1.
What does SMTP stand for?
Correct Answer
B. Simple Mail Transport Protocol
Explanation
SMTP stands for Simple Mail Transport Protocol. It is a standard communication protocol used for sending and receiving email messages between servers. SMTP is responsible for the transmission of email messages over the internet, ensuring that they are properly routed and delivered to the intended recipients. It is a widely used protocol that enables the efficient and reliable exchange of emails across different email systems and networks.
2.
What is the free Microsoft program used to remotely administer computers and servers?
Correct Answer
D. Remote Desktop Connection
Explanation
Remote Desktop Connection is the correct answer because it is a free Microsoft program that allows users to remotely administer computers and servers. With Remote Desktop Connection, users can connect to another computer or server over a network and access its desktop, files, and applications as if they were sitting in front of it. This program is commonly used for remote troubleshooting, software installations, and remote support.
3.
What is the standard HTTP port number?
Correct Answer
B. 80
Explanation
The standard HTTP port number is 80. When a client sends an HTTP request to a server, it typically uses port 80 to establish the connection. This is the default port for HTTP communication and is widely supported by web servers and browsers.
4.
Email uses communication protocol:
Correct Answer
A. SMTP
Explanation
SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol used for sending and receiving email messages between servers. SMTP is responsible for the transmission of email messages from the sender's email client to the recipient's mail server. It works in conjunction with other protocols such as POP (Post Office Protocol) or IMAP (Internet Message Access Protocol) for email retrieval. SMTP is widely used across the internet for email communication and is an essential component of the email infrastructure.
5.
What server would you check on if you were able to reach a website by IP address by not by the name?
Correct Answer
C. DNS
Explanation
If you are able to reach a website by its IP address but not by its name, it suggests that there may be an issue with the Domain Name System (DNS). DNS is responsible for translating domain names into IP addresses. In this case, the DNS server would be the one to check as it is responsible for resolving domain names to their corresponding IP addresses.
6.
If I wanted to modify the registry of a computer what command would I use?
Correct Answer
B. Regedit
Explanation
To modify the registry of a computer, the command that would be used is "regedit". The "regedit" command is a built-in Windows utility that allows users to view, modify, and configure the Windows registry, which is a hierarchical database that stores settings and configurations for the operating system and installed applications. By using "regedit", users can make changes to the registry, such as adding, deleting, or modifying registry keys and values, which can affect various aspects of the computer's functionality and behavior.
7.
Which file does Linux use to resolve hostnames?
Correct Answer
C. /etc/host.conf
Explanation
Linux uses the /etc/host.conf file to resolve hostnames. This file contains configuration settings for the hostname resolution process. It specifies the order in which different methods, such as DNS or hosts file, are used to resolve hostnames. The /etc/host.conf file allows users to customize the hostname resolution behavior according to their needs.
8.
You are working in Linux when a program hits a flaw and stops running. Which command can be used to end the process?
Correct Answer
A. Kill
Explanation
The kill command in Linux is used to terminate a process. When a program hits a flaw and stops running, the kill command can be used to forcefully end the process. It sends a signal to the process, instructing it to terminate immediately. This allows the user to regain control over the system and free up system resources that were being used by the faulty program.
9.
A user is logged into a Linux workstation, what is the best way to login to root from a shell prompt?
Correct Answer
C. Su
Explanation
The "su" command is the best way to login to root from a shell prompt in Linux. "su" stands for "switch user" and allows the user to switch to another user account, in this case, the root account. By typing "su" followed by the root password, the user can gain root privileges and access the root account.
10.
What is a cookie?
Correct Answer
C. Internet information File
Explanation
A cookie is a small text file that is stored on a user's computer by a website. It contains information about the user's browsing activity on that website, such as login credentials, preferences, and shopping cart items. This information is used by the website to personalize the user's experience and remember their preferences for future visits. Cookies are not cooking software, a web site, or a hacker file, but rather they are internet information files that help websites track and store user data.
11.
What is Downloading?
Correct Answer
B. Retrieving a file on the internet
Explanation
Downloading refers to the process of retrieving or transferring a file from a remote server or another computer system to one's own device, typically through the internet. This can involve various types of files such as documents, images, videos, or software. It is a common practice for users to download files from the internet onto their devices for various purposes like accessing information, entertainment, or using specific applications.
12.
What is the capacity of a standard formatted PC floppy?
Correct Answer
C. 1.44MB
Explanation
The capacity of a standard formatted PC floppy is 1.44MB. Floppy disks were commonly used as a portable storage medium in the past. They were capable of storing a small amount of data, usually text files, images, or small programs. The 1.44MB capacity refers to the maximum amount of data that could be stored on a single floppy disk. This capacity was sufficient for many basic computing tasks at the time, but it is now considered extremely small compared to modern storage options.
