■ Background jobs and scheduling 160 12 ■ Working with credentials 174 13 ■ Regular expressions 184 14 ■ Working with HTML and XML data 196 v www.it-ebooks.info vi BRIEF CONTENTS 15 ■ PSDrives and PSProviders 210 16 ■ Variables, arrays, hash tables, and scriptblocks 224 17 ■ PowerShell security 244 18 ■ Advanced PowerShell syntax 257 PART 3 POWERSHELL SCRIPTING AND AUTOMATION ...............275 19 ■ PowerShell’s scripting language 277 20 ■ Basic scripts and functions 291 21 ■ Creating objects for output 301 22 ■ Scope 317 23 ■ PowerShell workflows 332 24 ■ Advanced syntax for scripts and functions 359 25 ■ Script modules and manifest modules 379 26 ■ Custom formatting views 391 27 ■ Custom type extensions 403 28 ■ Data language and internationalization 417 29 ■ Writing help 429 30 ■ Error handling techniques 435 31 ■ Debugging tools and techniques 447 32 ■ Functions that work like cmdlets 466 33 ■ Tips and tricks for creating reports 485 PART 4 ADVANCED POWERSHELL ...........................................495 34 ■ Working with the Component Object Model (COM) 497 35 ■ Working with .NET Framework objects 505 36 ■ Accessing databases 517 37 ■ Proxy functions 525 38 ■ Building a GUI 538 39 ■ WMI and CIM 557 40 ■ Best practices 584 www.it-ebooks.info contents preface xxi acknowledgments xxiii about this book xxv about the authors xxvii about the cover illustration xxix PART 1 POWERSHELL FUNDAMENTALS. ..........................1 Introduction 3 1 1.1 Who this book is for 3 1.2 What this book will teach you 4 1.3 What this book won’t teach you 4 1.4 Where we drew the line 5 1.5 Beyond PowerShell 5 1.6 Ready? 6 PowerShell hosts 7 2 2.1 32-bit vs. 64-bit, and administrator vs. not 8 2.2 The console 10 2.3 The PowerShell ISE 12 vii www.it-ebooks.info viii CONTENTS 2.4 Command history buffer vs. PowerShell’s history 15 2.5 Transcripts 16 2.6 Summary 16 Using the PowerShell help system 17 3 3.1 The help commands 17 3.2 Where’s the help? 18 3.3 Using the help 20 3.4 “About” help files 23 3.5 Provider help 24 3.6 Interpreting command help 25 3.7 Common parameters 27 3.8 Summary 28 The basics of PowerShell syntax 29 4 4.1 Commands 30 Aliases: nicknames for commands 31 ■ Command name tab completion 32 4.2 Parameters 32 Truncating parameter names 34 ■ Parameter name tab completion 35 4.3 Typing trick: line continuation 35 4.4 Parenthetical commands and expressions 36 4.5 Script blocks 37 4.6 Summary 38 Working with PSSnapins and modules 39 5 5.1 There’s only one shell 39 5.2 PSSnapins vs. modules 40 5.3 Loading, autoloading, and profiles 41 5.4 Using extensions 41 Discovering extensions 41 ■ Loading extensions 43 Discovering extensions’ additions 43 ■ Managing extensions 44 5.5 Command name conflicts 44 5.6 Managing module autoloading 45 5.7 Summary 45 www.it-ebooks.info CONTENTS ix Operators 46 6 6.1 Logical and comparison operators 47 The –contains operator 48 ■ The -in and -notin operators 49 Boolean, or logical, operators 50 ■ Bitwise operators 51 6.2 Arithmetic operators 53 6.3 Other operators 55 String and array manipulation operators 55 Object type operators 56 ■ Format operator 57 Miscellaneous operators 58 6.4 Summary 59 Working with objects 60 7 7.1 Introduction to objects 61 7.2 Members: properties, methods, and events 63 7.3 Sorting objects 68 7.4 Selecting objects 69 Use 1: choosing properties 70 ■ Use 2: choosing a subset of objects 71 ■ Use 3: making custom properties 73 Use 4: extracting and expanding properties 75 Use 5: choosing properties and a subset of objects 79 7.5 Filtering objects 79 Simplified syntax 79 ■ Full syntax 81 7.6 Grouping objects 81 7.7 Measuring objects 83 7.8 Enumerating objects 84 Full syntax 85 ■ Simplified syntax 85 7.9 Importing, exporting, and converting objects 86 7.10 Comparing objects 90 7.11 Summary 92 The PowerShell pipeline 93 8 8.1 How the pipeline works 93 The old way of piping 94 ■ The PowerShell way of piping 95 8.2 Parameter binding ByValue 96 8.3 Pipeline binding ByPropertyName 98 8.4 Troubleshooting parameter binding 104 www.it-ebooks.info x CONTENTS 8.5 When parameter binding lets you down 109 8.6 The pipeline with external commands 110 8.7 Summary 110 Formatting 111 9 9.1 The time to format 111 9.2 The formatting system 113 Is there a predefined view? 113 ■ What properties should be displayed? 