Technical Aptitude Test - Hardware, OS & Networking

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By FlagshipHR
F
FlagshipHR
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,588
Questions: 30 | Attempts: 3,588

SettingsSettingsSettings
Technical Aptitude Test - Hardware, OS & Networking - Quiz

Please attempt as many questions as possible.
All correct attempts will be awarded 4 marks.
Wrong attempts will be awarded -1 (minus one) marks.
Invalid or blank attempts will be awarded 0 marks.


Questions and Answers
  • 1. 

    In Windows 2000/XP, which of the following is the filename created by Virtual Memory?

    • A.

      386PART.PAR

    • B.

      WIN386.SWP

    • C.

      VMM32.VXD

    • D.

      PAGEFILE.SYS

    Correct Answer
    D. PAGEFILE.SYS
    Explanation
    In Windows 2000/XP, the filename created by Virtual Memory is PAGEFILE.SYS. This file is used as a virtual memory extension when the physical memory is not sufficient to run all the active programs. It acts as a temporary storage space for data that cannot fit in the RAM, allowing the system to continue running smoothly.

    Rate this question:

  • 2. 

    The amount of power output from a power supply is rated in?

    • A.

      Volts

    • B.

      Watts

    • C.

      Ampere-hours

    • D.

      Joules

    Correct Answer
    B. Watts
    Explanation
    The amount of power output from a power supply is rated in watts. Watts is the unit of power, which measures the rate at which work is done or energy is transferred. It is calculated by multiplying the voltage (measured in volts) by the current (measured in amperes). Therefore, watts is the correct unit for measuring the power output of a power supply.

    Rate this question:

  • 3. 

    A technician opens a computer and observes that the computer is full of dust. Which of the following should the technician do to remove the dust from the system? (Select more than 1 option)

    • A.

      Gently blow the dust out

    • B.

      Use a dust cloth

    • C.

      Shake the dust out

    • D.

      Use compressed air to remove the dust

    • E.

      Vacuum the dust out of the system

    Correct Answer(s)
    D. Use compressed air to remove the dust
    E. Vacuum the dust out of the system
    Explanation
    The technician should use compressed air to remove the dust because it is an effective method to blow the dust out of the system. Additionally, vacuuming the dust out of the system is also a suitable option as it can help to remove the dust particles efficiently. Using a dust cloth or shaking the dust out may not be as effective in completely removing the dust from the computer.

    Rate this question:

  • 4. 

    A technician is updating the video drivers on a Windows XP system and encounters a dialog box warning that the driver is unsigned. An unsigned driver means that the driver is -

    • A.

      Is currently in a beta state

    • B.

      Is not signed by the hardware abstraction layer (HAL)

    • C.

      Has not been signed by the Windows Hardware Quality Lab

    • D.

      Is incompatible with Windows XP

    Correct Answer
    C. Has not been signed by the Windows Hardware Quality Lab
    Explanation
    An unsigned driver means that it has not been signed by the Windows Hardware Quality Lab. This lab is responsible for testing and certifying drivers to ensure they meet certain quality standards and are compatible with the Windows operating system. Without this certification, there is a risk that the driver may cause compatibility issues or instability on the system.

    Rate this question:

  • 5. 

    In Windows 2000/XP, which of the following are valid commands that can be typed into the 'Run' dialog box to access the registry editor? (Select more than one option)

    • A.

      REGEDIT

    • B.

      REGEDT32

    • C.

      REGISTY /EDIT

    • D.

      REG /EDIT

    • E.

      REG32 /EDIT

    • F.

      REGEDIT32

    Correct Answer(s)
    A. REGEDIT
    B. REGEDT32
    Explanation
    The correct answers are REGEDIT and REGEDT32. These are valid commands that can be typed into the 'Run' dialog box in Windows 2000/XP to access the registry editor. The other options, REGISTY /EDIT, REG /EDIT, REG32 /EDIT, and REGEDIT32, are not valid commands for accessing the registry editor.

    Rate this question:

  • 6. 

    After installing a new cable modem and new router, which of the following should be the order used to start up the devices?

    • A.

