Академический Документы
Профессиональный Документы
Культура Документы
1)
How many password reset disk can be created for a particular user account
a) 1
b) 2
c) 3
d) 4
Ans a
2)
The Logon hours,access to games , blocking specific program can be taken care
by Parental Control
a) True
b) False
Ans a
3)
4)
5)
6)
7)
A firewall does not protect the computer from spyware, viruses, pop-up ads
a) True
b) False
Ans a
8)
Windows Firewall & Windows Firewall with Advanced Security are the two
firewall that Window Vista uses
a) True
b) False
Ans a
9)
Window Firewall in Window Vista cheks both Incoming & Outgoing traffic
a) True
b) False
Ans a
10)
13)
14)
Gadgets can be used to display information such as time, weather data, RSS
feed summarize
a) True
b) False
Ans a
15)
16)
17)
18)
a)
b)
c)
d)
Ans
19)
The Ctrl + Alt + Del and the logon screen can be bypassed if a user is bothered
by it
a) False
b) True
Ans b
------------- is used to protect the system from Spyware and other similar
program
a) Windows Defender
b) Windows Firewall
c) Windows Active Icons
d) Windows Spyware
Ans a
20)
In Vista ----------- of the disks space is allocated to the Recycle Bin for each
drive
a) 50%
b) 20%
c) 10%
d) 40%
Ans c
21)
22)
23)
The Offline files are a copy of the files located on the ----------a) Recycle Bin
b) Network
c) Control Panel
d) Desktop
Ans b
25) ------------ give a quick access to the folders we use frequently
a) Command Bar
b) Details Pane
c) Favourite Link
d) Network Folder
Ans c
24)
A ----- is a program that copies the document to be printed and converts it into a
set of instructions
a) Print Spooler
b) Print Queue
c) Print Job
d) Print Document
Ans a
26)
27)
The document that are being printed and waiting to be printed are called--------a) Print icons
b) Print Spoolers
c) Print Folders
d) Print Jobs
Ans d
One of the employee of Jetking company finds that his printer has suddenly
started printing garbage. What should br the first step to solve the problem
a) Share the printer
b) Check for paper jam
c) Reinstall Window Vista
d) Set the printer as the default printer
Ans b
28)
29)
30)
The ------------ option is used to restore the backup from another computer
a) Restore files
b) Advanced Restores
c) Restore Previous Version
d) Files from and older backup
Ans b
31)
The order in which print jobs are printed by the printer can be arranged by
selecting the ---------- of the print jobs
a) Driver
b) Spooler
c) Permissions
d) Priority
Ans d
32)
33)
A ---------- volume is a volume which joins the spaces from different disks and
making it operate as if it is single storage medium
a) Simple Volume
b) Spanned Volume
c) Stripped Volume
d) All
e) None
Ans b
A ----------- is a volume created using stripes of free spaces from two or more
dynamic disks
a) Simple Volume
b) Spanned Volume
c) Stripped Volume
d) All
Ans c
34)
35)
36)
37)
The manager of Jetking wants to increase the size of one his volume so that he
can accommodate more data in the volume. He also notices that there is some
unallocated space in his hard disk. What shoul he do to increase the size of the
volume
a) Format the volume
b) Extend the Voulme
c) Shrink the Volume
d) Convert the disk into dynamic disk
Ans b
38)
39)
40)
In Jetking, some computers are working very slow and hang sometime. The
engineer is unable to detect this problem. Which utility the engineer should use
in this situation
a) Disk Defragmenter
b) Check Disk
c) Disk Clean up
d) System Restore
Ans a
41)
42)
43)
When ----------- folders sharing is On, people on the network can access files in
the ----------- folder
a) public, public
b) private, public
c) public,private
d) private,private
Ans a
44)
45)
When File sharing is On files and printers that we have shared from this
computer can be accessed by people on the network
a) True
b) False
Ans a
46)
47)
Off lines files allows us to work with them even when we are not connected or a
server is unavailable
a) True
b) False
Ans a
48)
49)
50)
51)
52)
Windows Firewall can help prevent hackers or malicious software from gaining
access to our computer through the Internet or network
a) True
b) False
Ans aWe can create our own Power Plan
c) True
d) False
Ans a
53)
54)
55)
56)
The -------------- policy stores a password as text which provides better security
level
a) Enforce password history
b) Minimum password age
c) Password must meet complexity requirement
d) Stores password using reversible encryption for all users in the domain
Ans d
57)
XYZ company is facing problem as there are visitors who use the computer for
a short while and have to be provided with credentials of employee. The
engineer want to provide an account using which the employees data cant be
accessed by the visitors which method we use
a) Administrator Account
b) Standard Account
c) Guest Account
d) Temporary Account
Ans c
58)
63)
68)
--------- means exchanging data between the RAM and the paging files.
