Computer Concepts Quiz 3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tbrink
T
Tbrink
Community Contributor
Quizzes Created: 2 | Total Attempts: 9,326
| Attempts: 162 | Questions: 30
Please wait...
Question 1 / 30
0 %
0/100
Score 0/100
1. With a command line interface, you would use the ____________________ command to list files and directories.

Explanation

Dir: lists files and directories

Submit
Please wait...
About This Quiz
Computer Concepts Quiz 3 - Quiz

This quiz assesses key system management concepts in Windows operating systems, focusing on user profiles, disk management, remote desktop access, and system boot configurations. It enhances practical IT... see moreskills and system administration knowledge. see less

2. True or False: You can increase a computer's security by requiring a password prompt prior to POST.

Explanation

You can set the password in BIOS, but it can be reset by manually adjusting DIP switches on the motherboard.

Submit
3. _____________ software detects a known virus by looking for distinguishing characteristics called signatures.

Explanation

AV software are utility programs that prevent infection or scan a system to detect and remove viruses.

Submit
4. A(n) ____________________ file is a file that does not appear in the directory list

Explanation

whether to hide or display a file is one of the file’s attributes kept by the OS.

Submit
5. True or False: Autoexec is a batch file

Explanation

AUTOEXEC.BAT is a system file found originally on the MS-DOS operating system. It is a plain-text batch file that is located in the root directory of the boot device. The name of the file stands for "automatic execution".

Submit
6. ____________________ is the protocol used for the World Wide Web and used by Web browsers and Web servers to communicate in sessions.

Explanation

HTTP (Hypertext Transfer Protocol) is the communications protocol used by the World Wide Web.

Submit
7. How do you interact with the computer in a DOS like environment?

Explanation

cmd.exe is a Windows program that acts as a DOS-like command line interpreter

Submit
8. All wireless phone systems, including cellular, use ____________________ transmission, which means both persons in a conversation can talk or transmit at the same time

Explanation

Full duplex describes communication that happens in two directions at the same time. inverted suplex is a wrestling move, and hapax legomenon is a word which occurs only once in the written record of a language.

Submit
9. ____________________ Desktop allows a user to connect to and use their Windows XP computer from anywhere on the Internet.

Explanation

Remote Desktop: A program that allows a user to connect to and use their Windows XP computer from anywhere on the Internet.

Submit
10. What is phishing?

Explanation

Phishing is a form of social engineering where a malicious user fishes for information. It has nothing to do with some hipster band from vermont.

Submit
11. The Defrag command examines a hard drive or disk for ____________________ files (files written to a disk in noncontiguous clusters) and rewrites these files to the disk or drive in contiguous clusters.

Explanation

It's kind of right there in the name.

Submit
12. ____________________ is a protocol that is used by Internet or intranet telephone networks to provide voice communication over a network.

Explanation

Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks.

Submit
13. ____________________ proves that an individual is who he says he is and is accomplished by a variety of techniques, including a username, password, personal identification number (PIN), smart card, or biometric data.

Explanation

You have to authenticate who you are before you are authorized to do anything.

Submit
14. Using regular RAM for video is called video sharing or shared

Explanation

Shared Memory Architecture (SMA) refers to a design where the graphics chip does not have its own dedicated memory, and instead shares the main system RAM with the CPU and other components.

Submit
15. The ____________________ file is a hidden text file stored in the root directory of the active partition that Ntldr reads to see what operating systems are available and how to set up the boot.

Explanation

The Boot.ini file is a hidden file read by Ntldr during the boot process. The Boot.ini file comprises two sections: the [boot loader] section and the [operating systems] section.

Submit
16. Applications call on the OS to access hardware or other software by using a(n) ____________________ call

Explanation

An application programming interface (API) is an interface implemented by a software program to enable interaction with other software.

Submit
17. A(n) ____________________ is a computer or other device that allows a computer on one network to communicate with a computer on another network

Explanation

Gateway: A computer or other device that connects networks.

Submit
18. True or False: A notebook contains the normal PCI Express, PCI, and ISA expansion slots found in desktop systems.

