Computer Concepts Quiz 3

30 Questions | Total Attempts: 96

SettingsSettingsSettings
Please wait...
Computer Concept Quizzes & Trivia

The third quiz


Questions and Answers
  • 1. 
    With ____________________ user profiles, settings established by a user at one computer are stored in a file on a file server on the network and shared with all computers in the workgroup.
    • A. 

      Static

    • B. 

      Roaming

    • C. 

      Migrating

    • D. 

      IP

  • 2. 
    The Defrag command examines a hard drive or disk for ____________________ files (files written to a disk in noncontiguous clusters) and rewrites these files to the disk or drive in contiguous clusters.
    • A. 

      Segmented

    • B. 

      Anti-contiguous

    • C. 

      Broken

    • D. 

      Fragmented

  • 3. 
    ____________________ Desktop allows a user to connect to and use their Windows XP computer from anywhere on the Internet.
    • A. 

      Remote

    • B. 

      Away

    • C. 

      User

    • D. 

      Network

  • 4. 
    To limit how much disk space a user account can access, an administrator can set disk ____________________.
    • A. 

      Parameters

    • B. 

      Partitions

    • C. 

      Quotas

    • D. 

      Access

  • 5. 
    In a(n) ____________________ backup, all files that have been created or changed since the last full or incremental backup are backed up, and files are not marked as backed up.
    • A. 

      Full

    • B. 

      Parity

    • C. 

      User defined

    • D. 

      Differential

  • 6. 
    The ____________________ file is a hidden text file stored in the root directory of the active partition that Ntldr reads to see what operating systems are available and how to set up the boot.
    • A. 

      Boot.ini

    • B. 

      Boot.exe

    • C. 

      Boot.cmd

    • D. 

      Boot

  • 7. 
    Windows keeps the Last Known Good configuration in the ____________________ .
    • A. 

      Registry

    • B. 

      Boot.ini file

    • C. 

      CMOS

    • D. 

      Win32 folder

  • 8. 
    Use the ____________________ command to view, create, and delete partitions.
    • A. 

      Chkdsk

    • B. 

      Scandisk

    • C. 

      Diskpart

    • D. 

      Msconfig

  • 9. 
    To access the Windows System Configuration Utility, enter ___________________ in the Run dialog box
    • A. 

      Config.sys

    • B. 

      Xpconfig

    • C. 

      Sysconfig

    • D. 

      Msconfig

  • 10. 
    True or False: You can increase a computer's security by requiring a password prompt prior to POST.
    • A. 

      True

    • B. 

      False

  • 11. 
    A(n) ____________________ file is a file that does not appear in the directory list
    • A. 

      User

    • B. 

      Kernel

    • C. 

      Quota

    • D. 

      Hidden

  • 12. 
    How do you interact with the computer in a DOS like environment?
    • A. 

      Cmd

    • B. 

      Msconfig

    • C. 

      Chkdisk

    • D. 

      Ini

  • 13. 
    With a command line interface, you would use the ____________________ command to list files and directories.
  • 14. 
    True or False: Autoexec is a batch file
    • A. 

      True

    • B. 

      False

  • 15. 
    The ____________________ command is used to prepare a hard drive for first use in Win 9x machines.
    • A. 

      Format

    • B. 

      FAT

    • C. 

      Fdisk

    • D. 

      Fileconfig

  • 16. 
    Applications call on the OS to access hardware or other software by using a(n) ____________________ call
    • A. 

      API

    • B. 

      PCI

    • C. 

      PCC

    • D. 

      ICP

  • 17. 
    The Windows Virtual Memory Manager moves 4K segments, called ____________________, in and out of physical RAM.
    • A. 

      Sheets

    • B. 

      Clusters

    • C. 

      Pages

    • D. 

      Blocks

  • 18. 
    True or False: If a computer user logged in under a restricted account instead of an administrator account, their computer would be less likely to suffer from viruses.
    • A. 

      True

    • B. 

      False

  • 19. 
    A(n) ____________________ is a device that amplifies signals on a network.
    • A. 

      Modulator

    • B. 

      Repeater

    • C. 

      Modem

    • D. 

      Node

  • 20. 
    All wireless phone systems, including cellular, use ____________________ transmission, which means both persons in a conversation can talk or transmit at the same time
    • A. 

      Full duplex

    • B. 

      Half duplex

    • C. 

      Inverted suplex

    • D. 

      Hapax legomenon

  • 21. 
    A(n) ____________________ is a computer or other device that allows a computer on one network to communicate with a computer on another network
    • A. 

      Host

    • B. 

      Domain

    • C. 

      Node

    • D. 

      Gateway

  • 22. 
    ____________________ is the protocol used for the World Wide Web and used by Web browsers and Web servers to communicate in sessions.
    • A. 

      TCP/IP

    • B. 

      HTTP

    • C. 

      FTP

    • D. 

      SMTP

  • 23. 
    ___________________ is the system management protocol used to monitor and manage network traffic on a workstation.
    • A. 

      FTP

    • B. 

      TCP/IP

    • C. 

      SMTP

    • D. 

      SNMP

  • 24. 
    ____________________ is a protocol that is used by Internet or intranet telephone networks to provide voice communication over a network.
    • A. 

      ISDN

    • B. 

      VOIP

    • C. 

      DSN

    • D. 

      UDP

  • 25. 
    ____________________ proves that an individual is who he says he is and is accomplished by a variety of techniques, including a username, password, personal identification number (PIN), smart card, or biometric data.
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Autolyzation

    • D. 

      Anthologizing