113 ■ List or table? 114 9.3 The Format cmdlets 114 Formatting wide lists 114 ■ Formatting tables 115 Formatting lists 120 ■ Same objects, different formats 122 9.4 Eliminating confusion and “gotchas” 122 Formatting is the end of the line 122 ■ Select or format? 123 Format, out, export—which? 124 9.5 Summary 125 PART 2 POWERSHELL MANAGEMENT ..........................127 PowerShell Remoting 129 10 10.1 The many forms of remote control 130 10.2 Remoting overview 130 Authentication 131 ■ Firewalls and security 132 10.3 Using Remoting 132 Enabling Remoting 132 ■ 1-to-1 Remoting 133 1-to-many Remoting 134 ■ Remoting caveats 136 Remoting options 138 10.4 PSSessions 140 Creating a persistent session 140 ■ Using a session 140 Managing sessions 141 ■ Disconnecting and reconnecting sessions 141 10.5 Advanced session techniques 144 Session parameters 144 ■ Session options 145 10.6 Creating a custom endpoint 145 Custom endpoints for delegated administration 147 www.it-ebooks.info CONTENTS xi 10.7 Connecting to nondefault endpoints 148 10.8 Enabling the “second hop” 149 10.9 Setting up WinRM listeners 150 10.10 Other configuration scenarios 152 Cross-domain Remoting 152 ■ Quotas 153 ■ Configuring on a remote machine 154 ■ Key WinRM configuration settings 154 Adding a machine to your Trusted Hosts list 155 ■ Using Group Policy to configure Remoting 156 10.11 Implicit Remoting 157 10.12 Summary 159 Background jobs and scheduling 160 11 11.1 Remoting-based jobs 160 Starting jobs 161 ■ Checking job status 162 ■ Working with child jobs 162 ■ Waiting for a job 164 ■ Stopping jobs 164 Getting job results 164 ■ Removing jobs 165 Investigating failed jobs 166 11.2 WMI jobs 166 11.3 Scheduled jobs 167 Scheduled jobs overview 168 ■ Creating a scheduled job 168 Managing scheduled jobs 169 ■ Working with scheduled job results 170 11.4 Job processes 170 Jobs created with Start-Job 171 ■ Jobs created with Invoke-Command 172 ■ Jobs created through the WMI cmdlets 173 ■ Jobs created through the scheduler 173 11.5 Summary 173 Working with credentials 174 12 12.1 About credentials 175 12.2 Using credentials 178 12.3 Crazy credentials ideas 179 Packaging your script 179 ■ Saving a credential object 179 Creating a credential without the GUI 181 Supporting credentials in your script 181 12.4 Summary 183 www.it-ebooks.info xii CONTENTS Regular expressions 184 13 13.1 Basic regular expression syntax 185 13.2 The –match operator 188 13.3 The select-string cmdlet 190 13.4 Switch statement 190 13.5 The REGEX object 192 13.6 Summary 195 Working with HTML and XML data 196 14 14.1 Working with HTML 196 Retrieving an HTML page 197 ■ Working with the HTML results 198 ■ Practical example 201 Creating HTML output 202 14.2 Working with XML 206 Using XML to persist data 206 ■ Reading arbitrary XML data 207 ■ Creating XML data and files 208 Using XML XPath queries
Recommended publications
  • Windows Phone App Security for Builders and Breakers
    Windows Phone App Security for builders and breakers Luca De Fulgentis ~ [email protected] May 22nd, 2015 | Amsterdam About /me . Luca De Fulgentis ~ @_daath . Chief Technology Officer at Secure Network . OWASP Mobile Project Contributor . Nibble Security co-founder - blog.nibblesec.org . Consuming brain-power with InfoSec since 2001 2 Agenda . Introduction – Research overview and motivations . Mobile Top Ten for Windows Phone – Examples of real-world vulnerable code – Discussion on potential insecure APIs usage – Secure coding tips for builders . Final considerations Windows Phone App Security 3 Introduction . In 2014 we collected examples of insecure code for Windows Phone apps – Set of 60+ samples, of which 30% of mobile banking apps – Mostly developed with the Silverlight 8.x technology . Statistics on the initial study has been shared with the OWASP Mobile Project for the MTT 2015 definition . Later, we extended our research developing an automated script that allowed downloading 160+ AppX from US and IT regions of the WP Store – We needed to cover WP 8.1 Windows Runtime (WinRT) security as well Windows Phone App Security 4 Introduction – motivations . Too few (public) resources on WP apps security – MWR’s «Navigation a Sea of Pwn?» (SyScan, 2014) - pretty amazing paper on the topic – XDA Forum represents an invaluable source of information . We want both builders and breakers to be happy! – Provide a wide range of common APIs (MSDN) categorized on the basis of MTT 2014 and also define methods and strategies to mitigate these risks . We defined a public catalog of potentially insecure APIs – Focus on C#/XAML apps, still the most relevant development technologies .
    [Show full text]
  • Pass Microsoft 70-697 Exam with 100% Guarantee
    https://www.certbus.com/70-697.html 2021 Latest certbus 70-697 PDF and VCE dumps Download 70-697Q&As Configuring Windows Devices Pass Microsoft 70-697 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: https://www.certbus.com/70-697.html 100% Passing Guarantee 100% Money Back Assurance Following Questions and Answers are all new published by Microsoft Official Exam Center 70-697 Practice Test | 70-697 Study Guide | 70-697 Braindumps 1 / 13 https://www.certbus.com/70-697.html 2021 Latest certbus 70-697 PDF and VCE dumps Download QUESTION 1 You provide IT support for a small startup company. The company wants users to have Read and Write permissions to the company\\'s shared folder. The network consists of a workgroup that uses Windows 10 Enterprise computers. You add each user to a group named NetworkUsers. You need to grant permissions to the share. You have the following requirements: All users must have Read and Write access to existing files. Any new files must allow the creator to modify the new file\\'s permissions. Which two actions should you take? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Grant Modify permissions to the NetworkUsers group on the shared folder. B. Grant Full Control permissions to the Domain Admins group on the shared folder. C. Grant List and Execute permissions to the NetworkUsers group on the shared folder. D. Grant Full Control permissions to the Creator Owner group on the shared folder.
    [Show full text]
  • Wireless GPON ONT
    GPON 4 Ethernet Ports | 1 PON | VoIP | 802.11n | 802.11ac GRG-4260us Wireless GPON ONT The GRG-4260us is an advanced GPON ONT gateway with 1 GPON WAN port, 4 Gigabit Ethernet LAN ports, 2 FXS ports, 1 USB2.0 Host and IEEE802.11 series Wi-Fi. The Wi-Fi not only provides an 802.11n 2T2R 2.4GHz Band which is backward compatible with 802.11g/b but also supports high performance 802.11ac with 3T3R design at 5GHz band. GRG-4260us provides powerful functions which telephone companies have applied on the xDSL CPE IAD device, and remote management utilities (such as TR-069) for network management and maintenance. FEATURES .UPnP, IPv6 compliant .WPA and 802.1x/ WPS 2.0/ Radius Client .PhyR and G.INP .NAT/PAT .Supports TR-069/TR-098/TR-181i2 .IGMP Proxy/ Fast Leave/ Snooping/ Proxy .Configuration backup and restoration .DHCP Server/Client .Web-based management (HTTPS/HTTP) .Embedded SNMP agent .Supports remote administration, automatic .IP/MAC address filtering firmware upgrade and configuration .Static route/ RIP/ RIP v2 routing functions .Integrated 802.11ac AP (backward compatible .DNS Proxy/Relay with 802.11a/n) www.comtrend.com GRG-4260us 4 Ethernet Ports | 1 PON | VoIP | 802.11n | 802.11ac SPECIFICATIONS Hardware Networking Protocols .PPPoE pass-through, Multiple PPPoE sessions on single WAN .GPON X 1 Bi-directional Optical (1310nm/1490nm) .RJ-45 X 4 for LAN, (10/100/1000 Base T) interface .RJ-11 X 2 for FXS (optional) .PPPoE filtering of non-PPPoE packets between WAN and LAN .USB2.0 host X 1 .Transparent bridging between all LAN and WAN interfaces
    [Show full text]
  • Repair up to 32 Major Windows Errors Using a Single Tool R 400/1
