1.
With ____________________ user
profiles, settings established by a user at one computer
are stored in a file on a file server on the network and shared with all
computers in the workgroup.
A. 
B. 
C. 
D. 
2.
The Defrag command examines a hard drive or disk
for ____________________ files (files
written to a disk in noncontiguous clusters) and rewrites these files to the
disk or drive in contiguous clusters.
A. 
B. 
C. 
D. 
3.
____________________
Desktop allows a user to connect to and use their Windows XP computer
from anywhere on the Internet.
A. 
B. 
C. 
D. 
4.
To limit how much disk
space a user account can access, an administrator can set disk ____________________.
A. 
B. 
C. 
D. 
5.
In a(n) ____________________
backup, all files that have been created or changed since the last full or
incremental backup are backed up, and files are not marked as backed up.
A. 
B. 
C. 
D. 
6.
The ____________________ file is a hidden text
file stored in the root directory of the active partition that Ntldr reads to
see what operating systems are available and how to set up the boot.
A. 
B. 
C. 
D. 
7.
Windows keeps the Last Known Good configuration
in the ____________________ .
A. 
B. 
C. 
D. 
8.
Use the ____________________ command to view,
create, and delete partitions.
A. 
B. 
C. 
D. 
9.
To access the Windows System Configuration
Utility, enter ___________________ in the Run dialog box
A. 
B. 
C. 
D. 
10.
True or False: You can increase a computer's security by requiring a password prompt prior to POST.
11.
A(n) ____________________ file is a file that
does not appear in the directory list
A. 
B. 
C. 
D. 
12.
How do you interact with the computer in a DOS like environment?
A. 
B. 
C. 
D. 
13.
With a command line interface, you would use the ____________________ command to list
files and directories.
14.
True or False: Autoexec is a batch file
15.
The ____________________ command is used to
prepare a hard drive for first use in Win 9x machines.
A. 
B. 
C. 
D. 
16.
Applications call on the OS
to access hardware or other software by using a(n) ____________________ call
A. 
B. 
C. 
D. 
17.
The Windows Virtual Memory
Manager moves 4K segments, called ____________________, in and out of physical
RAM.
A. 
B. 
C. 
D. 
18.
True or False: If a computer user logged in under a restricted account instead of an administrator account, their computer would be less likely to suffer from viruses.
19.
A(n) ____________________
is a device that amplifies signals on a network.
A. 
B. 
C. 
D. 
20.
All wireless phone systems,
including cellular, use ____________________ transmission, which means
both persons in a conversation can talk or transmit at the same time
A. 
B. 
C. 
D. 
21.
A(n) ____________________
is a computer or other device that allows a computer on one network to communicate
with a computer on another network
A. 
B. 
C. 
D. 
22.
____________________ is the protocol used for the World Wide
Web and used by Web browsers and Web servers to communicate in sessions.
A. 
B. 
C. 
D. 
23.
___________________ is the system management protocol used to monitor and manage network traffic
on a workstation.
A. 
B. 
C. 
D. 
24.
____________________ is a
protocol that is used by Internet or intranet telephone networks to
provide voice communication over a network.
A. 
B. 
C. 
D. 
25.
____________________
proves that an individual is who he says he is and is accomplished by a
variety of techniques, including a username, password, personal
identification number (PIN), smart card, or biometric data.
A. 
B. 
C. 
D.