a) Virtual Memory
b) Disk-Fragmentation
c) Paging
d) Demand Paging
Ans d
69)
70)
71)
a)
b)
c)
d)
2
4
16
18
Ans a
72)
73)
74)
75)
The ____________ mode restore the latest hard disk state before the computer
turns off.
a) UPS
b) Hibernate
c) APM
d) Balanced
Ans b
76)
77)
78)
a) Hand
b) Underline
c) Star
d) None of above
Ans a
79)
80)
81)
82)
83)
Ans b
84)
85)
b)
c)
d)
Ans
86)
Worm
Spy ware
Antivirus
c
87)
88)
Windows Firewall with Advanced Security can be used to configure Inbound &
Outbound Exceptions
a) True
b) False
Ans a
89)
90)
91)
92)
d) Both a & b
Ans c
93)
94)
----------- drivers involves replacing the old drivers with the recent versions of
drivers
a) Upgrading
b) Updating
c) Roll Back
d) None
Ans b
95)
96)
Enables us to use the previous version of a hardware driver when the driver we
are using causes system inability.
a) Device Rollback
b) Driver Rollback
c) Driver Installation
d) All of Above
Ans b
97)
98)
When you install or configure a new device the ------------- feature care of the
installation
a) Installation Wizard
b) Automatic Installation
c) Plug and Play
d) Normal Installation
Ans c
99)
The XYZ company is facing problems while using computers, as there are
certain devices which are removed from the computer but the device drivers are
still present. The engineer wants to fix the problem so that the computer works
properly. What should be done to fix the problem
a) Install new Drivers
b) Replace Drivers
c) Uninstall Drivers
d) Delete Drivers
Ans c
The ------------ allows us to map the IP network addresses are used by the
data link protocol
a) TCP
b) ARP
c) ICMP
d) IGMP
100)
Ans b
101)
a)
b)
c)
d)
Ans
102)
a)
b)
c)
d)
Ans: a
103)
104)
105)
Ans: a
106)
107)
109)
110)Window
111) The
114)----------------
area contains the icons for programs and services running in the
background.
a) Taskbar
b) Notification
c) Control Panel
d) Gadgets
Ans b
115)A Power
116)Power
a)
b)
c)
d)
e)
Ans
117)The
a)
b)
c)
d)
Ans
The unsigned drivers are device drivers, which do not have a digital
signature and therefore they are potentially harmful for our system
a) True
b) False
Ans a
120)
121)
122)
d) octal
Ans c
123)
a)
b)
c)
d)
Ans
124)
125)
126)
a)
b)
c)
d)
Ans
127)
a)
b)
c)
d)
e)
Ans
128)
129)
Inbound & Outbound rules allow or block the incoming & outgoing
connections respectively.