Explanation

netbooks usually do not have any disk drives, other than their hard drive.

Submit
19. Use the ____________________ command to view, create, and delete partitions.

Explanation

Diskpart is a command-line hard disk partitioning utility included in versions of the Windows NT operating system line from Windows 2000 onwards, replacing fdisk which was used in MS-DOS based operating systems.

Submit
20. With ____________________ user profiles, settings established by a user at one computer are stored in a file on a file server on the network and shared with all computers in the workgroup.

Explanation

The administrator uses one or more of the following to manage user profiles: group profiles, roaming user profiles, and mandatory user profiles. These management profiles are created using the Computer Management console under the Administrative Tools applet in the Control Panel.

Submit
21. ____________________, sometimes called personal PCs or handheld PCs, provide greater ease of use for simple tasks such as checking addresses, viewing stock prices, or recording and receiving short messages.

Explanation

PDA (personal digital assistant): A small, HANDHELD computer that has its own operating system and applications.

Submit
22. To access the Windows System Configuration Utility, enter ___________________ in the Run dialog box

Explanation

MSConfig, or Microsoft System Configuration Utility, (or simply System Configuration in Windows Vista and Windows 7) is a utility to troubleshoot the Windows startup process.

Submit
23. Windows keeps the Last Known Good configuration in the ____________________ .

Explanation

Last Known Good Configuration: stored in the registry

Submit
24. The Windows Virtual Memory Manager moves 4K segments, called ____________________, in and out of physical RAM.

Explanation

Paging is an important part of virtual memory implementation in most contemporary general-purpose operating systems, allowing them to use disk storage for data that does not fit into physical Random-access memory (RAM)

Submit
25. A(n) ____________________ is a device that amplifies signals on a network.

Explanation

A repeater is a device that amplifies signals on a network so they can be transmitted further down the line.

Submit
26. In a(n) ____________________ backup, all files that have been created or changed since the last full or incremental backup are backed up, and files are not marked as backed up.

Explanation

The two best ways to schedule backups are a combination of full backups and incremental backups, or a combination of full backups and differential backups.

Submit
27. To limit how much disk space a user account can access, an administrator can set disk ____________________.

Explanation

Disk quotas can only be set on an NTFS volume

Submit
28. The ____________________ command is used to prepare a hard drive for first use in Win 9x machines.

Explanation

Windows 2000 and later do not use fdisk, they have the Logical Disk Manager feature, as well as DiskPart.

Submit
29. ___________________ is the system management protocol used to monitor and manage network traffic on a workstation.

Explanation

The Simple Network Management Protocol (SNMP) is used mostly in network management systems to monitor for conditions that warrant administrative attention.

Submit
30. True or False: If a computer user logged in under a restricted account instead of an administrator account, their computer would be less likely to suffer from viruses.

Explanation

While a user is protected to a certain degree by restricting their administrator access, they still can introduce viruses, etc. into the system.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 29, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 29, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 16, 2010
    Quiz Created by
    Tbrink
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
With a command line interface, you would use the ____________________...
True or False: You can increase a computer's security by requiring a...
_____________ software detects a known virus by looking for ...
A(n) ____________________ file is a file that ...
True or False: Autoexec is a batch file
____________________ is the protocol used for the World Wide ...
How do you interact with the computer in a DOS like environment?
All wireless phone systems, ...
____________________ ...
What is phishing?
The Defrag command examines a hard drive or disk ...
____________________ is a ...
____________________ ...
Using regular RAM for video is called video sharing or shared
The ____________________ file is a hidden text ...
Applications call on the OS ...
A(n) ____________________ ...
True or False: A notebook contains the ...
Use the ____________________ command to view, ...
With ____________________ user ...
____________________, sometimes called personal PCs or ...
To access the Windows System Configuration ...
Windows keeps the Last Known Good configuration ...
The Windows Virtual Memory ...
A(n) ____________________ ...
In a(n) ____________________ ...
To limit how much disk ...
The ____________________ command is used to ...
___________________ is the system management protocol used to monitor...
True or False: If a computer user logged in under a restricted account...
Alert!

Advertisement