Hardware & Networking Online Mock Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Karimshaikh71
K
Karimshaikh71
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,371
| Attempts: 1,376 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. "www" stands for

Explanation

"www" stands for World Wide Web, which is a system of interlinked hypertext documents accessed through the internet. It is the most common way to access websites and information on the internet. The other options, World Wide Wares, World Wide War, and World Wide Wait, do not accurately represent the acronym "www" or its purpose.

Submit
Please wait...
About This Quiz
Computer Quizzes & Trivia

This 'Hardware & Networking Online Mock Test' assesses knowledge in various networking concepts, including server types, network components, and ISO model layers. It is ideal for learners aiming to understand or reinforce fundamental networking principles.

Personalize your quiz and earn a certificate with your name on it!
2. A computer network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server

Explanation

A computer network is a collection of computers that are interconnected to share resources such as internet connection, printers, and file servers. This means that multiple computers can access and utilize these shared resources, which enhances efficiency and collaboration. Therefore, the statement "A computer network is a set of computers connected together for the purpose of sharing resources" is true.

Submit
3. A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

Explanation

A hard disk drive (HDD) is indeed a data storage device that uses magnetic storage to store and retrieve digital information. It consists of one or more rigid rapidly rotating disks (platters) that are coated with magnetic material. Therefore, the statement "True" accurately describes the given information about hard disk drives.

Submit
4. IP address means

Explanation

IP address stands for Internet Protocol address. It is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The IP address allows devices to send and receive data over the internet. It is an essential component for identifying and locating devices on a network.

Submit
5. Malware is any number of viruses and software bits that intend to harm the computer or steal information, such as viruses, adware, rootkits, backdoors, hijackers, keyloggers, spyware, trojans, and worms.

Explanation

The statement is true because malware refers to any malicious software or code that is designed to harm a computer system or steal sensitive information. It encompasses a wide range of threats including viruses, adware, rootkits, backdoors, hijackers, keyloggers, spyware, trojans, and worms. These malicious programs can cause various damages to the computer and compromise the security and privacy of the user. Therefore, it is important to have effective antivirus and security measures in place to protect against malware attacks.

Submit
6. A service level agreement (SLA) is a contract between a service provider (either internal or external) and the end user that defines the level of service expected from the service provider. SLAs are output-based in that their purpose is specifically to define what the customer will receive.

Explanation

A service level agreement (SLA) is indeed a contract between a service provider and the end user that outlines the expected level of service. SLAs are designed to clearly define what the customer can expect to receive from the service provider. Therefore, the statement "True" accurately reflects the given explanation.

Submit
7. Firewalls can be implemented in both hardware and software, or a combination of both.

Explanation

Firewalls can indeed be implemented in both hardware and software, or a combination of both. Hardware firewalls are physical devices that are placed between the network and the internet to filter and control incoming and outgoing traffic. They provide an extra layer of security and can handle large amounts of traffic efficiently. On the other hand, software firewalls are installed on individual computers or servers and provide protection at the software level. They monitor network traffic and block unauthorized access. Combining both hardware and software firewalls can provide a comprehensive and robust security solution.

Submit
8. All IP addresses are divided into network address and host address

Explanation

IP addresses are indeed divided into network address and host address. The network address identifies the network to which the device belongs, while the host address identifies the specific device within that network. This division allows for efficient routing of data packets across networks, as the network address helps determine the destination network and the host address helps identify the specific device within that network. Therefore, the statement "All IP addresses are divided into network address and host address" is true.

Submit
9. The cache is a smaller, faster memory which stores copies of the data from frequently used main memory locations. Most CPUs have different independent caches, including instruction and data caches, where the data cache is usually organized as a hierarchy of more cache levels (L1, L2, etc.).

Explanation

The cache is indeed a smaller, faster memory that stores copies of data from frequently used main memory locations. Most CPUs have different independent caches, including instruction and data caches. The data cache is usually organized as a hierarchy of more cache levels, such as L1, L2, etc. Therefore, the statement "The cache is a smaller, faster memory which stores copies of the data from frequently used main memory locations. Most CPUs have different independent caches, including instruction and data caches, where the data cache is usually organized as a hierarchy of more cache levels (L1, L2, etc.)" is true.