a) True
b) False
130)
Ans a
-------------- allows us to configure firewall settings from the Command
prompt
a) Windows Server Update Services
b) Group Policy Object Editor
c) Netsh Utility
d) Windows Firewall with Advanced Settings
Ans c
131)
Which key has to be pressed to see the tool bar in IE7 in Vista
a) Ctrl
b) Alt
c) Esc
d) Shift
Ans b
132)
125)
126)
127)
128)
A small text files that stores the user information on the computer are
A Form data
B Cookies
C Passwords
D Temporary Internet files
Ans b
129)
One of the staff of Jetking company is not being able to find an e-mail in their
inbox that has been sent by other employee of Jetking . When they contacted
sender confirms that the e-mail has been sent . What do you think is the
problem here
A The e-mail has been flagged
B The e-mail has been moved to Junk E-mail folder
The How often do you want to create a backup? Screen allows you to --------the backup
A Schedule
B Restore
C Save
D Delete
Ans a
131)
132)
A
B
C
D
133.
e)
f)
g)
h)
Answer: D
134.
i)
j)
k)
l)
Answer: A
135.
_____________ shows the information about the graphics adapter
installed on the computer.
m)
n)
o)
p)
Answer: A
Adapter tab
Color management tab
Monitor tab
Troubleshooting tab
136.
Windows Vista allows you to set the screen refresh rate in
__________________.
q)
r)
s)
t)
Answer: C
137.
u)
v)
w)
x)
Answer: C
Adapter tab
Color management tab
Monitor tab
Troubleshooting tab
__________________ option enables you to hide the taskbar.
Keep the taskbar on top of other windows
Show Quick Launch
Auto-hide the taskbar
Lock the taskbar
138.
The ___________________ power plan provides full performance for the
system with saving power.
y)
z)
aa)
bb)
Answer: B
139.
The Wellizon Textile Co. has four sections Marketing, accounts,
Manufacturing and Export. The company uses Windows Vista Operating
system. The system operator wants to change the desktop background. But he is
facing problem while applying any image as desktop background from the
graphic file. The problem may occur if the graphic file format is:
a.
b.
c.
d.
.jpg or .jpeg
.bmp or .dib
.png
.mfd
Answer: D
140.
The three types of user accounts are Standard Account, Administrator
Account and ___________ Account.
cc)
dd)
ee)
ff)
Answer: B
141.
gg)
hh)
ii)
jj)
Answer: D
142.
Personal
Guest
Protected
Shared
___________account is used by temporary users of a computer.
Shared
Personal
Standard
Guest
The ____________tool has to be used for deleting a particular account.
kk)
ll)
mm)
nn)
Answer: B
143.
oo)
pp)
qq)
rr)
Answer: C
Administrator Accounts
User Accounts
Guests Accounts
Standard Accounts
The maximum length of a password cannot exceed ________characters.
4
100
127
12
144.
The user with _____________rights can set or change a password of other
users.
ss)
tt)
uu)
vv)
Answer: B
145.
ww)
xx)
yy)
zz)
Answer: C
Guest
Administrative
Standard
Advanced
Members of this group can log on to the computer remotely.
Replicator
Offer Remote Assistance Helpers
Remote Desktop Users
Power Users
146.
The _________________policy stores a password as text which provides
better security level.
aaa)
bbb)
ccc)
ddd)
Answer: D
147.
The Wellizon Textile Company is facing problem as there are visitors who
use the computers for a short while and have to be provided with credentials of
employees. The engineer wants to provide an account using which the
employees data cannot be accessed by the visitors. Which method should he
use to restrict visitors from accessing the personal files and folders?
eee)
fff)
ggg)
hhh)
Answer: A
Administrator Account
Guest Account
Standard Account
Temporary Account
148.
The Wellizon Textile Company wants to choke up certain program which
may access by some of the employee that may cause damage to their computer
system. Which method should be used to choke up those programs?
iii)
jjj)
kkk)
lll)
Answer: D
249.
When you install or configure a new device the __________ feature takes
care of the installation.
a. Installation Wizard
b. Automatic Installation
c. Plug and Play
d. Normal Installation
Answer: C
149.
When you install a signed or unsigned driver you have to give your
consent in the ___________ dialog box.
a. Warning
b. Credentials
c. Administrator
d. UAC
Answer: D
150.
The __________ Manager is a control which allows users to view the
information about all the installed and connected Plug and Play devices.
a. Driver
b. General
c. Device
d. Control
Answer: C
151.