13.
Which command lists files in MS-DOS?
Correct Answer
C. Dir
Explanation
The correct answer is "dir" because in MS-DOS, the "dir" command is used to list the files and directories in the current directory. The "cd" command is used to change the current directory, "ls" is a command used in Unix-based systems, and "list" is not a valid command in MS-DOS.
14.
Which of the following is not an image file?
Correct Answer
C. TMP
Explanation
TMP is not an image file format. JPEG, GIF, and BMP are all common image file formats used to store and display images. TMP typically refers to temporary files that are created and used by various software programs for temporary storage or caching purposes, but it is not specifically used for storing images.
15.
Which of the following is not a DOS network command?
Correct Answer
C. Netcfg
Explanation
The three commands "ping," "winipcfg," and "tracert" are all valid DOS network commands used for different purposes. However, "netcfg" is not a valid DOS network command. It is actually a Windows command used to configure network settings on Windows operating systems.
16.
Which of the below file extensions is not an audio file format?
Correct Answer
D. COM
Explanation
The file extension "COM" is not an audio file format. MP3, AIF, and WAV are all common audio file formats used to store and play audio data. However, "COM" is typically associated with executable files in the Windows operating system, not audio files.
17.
Which of the below is a PC video file extension?
Correct Answer
C. .avi
Explanation
The correct answer is .avi. This is a commonly used video file extension for PC. It stands for Audio Video Interleave and is widely supported by various media players and video editing software.
18.
Which of the below is not a network device?
Correct Answer
A. Core
Explanation
A core is not a network device. In networking, a core refers to the central or main part of a network that connects multiple switches, routers, and other devices. It is responsible for routing and forwarding data within the network. However, it is not a physical device itself, but rather a concept or term used to describe the central infrastructure of a network.
19.
What is IRC short for?
Correct Answer
C. Internet Relay Chat
Explanation
IRC is short for Internet Relay Chat. IRC is a protocol that enables real-time text communication between users over the internet. It allows users to join chat rooms, send messages, and participate in group discussions. The term "chat" in the correct answer indicates that IRC is primarily used for online chatting and communication purposes.
20.
Which of the below will not help your computers security?
Correct Answer
B. VLAN
Explanation
A VLAN (Virtual Local Area Network) is a network technology that allows for the segmentation of a physical network into multiple virtual networks. While VLANs can provide benefits such as improved network performance and increased security by separating traffic, they do not directly contribute to computer security. Computer security is typically enhanced through measures such as firewalls, which monitor and control network traffic, good passwords that protect against unauthorized access, and updated software that patches vulnerabilities. VLANs are more focused on network management and organization rather than computer security.
21.
Which of the below formulas add cells a1 through a5 in Microsoft Excel?
Correct Answer
B. =sum(A1:A5)
Explanation
The correct answer is =sum(A1:A5). This formula uses the SUM function in Excel to add the values in cells A1 through A5. The colon (:) is used to indicate a range of cells, so A1:A5 represents all the cells from A1 to A5. The SUM function then calculates the sum of these cells, resulting in the total value.
22.
Which Linux command sets a files permission?
Correct Answer
B. Chmod
Explanation
The Linux command "chmod" is used to set permissions for files. It allows the user to change the read, write, and execute permissions for the owner, group, and others. By using the "chmod" command followed by the appropriate permission codes, users can control who can access and modify a file.
23.
How many bits in a byte?
Correct Answer
D. 8
Explanation
A byte consists of 8 bits. Each bit can represent a 0 or a 1, and when combined, these bits can represent a larger range of values. Therefore, the correct answer is 8.
24.
Which below file extensions is not a compressed file?
Correct Answer
C. .tar
Explanation
The file extension .tar is not a compressed file. It is a file format used for archiving multiple files into a single file, but it does not compress the files. Compressed file extensions such as .rar and .z are used to reduce the file size by compressing the data. .bin is a binary file format and can also be compressed, but it is not primarily used for compression purposes.
25.
What is another common name for a motherboard?
Correct Answer
D. System board
Explanation
The correct answer is "System board". A motherboard is also commonly referred to as a system board. It is the main circuit board in a computer that holds and connects all the crucial components such as the CPU, memory, and other peripherals.
26.
Where in Windows 7 would I find the Startup and Recovery settings and information?
Correct Answer
B. System Properties under Advanced
Explanation
In Windows 7, the Startup and Recovery settings and information can be found in the System Properties under Advanced. This option allows users to configure settings related to system startup and recovery, such as the default operating system, time to display the list of operating systems, and the location of the startup and recovery files. By accessing the System Properties and navigating to the Advanced tab, users can easily manage these settings and information.
