The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
How much do you truly know about Windows Admin? Today we’ll be putting you through a gauntlet of questions about the operating system, various system requirements and everything in between to find out just that.
Questions and Answers
1.
Which control panle is used to make changes to your workstation's name?
A.
Multimedia
B.
Display
C.
Network
D.
System
Correct Answer
D. System
Explanation The correct answer is System. The System control panel is used to make changes to your workstation's name. This control panel allows you to modify various settings and configurations related to your computer's operating system, including the computer name. By accessing the System control panel, you can change the name of your workstation to suit your preferences or organizational requirements.
Rate this question:
2.
The taskbar must always be visually present on the bottom of the screen.
A.
True
B.
False
Correct Answer
B. False
Explanation The statement is false because the taskbar can be visually present on any side of the screen, not just the bottom. Users have the flexibility to customize the taskbar's position according to their preferences. They can choose to have it on the left, right, or top of the screen as well.
Rate this question:
3.
When installing Windows XP, you are only given one partition option.
A.
True
B.
False
Correct Answer
B. False
Explanation When installing Windows XP, you are not only given one partition option. Windows XP allows users to choose between different partition options based on their preferences and requirements. Users can create multiple partitions, resize existing partitions, or choose to install Windows XP on an existing partition. This flexibility in partition options allows users to customize their installation process according to their specific needs. Therefore, the given statement is false.
Rate this question:
4.
According to Microsoft, the recommended minimum RAM required to install Windows XP Professional is:
A.
8 MB
B.
128 MB
C.
1,024 MB
D.
4 GB
Correct Answer
B. 128 MB
Explanation The recommended minimum RAM required to install Windows XP Professional is 128 MB. This is because Windows XP Professional is a relatively lightweight operating system compared to newer versions of Windows, and it can run reasonably well with this amount of memory. However, it is important to note that this is the minimum requirement and having more RAM, such as 256 MB or higher, would provide better performance and allow for smoother multitasking.
Rate this question:
5.
According to Microsoft, the recommended minimum hard drive space required to install Windows XP Professional is:
A.
400 MB
B.
800 MB
C.
1.5 GB
D.
25 GB
Correct Answer
C. 1.5 GB
Explanation The correct answer is 1.5 GB. This is the recommended minimum hard drive space required to install Windows XP Professional according to Microsoft.
Rate this question:
6.
According to Microsoft, the recommended minimum processor speed required to install Windows XP Professional is:
A.
300 MHz
B.
850 MHz
C.
2.6 GHz
D.
12 GHz
Correct Answer
A. 300 MHz
Explanation According to Microsoft's official system requirements, the recommended minimum processor speed required to install Windows XP Professional is 300 MHz. While higher processor speeds will enhance performance, 300 MHz is the minimum needed to run the operating system.
Rate this question:
7.
What is the folder name on the installation CD that should be copied to the root of the C: drive immediately after installing Windows XP?
A.
Driver Assistance
B.
Compatibility Assistance
C.
F497
D.
I386
Correct Answer
D. I386
Explanation After installing Windows XP, the folder name "i386" on the installation CD should be copied to the root of the C: drive. This folder contains essential files and drivers necessary for the functioning of the operating system. By copying it to the root of the C: drive, the system can easily access these files when needed, ensuring smooth operation and compatibility with various hardware components.
Rate this question:
8.
If you want to ensure your Windows OS has the lastest updates, the best site to visit is:
A.
Update.mywindows.com
B.
Microsoft.com/updatemyos
C.
Update.microsoft.com
D.
Microsoft.update.com
Correct Answer
C. Update.microsoft.com
Explanation The best site to visit for ensuring the latest updates for Windows OS is update.microsoft.com. This is because Microsoft is the official provider of Windows updates and their website is specifically dedicated to providing these updates. The other options mentioned, such as update.mywindows.com and microsoft.com/updatemyos, are not recognized as official sources for Windows updates.
Rate this question:
9.
Passwords are case sensitive.
A.
True
B.