_________is software that allows your computer to communicate with the
hardware or any other device you want to install.
a. Device
b. USB
c. Driver
d. Plug and Play
Answer: C
152.
a. Untrusted publisher
b. Windows Signing Authority
c. Unsigned
d. Trusted publisher
Answer: D
153.
To improve the efficiency and performance of a driver you need to
___________ the driver.
a. Uninstall
b. Update
c. Hide
d. Use
Answer: B
154.
________enables you to use previous version of driver when the driver
you are using causes system instability.
a. Plug and Play
b. Device Manager
c. Driver
d. Driver Rollback
Answer: D
155.
The Wellizon Textile Company has bought a new printer and wants to
install the appropriate driver, as Windows does not have the required driver. The
engineer needs to install the driver manually. Which option can be used to install
the driver manually?
a.
b.
c.
d.
Answer: C
155.
The Wellizon Textile Company is facing problems while using computers
as there are certain devices which are removed from the computer but the device
drivers are still present. The engineer wants to fix the problem so that the
computer works properly. What should be done to fix the problem?
a. Install new Drivers
b. Replace Drivers
c. Uninstall Drivers
d. Delete Drivers
Answer: C
156.
In Wellizon Textile Company, an employee finds that one of the volumes
in the system is running out of space. But, there is no unallocated space in either
of the hard drives. But there is a volume that has enough space in it. What
should be done?
a. Partition the volume
b. Extend the volume
c. Format the volume
d. Create a mounted volume
Answer: D
157.
The _______________ acts as an interface between the user, application
programs, hardware and system peripherals.
a.
Desktop
b.
Operating System
c.
Mouse
d.
Windows
Answer: b
158.
DOS provides a text-based interface called the _____________
a.
Command Prompt
b.
Windows
c.
Editor
d.
CONFIG.SYS
Answer: C
159.
165.
Which of the following processors fall below Windows Vistas minimum
recommended requirements? (Choose all that apply)
cccc) 3.0 GHz Pentium IV
dddd) 500 MHz Pentium III
eeee) 1 GHz Pentium III
ffff) 700 MHz Pentium III
Answer: B, D
166.
Which of the following hardware configurations fall below the minimum
recommended for Windows Vista?
gggg) A computer that has a 10 megabit network interface card
hhhh) A computer that has a 100 megabit network interface card
iiii)
A computer that has a 900 MHz Pentium III processor
jjjj)
A computer that has 256 MB of RAM
Answer: D
167.
Last week you updated your graphics adapter manually after downloading
new device driver software from the vendors website. This is the third time you
have done this since you purchased your Windows Vista computer. Until now,
you have never experienced any system instability. Since the installation of the
latest version of the driver, the computer appears to crash randomly. You suspect
the new driver. What should you do?
kkkk) Uninstall the driver
llll)
Run Windows Update to obtain a new driver
mmmm)
Roll back the device driver
nnnn) Roll back using System Restore
Answer: A, B
168.
You work on the technical support desk at the local computer superstore.
A customer has called complaining that he is getting a headache from the
flickering of monitor. What advice should you give him?
oooo) Adjust the number of colours displayed
pppp) Adjust the monitors resolution
qqqq) Adjust the refresh rate
rrrr) Adjust the color management settings
Answer: C
169.
After you install Windows Vista, how long is the grace period before you
must activate the product?
ssss) 10 Days
tttt)
15 Days
uuuu) 30 Days
vvvv) 180 Days
Answer: C
170.
You using Parental Controls to configure web restrictions for 6 year old
child. You want to block all web except websites approved for children. What
web restriction level should you choose?
wwww)
Custom
xxxx) None
yyyy) Medium
zzzz) High
Answer: D
180.
The Wellizon Textile Company maintains its accounts in windows Vista.
The engineer wants to keep more then one copy of their accounts with same
version number on different location. He also wants that when he make any
changes to an offline file, all the files on the different location should be
changed respectively. Which of the following feature is provided by Windows
Vista to fulfill the requirement?
a.
b.
c.
d.