27.
What is the .tbz file extension?
Correct Answer
D. Compressed tar file
Explanation
The .tbz file extension is commonly used for compressed tar files. Tar files are archive files that contain multiple files and directories, while the .tbz extension indicates that the tar file has been further compressed using bzip2 compression. This compression method helps reduce the file size and makes it easier to transfer or store the file. Therefore, the correct answer is "Compressed tar file."
28.
What command comments out a line in a batch file?
Correct Answer
D. Rem
Explanation
The correct answer is "Rem". In batch files, the "Rem" command is used to add comments. It allows users to add explanatory notes or disable specific lines of code without affecting the functionality of the batch file. By using "Rem" followed by a space, anything after it on the same line is considered a comment and is ignored by the computer when executing the batch file.
29.
Which of the below is not an e-mail client?
Correct Answer
B. Opera
Explanation
Opera is not an e-mail client. It is a web browser developed by Opera Software. While Opera does have some email capabilities, it is primarily known and used as a web browser rather than an email client like Eudora, Outlook, and Thunderbird.
30.
What is the original capacity of a standard CD?
Correct Answer
A. 650MB
Explanation
The original capacity of a standard CD is 650MB. This means that the CD can hold up to 650 megabytes of data.
31.
Which part of the computer does an EIDE cable connect to?
Correct Answer
B. Hard disk drive
Explanation
An EIDE cable connects to the hard disk drive. EIDE stands for Enhanced Integrated Drive Electronics, and it is a type of interface used to connect storage devices like hard drives and optical drives to the motherboard of a computer. The EIDE cable allows for data transfer between the hard disk drive and the computer, enabling the computer to read and write data to the hard drive.
32.
What is the name of the below image? Which is a protection scheme that requires visitors to enter the letters and numbers when filling out a form on the Internet.
Correct Answer
A. Captcha
Explanation
The correct answer is "Captcha." Captcha is a protection scheme that requires visitors to enter letters and numbers when filling out a form on the Internet. It is commonly used to prevent automated bots from spamming or submitting malicious data on websites.
33.
Which of the below is not a type of computer memory?
Correct Answer
B. MIMM
Explanation
DIMM, RIMM, and SIMM are all types of computer memory modules. However, MIMM is not a recognized type of computer memory.
34.
Which of the following is not an anti-virus company?
Correct Answer
D. Xargon
Explanation
Xargon is not an anti-virus company because it is not a well-known or recognized name in the field of cybersecurity. AVG, McAfee, and Symantec are all established and reputable companies that specialize in developing and providing anti-virus software and solutions to protect against malware and other online threats. On the other hand, Xargon does not have a presence or reputation in the anti-virus industry, indicating that it is not an anti-virus company.
35.
What MS-DOS command can display hidden files?
Correct Answer
A. Attrib
Explanation
The MS-DOS command "attrib" can display hidden files. This command is used to view or change the attributes of files or directories in MS-DOS. By using the "attrib" command with the appropriate parameters, users can reveal hidden files and folders that are not normally visible in the file explorer.
36.
What is the name of the section of Microsoft Windows shown in the below picture?
Correct Answer
B. Notification area
Explanation
The section of Microsoft Windows shown in the picture is called the "Notification area". It is located on the right side of the taskbar and displays icons for system notifications, such as network connectivity, volume control, and battery status. Users can also customize the notification area to show or hide specific icons and access additional settings and features.
37.
Where are the device drivers settings for Windows stored?
Correct Answer
D. Registry
Explanation
The device drivers settings for Windows are stored in the Registry. The Registry is a hierarchical database that contains configuration settings and options for the operating system, hardware devices, and installed software. It stores information about device drivers, including their settings, configurations, and parameters. By storing these settings in the Registry, Windows can easily access and manage the drivers, allowing for efficient and effective operation of hardware devices on the system.
38.
Which of the below power line issues can cause problems with your computer?
Correct Answer
D. All of the above
Explanation
Line sag, line surge, and line noise can all cause problems with a computer. Line sag refers to a decrease in voltage levels, which can lead to the computer not receiving enough power to function properly. Line surge, on the other hand, is an increase in voltage levels that can damage the computer's components. Lastly, line noise refers to electrical disturbances or interference that can disrupt the computer's performance. Therefore, all of these power line issues have the potential to cause problems with a computer.
39.
Which of the below options is not an iPod Apple has released?
Correct Answer
D. IPod Vision
Explanation
The correct answer is iPod Vision because it is not a model of iPod that Apple has released. Apple has released the iPod Mini, iPod Nano, and iPod Shuffle, but there is no iPod Vision in their lineup.