Submit
10. What is the full form of CD-ROM?

Explanation

CD-ROM stands for Compact Disk Read Only Memory. This term refers to a type of optical disk that is used to store and retrieve data. The "Compact Disk" part of the acronym refers to the physical format of the disk, which is a flat circular disc. The "Read Only Memory" part of the acronym indicates that the data on the disk is permanently stored and cannot be altered or erased. CD-ROMs are commonly used for distributing software, multimedia content, and large amounts of data.

Submit
11. What is the name of the software that allows us to browse through web pages called?

Explanation

A browser is the software that allows us to browse through web pages. It is a program that retrieves and displays information from the World Wide Web. It enables users to access websites, view web pages, and interact with web content. Browsers such as Google Chrome, Mozilla Firefox, and Microsoft Edge are commonly used to navigate the internet and access various online resources.

Submit
12. What is the address given to a computer connected to a network called?

Explanation

The address given to a computer connected to a network is called an IP Address. IP stands for Internet Protocol, and it is a unique numerical label assigned to each device connected to a computer network. IP addresses are used for identification and communication purposes in the network, allowing devices to send and receive data to and from each other.

Submit
13. The Central Processing Unit is the part of a computer system that is commonly referred to as the "brains" of a computer.

Explanation

The central processing unit (CPU) is indeed commonly referred to as the "brains" of a computer. It is responsible for executing instructions, performing calculations, and managing the flow of data within the computer system. The CPU is the primary component that carries out the majority of the computer's processing and is essential for the overall functioning of the computer.

Submit
14. The primary objectives of problem management are to prevent problems and resulting incidents from happening, to eliminate recurring incidents, and to minimize the impact of incidents that cannot be prevented

Explanation

The statement is true because the primary objectives of problem management are indeed to prevent problems and resulting incidents from occurring. By identifying and addressing potential issues proactively, problem management aims to reduce the likelihood of incidents happening in the first place. Additionally, problem management also focuses on eliminating recurring incidents by identifying and addressing their root causes. Lastly, when incidents cannot be prevented, problem management aims to minimize their impact through effective resolution and mitigation strategies.

Submit
15. What is the address given to a computer connected to a network called?

Explanation

The address given to a computer connected to a network is called an IP Address. An IP Address is a unique numerical label assigned to each device in a computer network that uses the Internet Protocol for communication. It serves as an identifier for the device and allows it to communicate with other devices on the network.

Submit
16. P { margin-bottom: 0.1in; line-height: 120%; }a:link { } WAN stands for

Explanation

WAN stands for Wide Area Network, which is a type of computer network that covers a large geographical area, such as multiple buildings or cities. It is used to connect local area networks (LANs) together, allowing computers and devices in different locations to communicate with each other. Unlike LANs, which are typically confined to a single location, WANs use public or private telecommunications networks to extend connectivity over a larger area. This enables organizations to share resources, access remote servers, and connect with branch offices or remote employees.

Submit
17. When you delete a file from a hard disk, the deleted file is stored in the Recycle Bin where you can recover it until you empty the Recycle Bin. 

Explanation

When you delete a file from a hard disk, the operating system moves it to the Recycle Bin instead of permanently deleting it. This allows the user to easily recover the file if needed. The Recycle Bin acts as a temporary storage location for deleted files until it is emptied. Therefore, the statement "the deleted file is stored in the Recycle Bin where you can recover it until you empty the Recycle Bin" is true.

Submit
18. Full form of html

Explanation

The correct answer is "hyper text markup language." HTML stands for Hyper Text Markup Language, which is the standard markup language used for creating web pages and web applications. It is used to structure content on the internet by using tags to define elements such as headings, paragraphs, links, images, and more.

Submit
19.  Firefox and google chrom is an example of a(n)...

Explanation

Firefox and Google Chrome are examples of internet browsers. Internet browsers are software applications that allow users to access and view websites on the internet. They provide a graphical interface and interpret the HTML code of websites to display them in a user-friendly manner. Firefox and Google Chrome are popular internet browsers used by millions of people worldwide.