Answer: B
181.
The Wellizon Textile Company having two different network connections.
The engineer wants to that all the computers that are connected to different
networks, should communicate and share their resources with each other. Which
of the following method can be used to resolve the problem?
e.
f.
g.
h.
Answer: B
182.
______ is a virus.
a. Melissa
b. Word Concept
c. Bonzi Buddy
d. Kazaa
Answer:C
171.
A spyware can be stopped using _______.
a. Antivirus program
b. Windows Update
c. User Account Control
d. Windows Defender
Answer: D
172.
An administrator is provided _______ tokens.
a. One
b. Two
c. Three
d. Four
Answer: B
173.
The ______ prompt is the common UAC prompt displayed for a standard
user.
a. Warning
b. Consent
c. Credential
d. Notification
Answer: C
174.
The Windows Security Center is notified by a ______ icon in the
notification area.
a. Shield
b. Rod
c. Arrow
d. CD
Answer: A
175.
______ allows you to configure firewall settings from the Command
prompt.
a. Windows Firewall with Advanced Settings
b. Netsh Utility
c. Group Policy Object Editor
d. Windows Server Update Services
Answer: C
176.
______ rules are followed by Windows Vista computers for authentication
before connecting to other computers.
a. Security Connection
b. Security
c. Connection Security
d. Connection
Answer: A
177.
Windows Defender definitions contain the ______ of signatures of
spywares.
a. Database
b. Folder
c. Updates
d. Code
Answer: B
226. In the Wellizon Textile Company, some of the programs and system files are
found to be corrupted, due to which error messages pop-up each time the system
starts. The engineer thinks that the system has been infected. Which tool should be
used to detect and repair the infected programs in the system?
a. Windows Defender
b. Group Policy Object Editor
c. Antivirus program
d. Netsh Utility
Answer: C
178.
The Wellizon Textile Company wants to install a program that has been
downloaded from the Internet, but Windows Vista is not allowing to do so. The
engineer wants to fix this problem by choosing the appropriate tool. Which tool
should be selected by the engineer?
a. Windows Firewall with Advanced Security
b. Windows Server Update Services
c. User Account Control
d. Windows Defender
Answer: A
227. ___________________ display selective information about security, blocked popup window and other activities to prevent a page from opening..
a. Command bar
b. Address bar
c. Information bar
d. Status bar
Answer: c
228. _____________ security level is used for trustworthy sites such as secure internal
sites.
a. High
b. Medium-high
c. Medium-low
d. Low
Answer:d
229. A small text files that store the user information on the computer are
____________.
a. Form data
b. Cookies
c. Passwords
d. Temporary Internet files
Answer: b
230. Press _________________to open a special page of thumbnails for all open tabs.
A. Ctrl + W
B. Ctrl + T
C. Ctrl + Tab
D. Ctrl + Q
Answer: d
E. Press the __________ key to view the menu bar in IE7.
a. Shift
b. Ctrl
c. Alt
d. tab
Answer: c
F. The Remote Assistance Invitation is saved ____________ default name.
a. Invitation.doc
b. Invitation.msrcincident
c. Invitation.exe
d. Invitation.mdf
Answer: b
G. The manager of Wellizon Textile Company needs some help with his system which is
not showing some important files. He wants help from the software engineer as soon
as possible as he does not want the production plan to be put in a halt. But the
software engineer is out of town. Which tool will come in aid for the manager at this
situation?
a. Secure Connection tool
b. RSS Feed tool
c. Custom Filter tool
d. Remote Assistance tool
Answer: d
H. One of the staff of the Wellizon Textile Company is not being able find an e-mail in
the inbox that has been sent by the client containing important details. When
contacted, the client confirms that the e-mail has already been sent. What do you
think is the problem here?
181.
The ______________ dialog box enables you to select the default
operating system when dual-boot is configured.
mmmmm)
nnnnn) Startup and Recovery
ooooo) Performance Options
ppppp) User Profiles
Answer: B
System Properties
182.