40.
What is Apache?
Correct Answer
D. Web server
Explanation
Apache is a web server software that allows websites to be hosted on the internet. It is not a browser, computer, or operating system. Apache is widely used due to its reliability, security, and flexibility. It supports various features and protocols, making it a popular choice for hosting websites and serving web content.
41.
What is the input device primarily used with a PDA?
Correct Answer
D. Stylus
Explanation
A stylus is the input device primarily used with a PDA. PDAs, also known as Personal Digital Assistants, are handheld devices that are used for various functions such as note-taking, scheduling, and accessing the internet. A stylus is a pen-like device that allows users to interact with the PDA's touchscreen, enabling them to navigate through menus, input text, and select options. It provides a precise and accurate input method, making it ideal for the small screens and limited space of a PDA.
42.
What is the name of the port in the below picture?
Correct Answer
C. PS/2
Explanation
The correct answer is PS/2. This is because the picture shows a port that is commonly known as a PS/2 port. PS/2 ports are used to connect keyboards and mice to computers. They are round in shape and have either a purple or green color coding. Other options mentioned in the question, such as AT, Mouse, and USB, are not relevant to the picture and do not match the port shown.
43.
What is shown in the below picture?
Correct Answer
C. Jumpers
Explanation
The correct answer is "jumpers". Jumpers are small connectors that can be placed on a set of pins to configure or modify the behavior of a device. They are commonly used in computer hardware to set parameters such as memory speed, device ID, or enable/disable certain features. In the picture, the image shows a set of small connectors placed on pins, indicating the presence of jumpers.
44.
Which of the below Windows utilities allow you to view a drives partition information?
Correct Answer
B. Disk Management
Explanation
Disk Management is a Windows utility that allows users to view a drive's partition information. It provides a graphical interface to manage disks, partitions, and volumes on a computer. With Disk Management, users can view the layout and properties of their hard drives, including the partition style, file system, and available space. They can also create, delete, resize, and format partitions as needed. This utility is particularly useful for managing storage devices and organizing data on a computer system.
45.
Which of the below media types hold the most information?
Correct Answer
A. Blu-ray
Explanation
Blu-ray holds the most information compared to the other media types listed. This is because Blu-ray discs have a higher storage capacity than CDs, DVDs, and floppy diskettes. Blu-ray discs can hold up to 25GB or 50GB of data, depending on the type, while CDs typically hold around 700MB, DVDs hold around 4.7GB or 8.5GB, and floppy diskettes hold only 1.44MB. Therefore, Blu-ray discs can store more data, making them capable of holding the most information.
46.
Which below IP address would be used for a local, Non-Routable network?
Correct Answer
C. 192.168.1.100
Explanation
The IP address 192.168.1.100 would be used for a local, Non-Routable network. This is because it falls within the range of private IP addresses reserved for use within a local network. These addresses are not routable on the internet and are commonly used for internal networks in homes, offices, or other private settings.
47.
Which network protocol is used to send e-mail from server to server?
Correct Answer
D. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) is the correct answer. It is a network protocol used to send email messages from one server to another. SMTP is responsible for the transmission and delivery of email over the internet. It works in conjunction with other protocols like POP3 and IMAP to handle the sending, receiving, and storage of email messages. FTP (File Transfer Protocol) is used for transferring files, SSH (Secure Shell) is used for secure remote login, and POP3 (Post Office Protocol version 3) is used for retrieving email from a mail server.
48.
Which of the below is not a type of computer battery?
Correct Answer
A. BIOS
Explanation
The correct answer is BIOS. BIOS stands for Basic Input/Output System and it is a firmware that is responsible for initializing the hardware of a computer during the boot process. It is not a type of computer battery. CMOS (Complementary Metal-Oxide-Semiconductor), Li-ion (Lithium-ion), and NiMH (Nickel Metal Hydride) are all types of computer batteries commonly used in laptops and other portable devices.
49.
Which of the below has the most capacity?
Correct Answer
D. 100TB
Explanation
The given answer, 100TB, has the most capacity compared to the other options. The unit "TB" stands for terabytes, which is larger than gigabytes (GB), megabytes (MB), and kilobytes (KB). Therefore, 100TB represents a larger amount of storage space than 100GB, 100MB, or 100KB.
50.
What is SSL short for?
Correct Answer
D. Secure Socket Layer
Explanation
SSL is short for Secure Socket Layer. It is a protocol that provides secure communication over the internet. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted or tampered with by unauthorized individuals. It establishes a secure connection by encrypting the data and verifying the identity of the server. SSL is commonly used for secure online transactions, such as online banking, e-commerce, and sensitive data transfers.