      Turn on the cable modem, then the router, and then the computer

    • B.

      Turn on the cable modem, then the computer, and then the router

    • C.

      Turn on the router, then the computer, and then the cable modem

    • D.

      Turn on the computer, then the cable modem, and then the router

    Correct Answer
    A. Turn on the cable modem, then the router, and then the computer
  • 7. 

    Windows XP is being installed from a CD onto a computer that has no operating system. Which of the following installation methods would MOST likely be used?

    • A.

      Multiboot

    • B.

      Network

    • C.

      Attended

    • D.

      Automated

    Correct Answer
    C. Attended
    Explanation
    Attended installation method is the most likely to be used when installing Windows XP from a CD onto a computer with no operating system. This method requires user interaction throughout the installation process, allowing the user to make choices and provide input when prompted. It is suitable for situations where customization and user preferences need to be considered during the installation.

    Rate this question:

  • 8. 

    NTFS should be used for Windows XP rather than FAT32 because NTFS? (Select more than 1 option)

    • A.

      Allows for faster hard drive access

    • B.

      Ensured that all users networked to a computer can read files

    • C.

      Gives a user more useable hard drive space

    • D.

      Allows Windows XP to use all available security features

    • E.

      Ensures full compatibility with new software

    Correct Answer(s)
    C. Gives a user more useable hard drive space
    D. Allows Windows XP to use all available security features
    Explanation
    NTFS should be used for Windows XP rather than FAT32 because it gives a user more usable hard drive space and allows Windows XP to use all available security features. NTFS has a more efficient file allocation system compared to FAT32, allowing for better disk space utilization. Additionally, NTFS supports advanced security features such as file and folder permissions, encryption, and auditing, which are essential for maintaining data integrity and protecting sensitive information on a Windows XP system.

    Rate this question:

  • 9. 

    Which of the following connections are found on video cards?

    • A.

      RS-232

    • B.

      DB-25

    • C.

      15-pin D-shell

    • D.

      RJ-45

    • E.

      DVI

    Correct Answer(s)
    C. 15-pin D-shell
    E. DVI
    Explanation
    The connections found on video cards are 15-pin D-shell and DVI. RS-232, DB-25, and RJ-45 are not typically found on video cards.

    Rate this question:

  • 10. 

    A technician has installed a new video card and the computer will now only boot into VGA mode. Which of the following may be the cause of the problem?

    • A.

      There is an operating system incompatibility

    • B.

      The incorrect drivers are installed

    • C.

      The external monitor is not compatible

    • D.

      The new card is not DVI compatible

    Correct Answer
    B. The incorrect drivers are installed
    Explanation
    The incorrect drivers being installed can cause the computer to only boot into VGA mode. Drivers are software programs that allow the operating system to communicate with hardware devices, such as video cards. If the incorrect drivers are installed for the new video card, it may not be recognized or utilized properly by the operating system, resulting in the computer booting into VGA mode.

    Rate this question:

  • 11. 

    You installed Windows NT Workstation 4.0 on your Windows 98 computer so that you can dual boot. After installation you try looking for data on your Windows 98 partition but cannot see it. What is the problem? The Windows 98 partition _______________ ?

    • A.

      Is formatted with FAT16

    • B.

      Is formatted with FAT32

    • C.

      Was deleted during the installation

    • D.

      Is not set as active in the Windows NT settings

    Correct Answer
    B. Is formatted with FAT32
    Explanation
    The problem is that the Windows 98 partition is formatted with FAT32. Windows NT Workstation 4.0 does not natively support the FAT32 file system, so it cannot read or access data from a partition formatted with FAT32.

    Rate this question:

  • 12. 

    A client calls and tells you that while he was installing Windows 98 the system files could not be updated and the system hung. What should be disabled in order to install a system upgrade?

    • A.

      Plug and Play in the BIOS

    • B.

      Antivirus feature in the BIOS

    • C.

      Drive compression

    • D.

      Fast booting the BIOS

    Correct Answer
    B. Antivirus feature in the BIOS
    Explanation
    When installing a system upgrade, it is recommended to disable the antivirus feature in the BIOS. This is because the antivirus software may interfere with the installation process and prevent the system files from being updated, causing the system to hang. By disabling the antivirus feature, the installation can proceed without any interruptions from the antivirus software.