Before upgrading to Windows Vista, at least ______________ free space
must be available in the Windows XP volume.
a. 15 GB
b. 256 MB
c. 10 GB
d. 11 GB
Answer: D
183.
The ______________ recovery option in Windows Vista enables
automatic rebuilding of the installation.
a. Startup Repair
b. System Restore
c. Windows Complete PC Restore
d. Windows Memory Diagnostic Tool
Answer: C
184.
The ______________ recovery option is best for manually replacing files.
a.
b.
c.
d.
Answer: b
Startup Repair
Command Prompt
Windows Complete PC Restore
Windows Memory Diagnostic Tool
227. The Wellizon Textile Company is facing problems while working on a computer.
The network engineer thinks there is some problem in the computer hardware. Which
system recovery tool should be used to diagnose the problem related to the hardware?
a.
b.
c.
d.
Answer: a
Startup Repair
System Restore
Windows Memory Diagnostic tool
Command Prompt
228. The Wellizon Textile Company is using an operating system with Windows Vista
and another operating system with Windows XP installed. The engineer wants to
select an operating system during the booting process. Which of the following process
should be used to select an operating system during the booting process?
a. Dual Booting
b. System Restore
c. Windows Complete PC Restore
d. Startup repair
Answer: A
229.
qqqqq)
rrrrr)
sssss)
ttttt)
Answer: A
Stylus
Tap
Applying Ink
Slate
156.
The ______________ option is used to merge the registry.
a. Export
b. Import
c. Load hive
d. Unload hive
Answer: D
157.
key
a. F1
b. F2
c. F3
d. F4
Answer: A
You can rename the value in the left pane by pressing the ___________
158.
The _____________ operation is used to copy a value or key from one
location to another in the registry.
a. Add
b. Compare
c. Copy
d. Delete
Answer: D
159.
The ______________ operation is used to create a hive file.
a. Query
b. Restore
c. Save
d. Unload
Answer: A
160.
The Wellizon Textile Company is using Windows Vista operating system.
The engineer took a backup of the registry editor and than make some changes to
the registry editor. Unfortunately, the system encounters with problem. Which of
the following option can be used to recover the previous changes?
a. Export
b. Import
c. Load hive
d. Unload hive
Answer: B
161.
In Wellizon Textile Company, the manager wants to prevent access to the
registry editing tools for certain users. Which feature should be used for this
purpose?
a. Group Policy Object Editor
b. Task Manager
c. System Protection utility
d. Registry Editor
Answer: D
162.
A spanned volume can exist only on a __________ disk.
a. UDF
b. CDFS
c. Basic
d. Dynamic
Answer: D
163.
The __________ file system does not allow a partition to be created if its
size exceeds 4 GB.
a. FAT
b. FAT32
c. NTFS
d. DiskPart
Answer: A
164.
The __________ utility allows you to manage disks, volumes and
partitions of your system from the command prompt.
a. Disk Management
b. DiskPart
c. Device Manager
d. Disk Defragmenter
Answer: B
165.
A volume that is mapped to an empty folder in another drive is known as a
_________.
a. Mounted volume
b. Spanned volume
c. Striped volume
d. Basic volume
Answer: A
166.
Data in a __________ volume is allocated by dividing them into chunks of
64 KB by the operating system.
a. Simple
b. Spanned
c. Striped
d. FAT
Answer: C
167.
A drive path can be assigned to a volume using an empty folder in a
volume formatted in the __________ file system.
a. FAT
b. FAT32
c. NTFS
d. UDF
Answer: C
168.
The __________ command is used to reduce the size of a volume by a
specified amount.
a. Shrink
b. Reduce
c. Remove
d. Delete
Answer: A
169.
The manager of the Wellizon textile company wants to increase the size of
one his volume so that he can accommodate more data in that volume. He also
notices that there is some unallocated space in his hard disk. What should he do to
increase the size of this volume?
a. Format the volume
b. Extend the volume
c. Shrink the volume
d. Convert the disk into dynamic disk
Answer: B