False
Correct Answer
A. True
Explanation Passwords being case sensitive means that the system differentiates between uppercase and lowercase letters when checking the validity of a password. For example, if a password is "Password123", typing "password123" or "PASSWORD123" would be considered incorrect. Therefore, the correct answer is "True".
Rate this question:
10.
By default, all files written in WordPad have a .txt extension as part of their name when saved.
A.
True
B.
False
Correct Answer
B. False
Explanation WordPad is a text editing program that saves files with a .rtf (Rich Text Format) extension by default, not a .txt extension. Therefore, the given statement is false.
Rate this question:
11.
Which groups would have rights to make a copy of a particular user in order to cross domains?
A.
Power Users
B.
Backup Operators
C.
Users
D.
Replicators
Correct Answer
D. Replicators
Explanation Replicators would have the rights to make a copy of a particular user in order to cross domains. Replicators are a group that is specifically designated for the purpose of replicating directory information between domain controllers in different domains. They are responsible for ensuring that changes made in one domain are replicated to other domains. Therefore, they would have the necessary permissions to create copies of users across domains.
Rate this question:
12.
Which Groups would have rights to unlock a workstation when the person who locked it is no longer available
A.
Administrators
B.
Backup Operators
C.
Users
D.
Replicator
Correct Answer
A. Administrators
Explanation Administrators would have the rights to unlock a workstation when the person who locked it is no longer available. Administrators typically have full control and privileges over a system, including the ability to manage user accounts and access permissions. Therefore, they would have the necessary authority to unlock a workstation in such a situation.
Rate this question:
13.
Which group has rights to make copies of any information with archived property rights checked?
A.
Power Users
B.
Backup Operators
C.
Users
D.
Replicator
Correct Answer
B. Backup Operators
Explanation Backup Operators have the rights to make copies of any information with archived property rights checked. They are specifically designated to perform backup and restore operations on a computer system. This includes the ability to make copies of files and folders, including those with archived property rights. Other user groups such as Power Users, Users, and Replicator do not have the same level of permissions and rights as Backup Operators in this context.
Rate this question:
14.
What group has many of the rights needed to add drivers or some software but not to unlock a workstation?
A.
Power Users
B.
Backup Operators
C.
Users
D.
Replicator
Correct Answer
A. Power Users
Explanation Power Users is the correct answer because this group in a computer system has the necessary rights and permissions to add drivers or software to the system. However, they do not have the authority to unlock a workstation, which is a separate privilege typically reserved for administrators or higher-level user groups.
Rate this question:
15.
When you make a new user in Windows XP, by default he/she becomes a member of the Power Users group.
A.
True
B.
False
Correct Answer
B. False
Explanation By default, when a new user is created in Windows XP, they do not become a member of the Power Users group. Instead, they become a member of the Users group. The Power Users group has additional privileges and permissions compared to the Users group.
Rate this question:
16.
Where would you go in order to force your users to change their passwords the next time they log in?
A.
Computer management admin tool
B.
Server control panel
C.
Users and Passwords control panel
D.
Local Security Policy admin tool
Correct Answer
A. Computer management admin tool
Explanation You would go to the Computer Management admin tool in order to force your users to change their passwords the next time they log in. This tool allows you to manage various aspects of your computer, including user accounts and passwords. By accessing the user accounts section in the Computer Management admin tool, you can enforce password changes for your users, ensuring that they are prompted to change their passwords the next time they log in.
Rate this question:
17.
If a user is reporting they have entered their password unsuccessfully multiple times and cannot log in, what is the cause?
A.
Their account needs to be restored
B.
Their account is awaiting activation
C.
Their account is locked
D.
Their account needs to have a username applied
Correct Answer
C. Their account is locked
Explanation If a user is reporting that they have entered their password unsuccessfully multiple times and cannot log in, the cause is most likely that their account is locked. This could be due to security measures in place to protect the account from unauthorized access. To resolve this issue, the user may need to contact the appropriate support or administrator to unlock their account and regain access.
Rate this question:
18.
If a user forgets their password, an administrator can look up their password for them.
A.
True
B.
