IT Essentials Chapter 5 Part 2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Zoe1606
Z
Zoe1606
Community Contributor
Quizzes Created: 3 | Total Attempts: 5,249
Questions: 30 | Attempts: 355

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

Cisco IT Study Guide


Questions and Answers
  • 1. 

    If you got the message NTLDR is missing what failed to load?

    Explanation
    The correct answer is "Boot loader". When the message "NTLDR is missing" appears, it means that the boot loader (NTLDR) failed to load. The boot loader is responsible for loading the operating system into memory and initiating its startup process. If the boot loader is missing or corrupted, the computer cannot successfully start up and the error message is displayed.

    Rate this question:

  • 2. 

    When booting the Windows XP operating system which file will be read to find the path to the boot partition?

    Explanation
    During the booting process of Windows XP, the system reads the boot.ini file to locate the path to the boot partition. The boot.ini file is a system file that contains essential configuration information for the operating system's boot process. It provides details about the available operating systems on the computer, their locations, and the options for booting them. By reading the boot.ini file, Windows XP can determine the correct path to the boot partition and proceed with the booting process accordingly.

    Rate this question:

  • 3. 

    What is the name of the hierarchical database containing all of the information needed by the windows operating system?

    Explanation
    The correct answer is NT Kernal,NTOKRNL.EXE. The NT Kernel is a fundamental component of the Windows operating system that provides essential services and manages system resources. NTOKRNL.EXE is the executable file associated with the NT Kernel. It contains the core functionalities required for the proper functioning of the Windows OS, including memory management, process management, and device drivers. Together, the NT Kernel and NTOKRNL.EXE form the hierarchical database that stores all the necessary information for the Windows operating system to operate effectively.

    Rate this question:

  • 4. 

    What is the command to edit the registry?

    Explanation
    The command to edit the registry is regedit.exe or regedt32. Both of these commands are used to access and modify the Windows registry, which is a centralized database that stores important settings and configurations for the operating system and installed applications.

    Rate this question:

  • 5. 

    Which quick fix can the user implement to return to the previous working state?

    • A.

      Safe mode

    • B.

      Safe mode with internet access

    • C.

      Last known good configuration

    Correct Answer
    C. Last known good configuration
    Explanation
    The user can implement the "Last known good configuration" quick fix to return to the previous working state. This option allows the computer to start using the most recent settings that worked properly, effectively undoing any recent changes or errors that may have caused the issue. It is a reliable way to troubleshoot and restore the system to a stable state without the need for more extensive troubleshooting steps.

    Rate this question:

  • 6. 

    What is the root level of the windows partition called?

    • A.

      Drive C:/

    • B.

      Drive A:/

    • C.

      Drive B:/

    • D.

      Drive D:/

    Correct Answer
    A. Drive C:/
    Explanation
    The root level of the Windows partition is called Drive C:/ because traditionally, the C drive is the default drive letter assigned to the primary partition where the operating system is installed. It is the main storage location for the Windows operating system and other essential system files.

    Rate this question:

  • 7. 

    Is the slash (\) permitted in the name of a file?

    Correct Answer
    No
    Explanation
    The slash (\) is not permitted in the name of a file. This is because the slash is a reserved character in file naming conventions and is typically used to separate directories or folders in a file path. Using a slash in a file name can cause confusion and may lead to errors when trying to access or manipulate the file. It is recommended to avoid using special characters like slashes in file names to ensure compatibility and proper functioning of the file system.

    Rate this question:

  • 8. 

    What is the file extension used for an ASCII text only file?

    Correct Answer
    .txt
    Explanation
    The file extension .txt is used for an ASCII text only file. This extension indicates that the file contains plain text data that can be read and edited using a basic text editor. ASCII (American Standard Code for Information Interchange) is a character encoding standard that represents text in computers and other devices. By using the .txt extension, it is clear that the file is in a format that is compatible with a wide range of software applications and operating systems.

    Rate this question:

  • 9. 

    What occurs if an attempt is made to delete a system file?

    • A.

      Automatically sends to recycle bin

    • B.

      A warning is given

    • C.

      A beep noise

    Correct Answer
    B. A warning is given
    Explanation
    When an attempt is made to delete a system file, a warning is given. This warning serves as a precautionary measure to inform the user about the potential consequences of deleting a system file. System files are essential for the proper functioning of the operating system, and deleting them can lead to system instability or malfunction. Therefore, the warning is intended to prevent accidental deletion and to ensure that users are aware of the potential risks involved.

    Rate this question:

  • 10. 

    What is a * called?

    Correct Answer
    wildcard
    Explanation
    A * is called a wildcard. A wildcard is a symbol that represents any character or group of characters in a search or matching pattern. In computer programming and file systems, the * is commonly used as a wildcard to match multiple characters or any string of characters. It allows for flexible and efficient searching and pattern matching, as it can be used to represent unknown or variable parts of a string.