    Rate this question:

  • 13. 

    A user is using multiple monitors in Windows 98 and states that a mouse can only be used with the primary monitor. The problem is that the user is in an MSDOS based program. How should the MSDOS program be run?

    • A.

      In protected screen mode

    • B.

      With high resolution in use

    • C.

      With a high refresh rate

    • D.

      In full screen mode

    Correct Answer
    D. In full screen mode
    Explanation
    In full screen mode, the MSDOS program takes over the entire screen, allowing the user to utilize the mouse on any monitor. This mode provides a seamless experience by hiding the Windows 98 interface and making the program appear as if it is running on its own dedicated system.

    Rate this question:

  • 14. 

    What program is used to edit a text file when a PC starts at the command prompt only?

    • A.

      WordPad

    • B.

      Write

    • C.

      Notepad

    • D.

      Edit

    Correct Answer
    D. Edit
    Explanation
    The program used to edit a text file when a PC starts at the command prompt only is "Edit". This program allows users to make changes to a text file directly from the command prompt without the need for a graphical user interface. It provides basic editing functionalities such as creating, modifying, and saving text files.

    Rate this question:

  • 15. 

    Your antivirus software detects a boot sector virus. What is a valid option for removing the virus?

    • A.

      Reload the operating system by using an unattended installation

    • B.

      Run Scandisk

    • C.

      Run fdisk /mbr

    • D.

      Run format c:/s

    Correct Answer
    C. Run fdisk /mbr
    Explanation
    Running fdisk /mbr is a valid option for removing a boot sector virus. Fdisk is a command-line utility used to manipulate disk partitions, and the /mbr parameter specifically targets the master boot record (MBR) of the hard drive. By running fdisk /mbr, the MBR will be rewritten, effectively removing the boot sector virus. This is a common method used to restore the MBR to its original state and eliminate any malicious code that may be present.

    Rate this question:

  • 16. 

    What is a static IP address?

    • A.

      DHCP client

    • B.

      One that was generated by a capacitor

    • C.

      One that must be grounded before use

    • D.

      A permanently assigned address

    Correct Answer
    D. A permanently assigned address
    Explanation
    A static IP address refers to a permanently assigned address. Unlike dynamic IP addresses that are assigned by a DHCP server and can change over time, a static IP address remains the same and is manually configured on a device. This type of address is often used for servers, network devices, or devices that require a consistent and predictable IP address for remote access or hosting services.

    Rate this question:

  • 17. 

    How do most of FTP servers authenticate users?

    • A.

      Anonymously

    • B.

      Securely

    • C.

      Nominally

    • D.

      Individually

    Correct Answer
    D. Individually
    Explanation
    Most FTP servers authenticate users individually, meaning that each user is required to provide their own unique credentials (such as a username and password) in order to access the server. This allows for better security and accountability, as each user is identified and authenticated separately. Anonymously, securely, and nominally are not common methods of authentication for FTP servers.

    Rate this question:

  • 18. 

    What is the first step you should take to connect to a shared printer over your network?

    • A.

      From Windows Explorer choose connect to a network printer

    • B.

      From the Control Panel choose connect to network printer

    • C.

      From Control Panel select add new hardware and choose network printer

    • D.

      From the Printers folder double click, add printer and choose network printer

    Correct Answer
    B. From the Control Panel choose connect to network printer
    Explanation
    To connect to a shared printer over your network, the first step you should take is to go to the Control Panel and choose the option "connect to network printer". This will allow you to search for and connect to the shared printer on your network.

    Rate this question:

  • 19. 

    A customer use a Windows 98 machine with a 20BG hard drive formatted with FAT32 and tries to install an old DOS program but gets an error message that there is not enough space on the hard drive. According to the drive properties more than 12GB free space is remaining on the drive. What is wrong?

    • A.

      Windows 98 is not reporting free space properly

    • B.

      The DOS program does not recognize a FAT32 partition

    • C.