    R 400.qxp_March 2018 30/01/2018 14:07 Page 15 Repair Your Windows System R 400/1 Repair Up to 32 Major Windows Errors Using a Single Tool Using the information given in this article you will be able to: Create a restore point to protect your system against damage, Repair up to 32 different errors with just one mouse click, Select and correct a specific Windows problem. No Windows system is error-free! Most people are content to simply tolerate minor Windows bugs, because they don’t have the time to hunt for the cause of the error. But small bugs can quickly spiral out of control, so it is important you deal with them fast. There are many tools on the market that claim to help you fix errors, but lots of them are expensive and don’t actually work. In my PC workshop, I use the Windows Repair tool. You can use this tool to look for errors, correct problematic settings and configure Windows to be more stable. And the best thing is that this tool is completely free. In this article, I’ll show you which errors Windows Repair can solve and how to successfully use this tool in practice. • Perform a Professional Error Check on Your Windows System .............................................................. R 400/2 • Important: Create a System Restore Point Before Applying Any Fixes ........................................................... R 400/3 • Use Windows Repair to Quickly Fix Your System ......... R 400/4 • Additi onal Repair Options in Windows Repair .............. R 400/5 • Back up Your Registry and Create a Restore Point ......
    [Show full text]
  • IBM Endpoint Manager for Remote Control Installation Guide Chapter 1
    IBMEndpointManagerforRemoteControl Installation Guide Version 9.0.0 IBMEndpointManagerforRemoteControl Installation Guide Version 9.0.0 Note Before using this information and the product it supports, read the information in “Notices” on page 115. This edition applies to version 9, release 0, modification level 0 of IBM Endpoint Manager and to all subsequent releases and modifications until otherwise indicated in new editions. Contents Chapter 1. IBM Endpoint Manager for Installing Windows broker support .....63 Remote Control Installation Guide . 1 Installing Linux broker support.......64 Audience ...............1 Versions ................1 Chapter 5. Utility for extracting the Terms used in this guide ..........1 component installation files .....65 Using the additional setup utility .......65 Chapter 2. Overview of the IBM Endpoint Manager for Remote Control system . 3 Chapter 6. Managing the component Using this guide .............5 services ..............67 IBM Endpoint Manager for Remote Control operating Starting, stopping, or restarting the Windows requirements ..............5 components ..............67 A Basic installation ...........6 Starting, stopping, or restarting the Linux Installation with support for firewall and NAT components ..............67 traversal ...............7 Installation with support for remote control Chapter 7. Performing required sessions over the internet .........8 configuration ............69 Server requirements ...........9 Enabling email .............69 Server environment guidelines .......10 Configuring
    [Show full text]
  • JAWS® for Windows Training Bundle Outline
    JAWS® for Windows Training Bundle Outline Introduction to the Training • Overview of topics to be covered in the training • Introduction to the DAISY format and why it is being used PlexTalk® Pocket Introduction • Description of physical layout • Basic functions: play/pause audio, fast forward/rewind, navigate by heading, navigate to different books • Specifics on navigating through the training bundle • Inserting, deleting, and moving to bookmarks VictorReader Stream Introduction • Description of physical layout • Basic functions: play/pause audio, fast forward/rewind, navigate by heading, navigate to different books • Specifics on navigating through the training bundle • Inserting, deleting, and moving to bookmarks Meet the Trainers • Introduction by Ryan and Dan Introduction to JAWS • What is JAWS? • What kinds of things are people able to do with it? • Silencing JAWS • Working with different types of computer keyboards o Laptop and desktop keyboards o Changing the JAWS keyboard layout • The JAWS key • Pressing multikey keyboard commands • Keyboard help mode • Opening and closing JAWS Working with Windows® Controls • Menus o Navigating vertically and horizontally o Opening submenus • Dialog boxes and their various controls o Edit, combo, check, radio, button, and slider o Moving through various controls • The JAWS Startup Wizard o Speech rate, JAWS startup options, keyboard layout, virtual ribbon feature, etc. Introduction to Windows • What is Windows and what is an operating system? • Differences between Windows 7 and 8 and why we