    Rate this question:

  • 11. 

    What command is used to convert partitions from FAT32 to NTFS

    Correct Answer
    convert.exe
    Explanation
    The command "convert.exe" is used to convert partitions from FAT32 to NTFS. This command is specifically designed for this purpose and allows the user to change the file system of a partition without losing any data. By running the "convert.exe" command, the user can easily convert a FAT32 partition to NTFS, which is a more advanced and secure file system with better performance and features.

    Rate this question:

  • 12. 

    What navigation tool is text based?

    Correct Answer
    CLI
    Command line interface
    Explanation
    The correct answer is CLI, which stands for Command Line Interface. A CLI is a text-based navigation tool that allows users to interact with a computer system by typing commands instead of using a graphical user interface (GUI). It provides a way to navigate and control the system through a command prompt, making it a text-based alternative to graphical navigation tools.

    Rate this question:

  • 13. 

    What menu has the following five tabs: Themes, Desktop, Screen Saver, Appearance and settings?

    Correct Answer
    Desktop properties
    Explanation
    The menu that has the five tabs mentioned (Themes, Desktop, Screen Saver, Appearance and settings) is the Desktop properties menu. This menu allows users to customize various aspects of their desktop, such as the theme, wallpaper, screen saver, and appearance settings.

    Rate this question:

  • 14. 

    What are the small programs in the control panel called?

    Correct Answer
    Applets
    Explanation
    The small programs in the control panel are called applets. Applets are small software applications that are designed to perform specific tasks or provide specific functionality within a larger software system. In the context of the control panel, these applets are responsible for managing and controlling various settings and features of the operating system or software. They allow users to customize their system preferences, manage devices, and access system utilities.

    Rate this question:

  • 15. 

    Where are the automatic updates found?

    Correct Answer
    Control panel applets
    Explanation
    Automatic updates can be found in the Control Panel applets. Control Panel applets are small programs that allow users to view and change settings on their computer. These applets are typically organized into categories, and one of the categories is often dedicated to system updates and settings. Within this category, users can find the option to enable or disable automatic updates for their operating system or other software installed on their computer.

    Rate this question:

  • 16. 

    If you use the following path what will you get to? Start>Control Panel>System>Hardware>Device Manager>View>Resources

    Correct Answer
    system resources
    Explanation
    By following the given path, you will reach the "Resources" section in the Device Manager. In this section, you can view and manage the system resources allocated to various hardware devices connected to your computer. This includes information about IRQ (Interrupt Request), I/O (Input/Output) addresses, and Memory ranges assigned to each device. Monitoring and managing system resources can help in troubleshooting device conflicts and optimizing the overall performance of your computer.

    Rate this question:

  • 17. 

    What allows you to monitor the performance of the CPU and virtual memory, view all processes that are currently running and view information about the network connections?

    Correct Answer
    Task Manager
    Explanation
    Task Manager is a system utility in Windows operating systems that allows users to monitor the performance of the CPU and virtual memory. It provides real-time information about the processes that are currently running on the system, including their CPU and memory usage. Additionally, Task Manager allows users to view information about network connections, such as active connections, listening ports, and network utilization. Overall, Task Manager is a handy tool for monitoring and managing system resources and processes.

    Rate this question:

  • 18. 

    Why does Microsoft recommend that users always use the add or remove programs utility when installing and removing programs?

    • A.

      To show you have a program is uninstalled

    • B.

      So the installation can be uninstalled completely

    • C.

      So they can track all of your programs

    Correct Answer
    B. So the installation can be uninstalled completely
    Explanation
    Microsoft recommends using the add or remove programs utility when installing and removing programs because it ensures that the installation can be uninstalled completely. This utility allows for a clean and thorough removal of the program, eliminating any leftover files or registry entries that may cause conflicts or system issues. By using this utility, users can avoid potential problems and ensure a smooth uninstallation process.

    Rate this question:

  • 19. 

    What is the command to upgrade a computer from Windows 2000 to Windows XP? (D:\i386\

    Correct Answer
    winnt32
    Explanation
    The command "winnt32" is used to upgrade a computer from Windows 2000 to Windows XP. This command is typically run from the D:\i386\ directory, which contains the necessary installation files for Windows XP. By running this command, the upgrade process is initiated, allowing the user to upgrade their operating system from Windows 2000 to Windows XP.

    Rate this question:

  • 20. 

    What utility in Windows XP checks the integrity of files and folders and scans the hard drive for physical errors?