      Windows 98 does not support any legacy DOS programs

    • D.

      The partitions on the primary hard drive are not set to active

    Correct Answer
    B. The DOS program does not recognize a FAT32 partition
    Explanation
    The DOS program does not recognize a FAT32 partition. DOS programs typically only recognize and work with partitions that are formatted with the FAT16 file system. Since the customer's machine has a 20GB hard drive formatted with FAT32, the DOS program is unable to recognize the partition and incorrectly reports that there is not enough space on the hard drive.

    Rate this question:

  • 20. 

    A Windows 95 user reports receiving a "Missing or Bad command.com" error after she modified the root directory. Where can a duplicate copy of command.com be found?

    • A.

      C:\DOS\COMMAND.COM

    • B.

      C:\WINDOWS\COMMAND.COM

    • C.

      C:\WINDOWS\SYSTEM\COMMAND.COM

    • D.

      C:\PROGRA¬1\COMMMAND.COM

    Correct Answer
    B. C:\WINDOWS\COMMAND.COM
    Explanation
    After modifying the root directory, the user is receiving a "Missing or Bad command.com" error. The duplicate copy of command.com can be found in the C:\WINDOWS directory.

    Rate this question:

  • 21. 

    What protocol can be used to transfer email from a UNIX server to another?

    • A.

      FTP

    • B.

      POP3

    • C.

      SNMP

    • D.

      SMTP

    Correct Answer
    D. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is the correct answer because it is the standard protocol used for transferring email messages between servers. It is specifically designed for sending and receiving email over the internet and is widely supported by UNIX servers as well as other operating systems. FTP (File Transfer Protocol) is used for transferring files, POP3 (Post Office Protocol version 3) is used for retrieving email from a remote server, and SNMP (Simple Network Management Protocol) is used for managing and monitoring network devices, so they are not suitable for transferring email between servers.

    Rate this question:

  • 22. 

    A small business customer has a 200-computer network connected with hubs and is reporting that the network is slow. An upgrade using which of the following could be suggested?

    • A.

      Bridges

    • B.

      Switches

    • C.

      Routers

    • D.

      Brouters

    Correct Answer
    B. Switches
    Explanation
    Switches could be suggested as an upgrade for the small business customer's slow network. Switches are more efficient than hubs as they create dedicated connections between devices, allowing for faster data transfer. By replacing the hubs with switches, the network's performance can be improved, resulting in a faster and more reliable connection for the customer's 200-computer network.

    Rate this question:

  • 23. 

    Some protocols are considered to be technically non-routable. Which of the following statements best describes the most common reason why a protocol would be considered non-routable?

    • A.

      It does not contain the appropriate Data Link layer information required by routers

    • B.

      It uses advanced Transport layer services to move across the Internet and avoids the routing overhead required by the more primitive networking protocols

    • C.

      It defines Physical layer network addresses for internal routing

    • D.

      It does not specify the Network layer addresses required by routers

    Correct Answer
    D. It does not specify the Network layer addresses required by routers
    Explanation
    The most common reason why a protocol would be considered non-routable is that it does not specify the Network layer addresses required by routers. Routers rely on Network layer addresses to determine the appropriate path for forwarding packets. If a protocol does not provide this information, routers will not be able to route the packets correctly.

    Rate this question:

  • 24. 

    What is the binary network ID of the loopback IP address?

    • A.

      1

    • B.

      10101010

    • C.

      0

    • D.

      1111111

    Correct Answer
    D. 1111111
    Explanation
    The loopback IP address is a special IP address used to test network connections on a local device. In binary, the loopback IP address is represented as 1111111. This address is reserved for the device itself and is often used to troubleshoot network issues or test network applications locally.

    Rate this question:

  • 25. 

    You are the LAN administrator for your company and you have a couple of Windows 2000 Professional clients that dial in via PPP to the company network’s RAS server. You want the remote clients to be assigned dynamic IP addresses. You reserve a pool of class B addresses for these clients. Upon connecting, you find that the Windows 2000 computers are using a subnet mask of all 255s. What should you do?

    • A.

      Run ipconfig with the /release and /renew switch on the client

    • B.