Submit
20. Firewall is a device that is placed between a trusted and an untrusted network.

Explanation

A firewall is a security device that acts as a barrier between a trusted network (such as a private network) and an untrusted network (such as the internet). It monitors and controls incoming and outgoing network traffic based on predetermined security rules. By placing a firewall between these networks, it helps protect the trusted network from unauthorized access, malware, and other potential threats that may exist on the untrusted network. Therefore, the statement "Firewall is a device that is placed between a trusted and an untrusted network" is true.

Submit
21. P { margin-bottom: 0.1in; line-height: 120%; }a:link { } What is the path from which data flow in a computer system is knon as

Explanation

The path from which data flows in a computer system is known as a bus. A bus is a communication system that allows different components of a computer to transmit data between each other. It acts as a highway, connecting various devices such as the CPU, memory, and input/output devices. The bus transfers data in the form of electrical signals, allowing for the exchange of information and instructions within the computer system.

Submit
22. ISO stands for

Explanation

The correct answer is International Standard Organization. ISO is an abbreviation for International Organization for Standardization, which is a non-governmental organization that develops and publishes international standards. It is not related to student organizations or integrated services.

Submit
23. Ubuntu is one of the most secured operating system and definens the highest level of security as compared other operating system.

Explanation

Ubuntu is known for its strong security features, making it one of the most secure operating systems available. It has a robust security infrastructure that includes features like mandatory access controls, secure defaults, regular security updates, and a dedicated security team. Ubuntu also benefits from the large community of users who contribute to identifying and fixing vulnerabilities. Overall, Ubuntu's focus on security and continuous improvements make it a highly secure operating system compared to others.

Submit
24. Which of the following storage devices can store maximum amount of data?

Explanation

A hard disk can store the maximum amount of data compared to the other storage devices listed. This is because hard disks have a larger storage capacity and can store terabytes of data, while floppy disks, compact disks, and magneto optic disks have much smaller storage capacities.

Submit
25. ____ stands for Redundant Array of Inexpensive (Independant) Disk

Explanation

The correct answer is RAID, which stands for Redundant Array of Inexpensive (Independent) Disks. RAID is a data storage technology that combines multiple physical disk drives into a single logical unit for improved performance, reliability, and/or data redundancy. By using RAID, data can be distributed across multiple disks, allowing for increased data transfer speeds and protection against disk failures.

Submit
26. IP4 is more commonly used than IPv6

Explanation

IP4 (Internet Protocol version 4) is indeed more commonly used than IPv6 (Internet Protocol version 6). This is because IP4 has been in use for a longer period of time and is supported by a larger number of devices and networks. Additionally, the transition from IP4 to IPv6 has been relatively slow due to various reasons, such as the need for infrastructure upgrades and the compatibility issues between the two protocols. Therefore, it is true that IP4 is more commonly used than IPv6.

Submit
27. Windows 7 Operating System is an upgrade from 

Explanation

Windows 7 is an upgrade from either Windows XP or Vista because both XP and Vista were the previous versions of the Windows operating system. Upgrading from either of these versions to Windows 7 would provide users with new features, improved performance, and enhanced security compared to their previous operating system.

Submit
28. NIC Stands for

Explanation

The correct answer is "Network Interface Card". NIC stands for Network Interface Card, which is a hardware component that allows a computer to connect to a network. It provides the necessary interface for communication between the computer and the network, enabling data transfer and network connectivity.

Submit
29. Ubuntu is an _____ source os.

Explanation

Ubuntu is an open source operating system. This means that the source code of Ubuntu is freely available to the public, allowing anyone to view, modify, and distribute it. Open source software promotes collaboration and transparency, as developers can contribute to the improvement of the operating system. Ubuntu being an open source OS enables users to customize and adapt it to their specific needs, making it a popular choice among individuals and organizations.

Submit
30. Which of the following is not an output device?