False
Correct Answer
B. False
Explanation The statement is incorrect. In a secure system, passwords are typically stored in a hashed or encrypted format, which means they cannot be easily retrieved by an administrator or anyone else. Instead, when a user forgets their password, the administrator can usually assist them in resetting their password or providing them with a temporary password to regain access to their account.
Rate this question:
19.
When using Computer Management to create a new account, Windows asks you to supply a user's full name.
A.
True
B.
False
Correct Answer
A. True
Explanation When creating a new account using Computer Management in Windows, the operating system prompts the user to provide the full name of the user. This is because Windows uses the full name to identify the user and display it in various places, such as the login screen and user directories. By providing the full name, Windows can personalize the user's experience and ensure proper identification and organization of user accounts.
Rate this question:
20.
When using Computer Management to create a new account, Windows Forces you to supply a description of the user before you are allowed to create the account.
A.
True
B.
False
Correct Answer
B. False
Explanation When using Computer Management to create a new account, Windows does not force you to supply a description of the user before creating the account. This means that the statement is false.
Rate this question:
21.
If I were to install a program via CD, i would typically look for the _____________ file if the installation doesn't run automatically.
A.
Getstarted.exe
B.
Installation.ini
C.
Installation.dll
D.
Setup.exe
Correct Answer
D. Setup.exe
Explanation When installing a program via CD, the typical file to look for if the installation doesn't run automatically is "setup.exe". This file is commonly used as the installer for software applications and is responsible for initiating the installation process. It may contain various instructions and configurations necessary for the program to be installed correctly on the computer.
Rate this question:
22.
The latest and greatest applications on the market today are __-bit applications.
A.
16
B.
32
C.
64
D.
128
Correct Answer
C. 64
Explanation The latest and greatest applications on the market today are 64-bit applications. This means that these applications are designed to run on 64-bit operating systems, which offer several advantages over 32-bit systems. 64-bit applications can access more memory, allowing for improved performance and the ability to handle larger data sets. They also offer better security features and compatibility with newer hardware. Overall, 64-bit applications are more advanced and capable than their 32-bit counterparts, making them the preferred choice for modern software development.
Rate this question:
23.
If I were installing a 32-bit application from my computer, what would be the most common way to go about it?
A.
Start, Programs, Accessories, System Tools, Disk Defragmenter
B.
Start (Settings), Printers and Faxes, Add or Remove Programs
C.
Start (Settings), Control Panel, Add or Remove Programs
D.
Start, Program, Accessories, Communication, IP Telephony
Correct Answer
C. Start (Settings), Control Panel, Add or Remove Programs
Explanation The most common way to install a 32-bit application from a computer is to go to the "Start" menu, then click on "Settings" and select "Control Panel". From there, you can choose "Add or Remove Programs" to install the application.
Rate this question:
24.
If I were to remove a DOS application from my computer, I would take the exact same steps as I would to remove a 32-bit application.
A.
True
B.
False
Correct Answer
B. False
Explanation The statement is false because removing a DOS application and removing a 32-bit application would involve different steps. DOS applications are typically removed by deleting their files or uninstalling them using specific commands, while 32-bit applications are usually uninstalled through the control panel or using an uninstaller program. Therefore, the steps to remove these two types of applications would not be the same.
Rate this question:
25.
Windows runs programs within the NT kernel since it makes sense to have the OS crash if an application crashes.
A.
True
B.
False
Correct Answer
B. False
Explanation The given statement is false. Windows does not run programs within the NT kernel with the intention of having the OS crash if an application crashes. In fact, Windows uses a protected memory model where each application runs in its own isolated process, separate from the kernel. This design ensures that if an application crashes, it does not affect the stability of the entire operating system. The NT kernel provides a layer of abstraction and manages system resources, but it is not directly responsible for running applications.
Rate this question:
26.
If I install a printer through another computer (workstation or server), I still have to obtain the driver on my own every time; it isn't possible to have the driver provided for me automatically.
A.
True
B.
False
Correct Answer
B. False
Explanation The given statement is false. When installing a printer through another computer (workstation or server), it is possible for the driver to be provided automatically. This can be achieved through a process called driver sharing or driver deployment, where the driver is installed on the server or workstation and then made available to other computers on the network. This eliminates the need for each individual computer to obtain the driver separately.