      Run ipconfig with the /renew_all switch on the client

    • C.

      Run winipcfg on the client

    • D.

      Dont do anything

    Correct Answer
    D. Dont do anything
  • 26. 

    You are configuring a router. According to the manual, you will need a transceiver to connect to the LAN ports of the router. What kind of physical interface does the router have?

    • A.

      MSAU

    • B.

      RJ-11

    • C.

      AUI

    • D.

      BNC

    Correct Answer
    C. AUI
    Explanation
    The correct answer is AUI. AUI stands for Attachment Unit Interface, which is a physical interface used to connect Ethernet devices, such as routers, to a network. It is commonly used for connecting devices to LAN ports and requires a transceiver for proper connection. MSAU, RJ-11, and BNC are not relevant physical interfaces for connecting to LAN ports of a router.

    Rate this question:

  • 27. 

    How can a client on an NT TCP/IP network see which remote hosts are currently connected using NBT?

    • A.

      Use NBTSTAT

    • B.

      Use NETSTAT

    • C.

      Use NSLOOKUP

    • D.

      Use IPCONFIG

    Correct Answer
    A. Use NBTSTAT
    Explanation
    NBTSTAT is a command-line tool that is used to troubleshoot NetBIOS name resolution problems. It can display the current NetBIOS over TCP/IP (NBT) connections, which allows a client on an NT TCP/IP network to see which remote hosts are currently connected. Therefore, using NBTSTAT is the correct way to view the connected remote hosts on an NT TCP/IP network.

    Rate this question:

  • 28. 

    You are setting up a new Windows98 workstation on your network, and your DHCP server provides all of the normal TCP/IP configuration information. What must you do to configure the IP address on the workstation after you add the TCP/IP protocol?

    • A.

      The DHCP option is enabled automatically, and the server will auto-configure everything

    • B.

      Find out what the subnet mask on your network is, and add this information only

    • C.

      Manually enter an IP address that is not in use on the network

    • D.

      Put the address of the router in the default gateway, and put all 0s in the IP field

    Correct Answer
    A. The DHCP option is enabled automatically, and the server will auto-configure everything
    Explanation
    When setting up a new Windows98 workstation on a network, after adding the TCP/IP protocol, the DHCP option is enabled automatically. This means that the DHCP server will provide all the necessary TCP/IP configuration information, including the IP address. Therefore, there is no need to manually configure the IP address on the workstation as the server will handle the auto-configuration process.

    Rate this question:

  • 29. 

    Which of the following is considered a Network Attached Storage device?

    • A.

      A 60 GB DAT tape drive attached to the Network Server

    • B.

      A file server with special software that is at a separate location from the departmental file server

    • C.

      In a Windows NT environment, it would be the Backup Domain Controller

    • D.

      A high speed specialized sub-network attached to the enterprise

    Correct Answer
    B. A file server with special software that is at a separate location from the departmental file server
    Explanation
    A file server with special software that is at a separate location from the departmental file server is considered a Network Attached Storage (NAS) device. NAS is a type of storage device that is dedicated to providing file-level data storage services to other devices on the network. It is typically a separate server that is connected to the network and provides centralized storage for multiple clients. The fact that it is located at a separate location from the departmental file server suggests that it is a NAS device that is used for remote or distributed storage purposes.

    Rate this question:

  • 30. 

    Which of the following is NOT a connectionless protocol

    • A.

      IP

    • B.

      SPX

    • C.

      IPX

    • D.

      UDP

    Correct Answer
    B. SPX
    Explanation
    SPX (Sequenced Packet Exchange) is a connection-oriented protocol used in Novell NetWare networks. It provides reliable and sequenced delivery of data packets, ensuring that they arrive in the correct order. On the other hand, IP (Internet Protocol), IPX (Internetwork Packet Exchange), and UDP (User Datagram Protocol) are all connectionless protocols. They do not establish a dedicated connection before transmitting data and do not guarantee the delivery or order of packets. Therefore, the correct answer is SPX, as it is the only option that is not a connectionless protocol.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 25, 2011
    Quiz Created by
    FlagshipHR
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.