    [Show full text]
  • Windows Live
    Microsoft Your potential. Our passion,"' Windows Live MICROSOFT ONLINE SERVICES •Lsw-EMerccmcnt Use Onty- Law Enforcement Hotline: (425) 722-1299 MSN & windows Live Services: Hotmail & Passport Requests: FAX: (425) 727-3490 FAX: (650) 693-7061 Microsoft Corporation Microsoft Corporation Attention: Attention: Online Services Custodian of Records online Services custodian of Records One Microsoft Way 1065 la Avenida, Building 4 Redmond, WA 98052-6399 Mountain View, CA 94043 Summary of Record Retention Policies Hotmail & MSN E-mail IP Logs 60 days + initial sign in MSN internet Access Connection Logs 60 da\s MSN Groups—US (IP) Logs 60 days MSN Groups — inactive Status 30 days of non-activity MSN Groups — Content Deletion 30 days (!>i)5!~iu:«:iiv[- or ilbaDk'U) MSN Spaces — IIS (IP) Logs 60 days MSN Spaces — Content Deletion 90 days (after ifis;il>leil) Windows Live Messenger Conversations None Passport Varies depending on connection and date range EMERGENCY REQUESTS Microsoft online Services will respond to emergency requests outside of normal business hours if the emergency involves "the immediate danger of death or physical injury to any person..." as defined in 18 u.S.C. § 2702(c)(4) and (b)(8). Emergencies are limited to situations like kidnapping, murder threats, bomb threats, terrorist threats, etc. Legal Documentation Required for Customer Account information and content The Electronic communications Privacy Act (ECPAi (18 u.S.c. § 2701 through 2712) governs what legal documentation is required in order for Microsoft's online services records custodians to disclose customer account information and e-mail content. For most Microsoft Online services: Basic Subscriber information may be Disclosed with a Subpoena.
    [Show full text]
  • Microsoft Corporation
    Before the Federal Trade Commission Washington, DC In the Matter of ) ) Microsoft Corporation. ) _____________________________ ) Complaint and Request for Injunction, Request For Investigation and for Other Relief INTRODUCTION 1. This complaint concerns the privacy implications of the Microsoft XP operating system that is expected to become the primary means of access for consumers in the United States to the Internet. As is set forth in detail below, Microsoft has engaged, and is engaging, in unfair and deceptive trade practices intended to profile, track, and monitor millions of Internet users. Central to the scheme is a system of services, known collectively as “.NET,” which incorporate “Passport,” “Wallet,” and “HailStorm” that are designed to obtain personal information from consumers in the United States unfairly and deceptively. The public interest requires the Commission to investigate these practices and to enjoin Microsoft from violating Section 5 of the Federal Trade Commission Act, as alleged herein. PARTIES 2. The Electronic Privacy Information Center (“EPIC”) is a non-profit, public interest research organization incorporated in the District of Columbia. EPIC’s activities include the review of government and private sector polices and practices to determine their possible impact on the privacy interests of the American public. Among its other activities, EPIC has prepared reports and presented testimony before Congress and administrative agencies on the Internet and privacy issues. 3. The Center for Digital Democracy (“CDD”) is a non-profit organization that represents the interests of citizens and consumers with respect to new media technologies. 4. The Center for Media Education (“CME”) is a national nonprofit, nonpartisan organization dedicated to creating a quality electronic media culture for children, their families, and the community.