    Correct Answer
    Scandisk
    Chkdisk
    Explanation
    Scandisk and Chkdisk are both utilities in Windows XP that perform similar functions. They check the integrity of files and folders and scan the hard drive for physical errors. Scandisk is a graphical user interface (GUI) tool that provides a user-friendly interface for performing these tasks. On the other hand, Chkdisk is a command-line tool that performs the same functions but is typically used by more advanced users who prefer working with the command prompt. Both utilities are used to identify and fix errors on the hard drive to ensure its proper functioning.

    Rate this question:

  • 21. 

    What utility gathers the noncontinuous data into one place, making files run faster?

    Correct Answer
    Defrag
    Explanation
    Defrag, short for defragmentation, is a utility that gathers scattered or noncontinuous data on a computer's hard drive and organizes it into a contiguous form. This process helps to improve the efficiency and speed of file access and execution. By rearranging the fragmented data, defrag reduces the time it takes for the computer to locate and retrieve files, resulting in faster performance.

    Rate this question:

  • 22. 

    What is the command to turn on automatic updates? Start>Control Panel>System>

    Correct Answer
    Automatic updates
    Explanation
    The command to turn on automatic updates is located in the Control Panel under the System settings. By enabling automatic updates, the system will automatically download and install updates from the internet, ensuring that the operating system and other software are up to date with the latest patches and improvements.

    Rate this question:

  • 23. 

    What are three situations when a technician should create a restore point?Before ___________ or replacing the operating system When an application is _____________When a _____________ is installed

    Correct Answer
    Updating Installed Driver
    Explanation
    A technician should create a restore point before updating an installed driver. This is because updating drivers can sometimes cause compatibility issues or system instability. By creating a restore point, the technician can revert back to the previous driver version if any problems occur after the update.

    Rate this question:

  • 24. 

    What creates an emergency repair disk in Windows XP?

    Correct Answer
    ASR Wizard
    Automatic system recovery
    Explanation
    The ASR Wizard and Automatic System Recovery (ASR) are both features in Windows XP that create an emergency repair disk. The ASR Wizard guides the user through the process of creating a disk that can be used to recover the system in the event of a critical failure. Automatic System Recovery, on the other hand, automatically creates a backup of critical system files and settings, including the emergency repair disk, which can be used to restore the system to a previous working state.

    Rate this question:

  • 25. 

    What is another name for a normal backup?

    Correct Answer
    Full Backup
    Explanation
    A full backup is another term used to refer to a normal backup. In a full backup, all the selected files and data are copied and stored in a separate location. This type of backup provides a complete snapshot of the system at a specific point in time, ensuring that all data is protected. Full backups are often performed periodically or as a baseline for other backup types, such as incremental or differential backups.

    Rate this question:

  • 26. 

    What copies all the files and folders that have been modified since the last full backup?

    Correct Answer
    Copy backup
    Explanation
    A copy backup copies all the files and folders that have been modified since the last full backup. It creates a duplicate of the data without marking it as a backup. This means that the copied files and folders are not considered as part of the backup set and can be accessed separately. Copy backups are useful for creating additional copies of important data without affecting the existing backup schedule or retention policies.

    Rate this question:

  • 27. 

    What type of media is used to back up data on a server?

    Correct Answer
    Tape Drives
    Explanation
    Tape drives are used to back up data on a server. Tape drives are a type of media storage device that uses magnetic tape to store and retrieve data. They are commonly used for long-term data storage and backup purposes due to their large storage capacity and durability. Tape drives provide a reliable and cost-effective solution for backing up data on servers, ensuring that valuable information is securely stored and easily recoverable in case of data loss or system failure.

    Rate this question:

  • 28. 

    Whats the first step in troubleshooting?Gather__________ from the customer

    Correct Answer
    Data
    Explanation
    The first step in troubleshooting is to gather data from the customer. This is important because it helps to understand the issue they are facing and provides valuable information for further analysis. By collecting data such as error messages, symptoms, and any recent changes or events, it becomes easier to identify potential causes and develop an effective solution. Gathering data from the customer is crucial in order to gain insight into the problem and ensure a successful troubleshooting process.

    Rate this question:

  • 29. 

    What is the second step?Verify the __________ issues

    Correct Answer
    obvious
    Explanation
    The second step is to verify the obvious issues. This means checking and confirming any problems or concerns that are clearly apparent or easily noticeable. By doing so, it ensures that any obvious issues are acknowledged and addressed before moving on to the next step or stage of the process.

    Rate this question:

  • 30. 

    What is the last step?______________ with the customer

    Correct Answer
    close
    Explanation
    The last step is to close with the customer. This means ending the conversation or interaction with the customer in a professional and satisfactory manner. It may involve summarizing the discussion, confirming any agreements or actions, and ensuring that the customer's needs have been met. Closing with the customer is important for providing a positive customer experience and maintaining good customer relations.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 05, 2009
    Quiz Created by
    Zoe1606
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.