1.
With ____________________ user
profiles, settings established by a user at one computer
are stored in a file on a file server on the network and shared with all
computers in the workgroup.
Correct Answer
B. Roaming
Explanation
The administrator uses one or more of the following to manage user profiles: group profiles, roaming user profiles, and mandatory user profiles. These management profiles are created using the Computer Management console under the Administrative Tools applet in the Control Panel.
2.
The Defrag command examines a hard drive or disk
for ____________________ files (files
written to a disk in noncontiguous clusters) and rewrites these files to the
disk or drive in contiguous clusters.
Correct Answer
D. Fragmented
Explanation
It's kind of right there in the name.
3.
____________________
Desktop allows a user to connect to and use their Windows XP computer
from anywhere on the Internet.
Correct Answer
A. Remote
Explanation
Remote Desktop: A program that allows a user to connect to and use their Windows XP computer from anywhere on the Internet.
4.
To limit how much disk
space a user account can access, an administrator can set disk ____________________.
Correct Answer
C. Quotas
Explanation
Disk quotas can only be set on an NTFS volume
5.
In a(n) ____________________
backup, all files that have been created or changed since the last full or
incremental backup are backed up, and files are not marked as backed up.
Correct Answer
D. Differential
Explanation
The two best ways to schedule backups are a combination of full backups and incremental backups, or a combination of full backups and differential backups.
6.
The ____________________ file is a hidden text
file stored in the root directory of the active partition that Ntldr reads to
see what operating systems are available and how to set up the boot.
Correct Answer
A. Boot.ini
Explanation
The Boot.ini file is a hidden file read by Ntldr during the boot process. The Boot.ini file comprises two sections: the [boot loader] section and the [operating systems] section.
7.
Windows keeps the Last Known Good configuration
in the ____________________ .
Correct Answer
A. Registry
Explanation
Last Known Good Configuration: stored in the registry
8.
Use the ____________________ command to view,
create, and delete partitions.
Correct Answer
C. Diskpart
Explanation
Diskpart is a command-line hard disk partitioning utility included in versions of the Windows NT operating system line from Windows 2000 onwards, replacing fdisk which was used in MS-DOS based operating systems.
9.
To access the Windows System Configuration
Utility, enter ___________________ in the Run dialog box
Correct Answer
D. Msconfig
Explanation
MSConfig, or Microsoft System Configuration Utility, (or simply System Configuration in Windows Vista and Windows 7) is a utility to troubleshoot the Windows startup process.
10.
True or False: You can increase a computer's security by requiring a password prompt prior to POST.
Correct Answer
A. True
Explanation
You can set the password in BIOS, but it can be reset by manually adjusting DIP switches on the motherboard.
11.
A(n) ____________________ file is a file that
does not appear in the directory list
Correct Answer
D. Hidden
Explanation
whether to hide or display a file is one of the file’s attributes kept by the OS.
12.
How do you interact with the computer in a DOS like environment?
Correct Answer
A. Cmd
Explanation
cmd.exe is a Windows program that acts as a DOS-like command line interpreter
13.
With a command line interface, you would use the ____________________ command to list
files and directories.
Correct Answer
dir
DIR
Dir
dir:
DIR:
Explanation
Dir: lists files and directories
14.
True or False: Autoexec is a batch file
Correct Answer
A. True
Explanation
AUTOEXEC.BAT is a system file found originally on the MS-DOS operating system. It is a plain-text batch file that is located in the root directory of the boot device. The name of the file stands for "automatic execution".
15.
The ____________________ command is used to
prepare a hard drive for first use in Win 9x machines.
Correct Answer
C. Fdisk
Explanation
Windows 2000 and later do not use fdisk, they have the Logical Disk Manager feature, as well as DiskPart.
16.
Applications call on the OS
to access hardware or other software by using a(n) ____________________ call
Correct Answer
A. API
Explanation
An application programming interface (API) is an interface implemented by a software program to enable interaction with other software.
17.
The Windows Virtual Memory
Manager moves 4K segments, called ____________________, in and out of physical
RAM.
Correct Answer
C. Pages
Explanation
Paging is an important part of virtual memory implementation in most contemporary general-purpose operating systems, allowing them to use disk storage for data that does not fit into physical Random-access memory (RAM)
18.
True or False: If a computer user logged in under a restricted account instead of an administrator account, their computer would be less likely to suffer from viruses.
Correct Answer(s)
A. True
B. False
Explanation
While a user is protected to a certain degree by restricting their administrator access, they still can introduce viruses, etc. into the system.
19.
A(n) ____________________
is a device that amplifies signals on a network.
Correct Answer
B. Repeater
Explanation
A repeater is a device that amplifies signals on a network so they can be transmitted further down the line.
20.
All wireless phone systems,
including cellular, use ____________________ transmission, which means
both persons in a conversation can talk or transmit at the same time
Correct Answer
A. Full duplex
Explanation
Full duplex describes communication that happens in two directions at the same time. inverted suplex is a wrestling move, and hapax legomenon is a word which occurs only once in the written record of a language.
21.
A(n) ____________________
is a computer or other device that allows a computer on one network to communicate
with a computer on another network
Correct Answer
D. Gateway
Explanation
Gateway: A computer or other device that connects networks.
22.
____________________ is the protocol used for the World Wide
Web and used by Web browsers and Web servers to communicate in sessions.
Correct Answer
B. HTTP
Explanation
HTTP (Hypertext Transfer Protocol) is the communications protocol used by the World Wide Web.
23.
___________________ is the system management protocol used to monitor and manage network traffic
on a workstation.
Correct Answer
D. SNMP
Explanation
The Simple Network Management Protocol (SNMP) is used mostly in network management systems to monitor for conditions that warrant administrative attention.
24.
____________________ is a
protocol that is used by Internet or intranet telephone networks to
provide voice communication over a network.
Correct Answer
B. VOIP
Explanation
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks.
25.
____________________
proves that an individual is who he says he is and is accomplished by a
variety of techniques, including a username, password, personal
identification number (PIN), smart card, or biometric data.
Correct Answer
B. Authentication
Explanation
You have to authenticate who you are before you are authorized to do anything.
26.
_____________ software detects a known virus by looking for
distinguishing characteristics called signatures.
Correct Answer
C. Anti-virus
Explanation
AV software are utility programs that prevent infection or scan a system to detect and remove viruses.
27.
What is phishing?
Correct Answer
A. A situation where a user is tricked to giving out personal information
Explanation
Phishing is a form of social engineering where a malicious user fishes for information. It has nothing to do with some hipster band from vermont.
28.
Using
regular RAM for video is called video sharing or shared
Correct Answer
D. Memory
Explanation
Shared Memory Architecture (SMA) refers to a design where the graphics chip does not have its own dedicated memory, and instead shares the main system RAM with the CPU and other components.
29.
True or False: A notebook contains the
normal PCI Express, PCI, and ISA expansion slots found in desktop systems.
Correct Answer
B. False
Explanation
netbooks usually do not have any disk drives, other than their hard drive.
30.
____________________, sometimes called personal PCs or
handheld PCs, provide greater ease of use for simple tasks such as
checking addresses, viewing stock prices, or recording and receiving short
messages.
Correct Answer
C. PDAs
Explanation
PDA (personal digital assistant): A small, HANDHELD computer that has its own operating system and applications.