Rate this question:
27.
If I am going to install a networked printer as a local printer on my computer, I just need the following two items:
A.
Printer model number and serial number
B.
Printer driver information for the make/model and location in the building
C.
Printer IP address and location in the building
D.
Printer IP address and driver files for that make/model
Correct Answer
D. Printer IP address and driver files for that make/model
Explanation To install a networked printer as a local printer on a computer, two items are required: the printer's IP address and the driver files for the specific make and model of the printer. The IP address is necessary to establish a connection between the computer and the printer over the network. The driver files are needed to enable the computer to communicate with and control the printer, ensuring compatibility and proper functioning.
Rate this question:
28.
PS drivers are much "lighter" to use over PCL print drivers since they don't have as much "overhead" communication.
A.
True
B.
False
Correct Answer
B. False
Explanation The given statement suggests that PS drivers are lighter to use over PCL print drivers because they have less overhead communication. However, the correct answer is False. This implies that the statement is incorrect and PS drivers are not necessarily lighter to use compared to PCL print drivers.
Rate this question:
29.
Which of the following paths would likely provide me connectivity to a printer assuming a printer in installed on a lab workstation with the naming convention we have been using and that computer is powered on:
A.
\G30-TB\Printer
B.
\G30-SM\4050n_Printer
C.
\\G30-DR\i386
D.
\\G30-WA\4050n_Printer
Correct Answer
D. \\G30-WA\4050n_Printer
Explanation The correct answer is \\G30-WA\4050n_Printer. This path follows the naming convention we have been using and specifies the location of the printer on the lab workstation with the name G30-WA.
Rate this question:
30.
If I were to share out my printer, that would mean that I would be responsible for sharing out paper for that printer as well.
A.
True
B.
False
Correct Answer
B. False
Explanation The statement suggests that if someone shares their printer, they would also be responsible for sharing paper for that printer. However, this is not necessarily true. Sharing a printer does not automatically imply sharing paper as well. It is possible for individuals to share a printer while each person provides their own paper. Therefore, the answer is false.
Rate this question:
31.
Which of the following is not an applicable share permission?
A.
Read
B.
Change
C.
List Folder Contents
D.
Full Control
Correct Answer
C. List Folder Contents
Explanation List Folder Contents is not an applicable share permission because it is a permission that applies to folders, not shares. The other three permissions (Read, Change, and Full Control) are applicable share permissions that determine the level of access a user has to the shared resources.
Rate this question:
32.
Which of the following share permissions is granted by default when initially sharing out a folder?
A.
Full Control
B.
Change
C.
List Folder Contents
D.
None of the Above
Correct Answer
D. None of the Above
Explanation When initially sharing out a folder, none of the above share permissions are granted by default. The default share permission is usually set to "Read" access, which allows users to view the contents of the folder but not make any changes or modifications. Full Control, Change, and List Folder Contents are all higher-level permissions that need to be explicitly granted by the folder owner or administrator.
Rate this question:
33.
Share permissions need to be set to restrict/allow access for ________users.
A.
Local
B.
Remote
C.
None-authenticated
D.
All of the Above
Correct Answer
B. Remote
Explanation Share permissions need to be set to restrict/allow access for remote users. This means that the permissions can be configured to allow or deny access to files or folders for users who are accessing them remotely, such as over a network or through the internet. By setting share permissions, administrators can control the level of access that remote users have to shared resources.
Rate this question:
34.
Specifically setting the "Deny" permission should be used as a last resort due to the fact that it can lead to troubleshooting difficulty in the future.
A.
True
B.
False
Correct Answer
A. True
Explanation Setting the "Deny" permission should be used as a last resort because it can create troubleshooting difficulties in the future. When the "Deny" permission is set, it overrides any other permissions granted to a user or group, effectively blocking their access. This can make it challenging to identify and resolve issues later on, as it may not be immediately clear why a user is being denied access. It is generally recommended to use other permission settings first and only resort to "Deny" when absolutely necessary.
Rate this question:
35.
There is no need to distinguish between share and NTFS permissions; they mean the same thing and have the same capabilities.