    [Show full text]
  • Graduate Nursing Student Handbook 2020-2021
    Graduate Nursing Student Handbook 2021-2022 Chair’s Welcome ............................................................................................................................ 6 Program Director’s Welcome ......................................................................................................... 7 Graduate Nursing Program Learning Objectives……………..…………………………………...8 Masters Essentials ………………………………………………………………………...8 Doctorate Essentials …………………………………………………………….………..9 SALVE REGINA UNIVERSITY DEPARTMENT OF NURSING ............................................ 10 The Mission of the Department of Nursing .......................................................................... …10 Accreditation………………………………………………………………..………………….10 Accessibility of Programs and Services .................................................................................... 11 Student Rights and Responsibilities .......................................................................................... 11 SALVE REGINA ACADEMIC POLICIES ............................................................................... 122 Academic Honor Code ............................................................................................................ 122 Academic Conduct .................................................................................................................. 122 Intellectual Property ................................................................................................................ 133 Plagiarism ...............................................................................................................................
    [Show full text]
  • INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 1 of 8
    INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 1 of 8 INFORMATION TECHNOLOGY CONCEPTS (391) —OPEN EVENT— REGIONAL – 2019 DO NOT WRITE ON TEST BOOKLET TOTAL POINTS _________ (100 points) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification. 2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area. 3. Electronic devices will be monitored according to ACT standards. No more than sixty (60) minutes testing time Property of Business Professionals of America. May be reproduced only for use in the Business Professionals of America Workplace Skills Assessment Program competition. INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 2 of 8 MULTIPLE CHOICE Identify the choice that best completes the statement or answers the question. Mark A if the statement is true. Mark B if the statement is false. 1. Which of the following appears on the right side of any Windows 8 screen when you move your pointer to a right corner? A. Live tile B. Memory Manager C. Charms bar D. System tray 2. Which element of the Windows 7 GUI gives windows a glassy appearance, but also consumes more hardware resources? A. Control panel B. Aero user interface C. Charms interface D. Logic interface 3. The top of a top-down hierarchical structure of subdirectories is called which of the following? A.
    [Show full text]
  • Korean Style Guide
    Korean Style Guide Published: February, 2019 Microsoft Korean Style Guide Contents 1 About this style guide............................................................................................................................................... 4 1.1 Recommended style references .............................................................................................................. 4 2 Microsoft voice .............................................................................................................................................................. 5 2.1 Choices that reflect Microsoft voice ..................................................................................................... 6 2.1.1 Flexibility ........................................................................................................................................................ 6 2.1.2 Word choice................................................................................................................................................. 7 2.1.3 Word-to-word translation.................................................................................................................. 8 2.1.4 Words and phrases to avoid ............................................................................................................ 9 2.1.5 세요 instead of 십시오 ...................................................................................................................... 11 2.2 Sample Microsoft voice text...................................................................................................................
    [Show full text]
  • Cataloging User's Guide
    Voyager® 9.2 Cataloging User’s Guide November 2015 Ex Libris Confidential CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT COPY UNLESS YOU HAVE BEEN GIVEN SPECIFIC WRITTEN AUTHORIZATION FROM EX LIBRIS LTD. This document is provided for limited and restricted purposes in accordance with a binding contract with Ex Libris Ltd. or an affiliate. The information herein includes trade secrets and is confidential. DISCLAIMER The information in this document will be subject to periodic change and updating. Please confirm that you have the most current documentation. There are no warranties of any kind, express or implied, provided in this documentation, other than those expressly agreed upon in the applicable Ex Libris contract. This information is provided AS IS. Unless otherwise agreed, Ex Libris shall not be liable for any damages for use of this document, including, without limitation, consequential, punitive, indirect or direct damages. Any references in this document to third-party material (including third-party Web sites) are provided for convenience only and do not in any manner serve as an endorsement of that third-party material or those Web sites. The third-party materials are not part of the materials for this Ex Libris product and Ex Libris has no liability for such materials. TRADEMARKS ʺEx Libris,ʺ the Ex Libris Bridge to Knowledge , Primo, Aleph, Voyager, SFX, MetaLib, Verde, DigiTool, Rosetta, bX, URM, Alma , and other marks are trademarks or registered trademarks of Ex Libris Ltd. or its affiliates.
    [Show full text]