A.
True
B.
False
Correct Answer
B. False
Explanation This statement is false. Share permissions and NTFS permissions are two different types of permissions in Windows operating systems. Share permissions control access to shared folders over a network, while NTFS permissions control access to files and folders on the local file system. Although they both regulate access, they have different capabilities and are applied at different levels. Share permissions are applied to the shared folder itself, while NTFS permissions are applied to individual files and folders within the shared folder. Therefore, it is important to distinguish between share and NTFS permissions.
Rate this question:
36.
Which of the following NTFS permissions can be applied to specifically allow users to edit existing content?
A.
Modify
B.
Read and Execute
C.
Read
D.
Write
Correct Answer
A. Modify
Explanation The Modify NTFS permission allows users to edit existing content. This permission grants the user the ability to make changes to files and folders, including creating new files, modifying existing files, deleting files, and changing file attributes. It provides a higher level of access compared to the Read and Write permissions, as it includes both read and write capabilities. The Modify permission is useful for users who need to make changes to files or folders without having full control over them.
Rate this question:
37.
Which of the following specific NTFS permissions needs to be applied to allow users to do whatever they chose within the folder the permissions are set at and, by default, any subfilder therein?
A.
Modify
B.
Read
C.
Full Control
D.
None of the Above
Correct Answer
C. Full Control
Explanation The specific NTFS permission that needs to be applied to allow users to do whatever they chose within the folder and its subfolders is "Full Control". This permission grants users the ability to perform all actions, including modifying files, deleting files, creating new files, and changing permissions. It provides the highest level of access and control over the folder and its contents.
Rate this question:
38.
It is possible to allow NTFS permissions to cascade down to subfolders.
A.
True
B.
False
Correct Answer
A. True
Explanation NTFS permissions can be set to cascade down to subfolders, meaning that the permissions set on a parent folder can be inherited by its subfolders. This allows for easier management of permissions, as changes made to the parent folder's permissions will automatically apply to all subfolders. This can be useful in situations where you want to grant or restrict access to multiple folders within a directory hierarchy without having to individually set permissions for each folder.
Rate this question:
39.
For ease of administration, one method is to set share permissions to ___________ for the Everyone group and the modify _________________ permissions accordingly.
A.
1. Read and Execute; 2. individual
B.
1. Modify; 2. Group
C.
1. Full Control; 2. NTFS
D.
1. Write; 2. share
Correct Answer
C. 1. Full Control; 2. NTFS
Explanation To ensure ease of administration, it is suggested to set share permissions to "Full Control" for the Everyone group. This allows all users to have complete control over the shared resource. Then, the modify permissions can be adjusted accordingly using NTFS permissions. NTFS permissions enable more granular control over individual users or groups, allowing specific actions such as read, write, execute, etc. This approach ensures that the Everyone group has the necessary access to the shared resource, while still allowing for more specific modifications through NTFS permissions.
Rate this question:
40.
When a share name ends in a dollar sign, it is a _________ share
A.
NTFS
B.
Read
C.
Hidden
D.
Execute
Correct Answer
C. Hidden
Explanation When a share name ends in a dollar sign, it is a hidden share. Hidden shares are not visible when browsing the network, and their names are typically followed by a dollar sign to indicate their hidden status. These shares are often used for administrative purposes and are not intended for regular user access.
Rate this question:
41.
The Windows XP operating system has a special program called _________ that allows you to shut down programs that are in endless loops.
A.
Explorer
B.
Task Manager
C.
Help
D.
UserManager
Correct Answer
B. Task Manager
Explanation The correct answer is Task Manager. Task Manager is a special program in Windows XP that allows users to shut down programs that are in endless loops. It provides a way to view and manage running processes, monitor system performance, and end unresponsive applications. By accessing Task Manager, users can identify and terminate programs that are causing issues or consuming excessive system resources, helping to improve overall system stability and performance.
Rate this question:
42.
Usernames are case sensitive.
A.
True
B.
False
Correct Answer
B. False
Explanation Usernames are case sensitive means that the system distinguishes between uppercase and lowercase letters when considering the username. In this case, the correct answer is "False" because usernames are not case sensitive. This means that the system treats uppercase and lowercase letters as the same when it comes to usernames. For example, if a username is "JohnDoe", "johndoe" or "JOHNDOE" would be considered the same username in the system.
Rate this question:
43.
What button do you need to hold down to avoid having to empty the trash after dragging and dropping a file there?
A.
Shift
B.
Control
C.
Tab
D.
Backspace
Correct Answer
A. Shift
Explanation To avoid having to empty the trash after dragging and dropping a file there, you need to hold down the Shift button. When you hold down the Shift button while dragging and dropping a file into the trash, it bypasses the trash and permanently deletes the file.
Rate this question:
44.
Which of the following is not found on the Windows Security dialog box?
A.
Shutdown
B.
Change Password
C.
Sharing
D.
Task Manager
Correct Answer
C. Sharing
Explanation The option "Sharing" is not found on the Windows Security dialog box. The Windows Security dialog box typically includes options related to user accounts, passwords, system settings, and security features. Sharing, on the other hand, is a feature that allows users to share files, folders, and printers with other users or devices on a network. It is not directly related to security settings and therefore not included in the Windows Security dialog box.
Rate this question:
45.
Where can you go to change your password?
A.
The main screen of the Systems Properties window
B.
User Accounts Control Panel
C.
Both of the Above
D.
None of the Above
Correct Answer
B. User Accounts Control Panel
Explanation The User Accounts Control Panel is the correct answer because it is the specific location in which users can go to change their password. The main screen of the Systems Properties window may have various options and settings, but it does not specifically provide the option to change passwords. Therefore, "Both of the Above" is not the correct answer. "None of the Above" is also incorrect as the User Accounts Control Panel is indeed the appropriate place to change passwords.
Rate this question:
46.
It is not important that you properly shut down Windows XP Professional every time you power down your system.
A.
True
B.
False
Correct Answer
B. False
Explanation It is important to properly shut down Windows XP Professional every time you power down your system in order to avoid data loss, corruption, and other potential issues. Improperly shutting down the system can lead to file errors, system instability, and the loss of unsaved work. Therefore, it is crucial to follow the proper shutdown procedure to ensure the safe and reliable operation of the system.
Rate this question:
47.
What is the leading theory for what NT stands for
A.
New Technology
B.
Nice Try
C.
Neverworking Technology
D.
Nightmare To-us
Correct Answer
A. New Technology
Explanation The leading theory for what NT stands for is "New Technology". This is supported by the fact that NT is commonly used as an abbreviation for new and innovative technology in various fields. It is a widely accepted understanding that NT refers to advancements and developments in technology that are considered new and cutting-edge. This theory aligns with the common usage and context in which NT is used, making it the most plausible explanation.
Rate this question:
48.
Only share permissions need to be considered when allowing other to access information; there is no need to consider addressing file/folder permissions.
A.
True
B.
False
Correct Answer
B. False
Explanation This statement is false. When allowing others to access information, both share permissions and file/folder permissions need to be considered. Share permissions control access at the network level, while file/folder permissions control access at the local level. Both sets of permissions are important in determining who can access and modify the information.
Rate this question:
49.
Which of the following settings cannot be performed with your screen saver in Windows XP?
A.
Password Protect
B.
Preview the Screen Saver
C.
Determine date and time settings
D.
Determine the length of inactivity before the screen saver starts
Correct Answer
C. Determine date and time settings
Explanation The screen saver settings in Windows XP allow users to password protect the screen saver, preview it, and determine the length of inactivity before it starts. However, determining date and time settings is not a feature available in the screen saver settings.
Rate this question:
50.
Idenify the order of the release of these Windows operating systems (1-5)
_Windows 200
_Windows 98
_Windows XP
_Windows 7
_Windows Vista
Answer should be in the form of #,#,#,#,#
Correct Answer 2,1,3,5,4
Explanation The correct order of the release of these Windows operating systems is as follows: Windows 98 (1), Windows 2000 (2), Windows XP (3), Windows Vista (4), and Windows 7 (5).
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.