Explanation

An output device is a device that is used to display or present data or information to the user. A printer is an output device as it prints documents or images on paper. A monitor is an output device as it displays visual output such as text, images, and videos. Speakers are also output devices as they produce sound. However, a keyboard is an input device as it is used to input data or commands into a computer. Therefore, the correct answer is keyboard.

Submit
31. Which device allows your computer to talk to other computers over a telephone line as well as access the internet?

Explanation

A modem is a device that allows your computer to communicate with other computers over a telephone line. It converts the digital signals from your computer into analog signals that can be transmitted over the phone line, and then converts the analog signals from the phone line back into digital signals that your computer can understand. In addition to allowing communication with other computers, a modem also enables access to the internet by connecting to an internet service provider.

Submit
32. Refer to the picture above. Which 2 Letters represent the Chipset? You should click on 2 choices for this  question.

Explanation

The chipset is represented by the letters K and F.

Submit
33. Is the following statement true or false?When a printer is installed on a network, default printer permissions are assigned that allow all users to print and change the status of documents sent to it

Explanation

When a printer is installed on a network, default printer permissions are assigned that allow all users to print and change the status of documents sent to it. This means that when a printer is added to a network, all users on that network have the ability to send print jobs to the printer and also have control over the status of those documents, such as pausing or canceling the print jobs. Therefore, the statement is true.

Submit
34. What does TCP stand for?

Explanation

TCP stands for Transmission Control Protocol. It is a standard communication protocol used for transmitting data over networks. TCP ensures that data is delivered reliably and in the correct order from the sender to the receiver. It breaks down large data packets into smaller segments and reassembles them at the destination. TCP also handles error checking and flow control to ensure efficient and error-free transmission of data.

Submit
35. When you press and release the primary mouse button is called

Explanation

When you press and release the primary mouse button, it is called a click. A click is a basic action performed by pressing and releasing the primary mouse button once. It is the most common and fundamental action used in interacting with a computer using a mouse.

Submit
36. Instructions that control the allocation of computer hardware

Explanation

The operating system is responsible for controlling the allocation of computer hardware. It manages and coordinates the various hardware components, such as the processor, memory, and input/output devices, to ensure that they are used efficiently and effectively. The operating system also provides a platform for running applications and manages the resources required by these applications. Therefore, the operating system is the correct answer in this context.

Submit
37. Which command to use for update of ubuntu os?

Explanation

The correct answer is "sudo apt-get update" because this command is used in Ubuntu to update the software packages on the operating system. "sudo" is used to run the command as a superuser, providing the necessary permissions, while "apt-get update" is the actual command that fetches the latest package lists from the repositories and updates them on the system.

Submit
38. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }Data stored in a ROM cannot be changed by user of a computer?

Explanation

ROM stands for Read-Only Memory, which means that the data stored in it is permanent and cannot be changed or modified by the user. Unlike other types of memory such as RAM, which allows for read and write operations, ROM is designed to store data that needs to be permanently stored and cannot be altered. Therefore, the statement "Data stored in a ROM cannot be changed by the user of a computer" is true.

Submit
39. A computer which links several PCs together in a network is called a

Explanation

A computer which links several PCs together in a network is called a server. Servers are powerful computers that store and manage data, files, and applications for multiple clients connected to the network. They provide resources and services to the clients, such as file sharing, printing, and email. The server acts as a central hub, coordinating and managing the communication and data exchange between the connected PCs in the network.

Submit
40. Approximately how many bytes make one Megabyte.

Explanation

One Megabyte is equal to approximately one million bytes. This is because the prefix "mega" in the metric system represents one million. Therefore, when referring to data storage or transfer, one Megabyte is equivalent to one million bytes.

Submit
41. _______ is what is used by the router to assign an IP address to a specific computer, while _____ is a service that translates website names into the website's IP address. Therefore, DHCP assigns IP addresses, and DNS looks up already existing addresses.

Explanation

DHCP (Dynamic Host Configuration Protocol) is used by the router to assign an IP address to a specific computer. It automates the process of IP address allocation and configuration for devices on a network. On the other hand, DNS (Domain Name System) is a service that translates website names into the website's IP address. It maps domain names to their corresponding IP addresses, allowing users to access websites using easy-to-remember names instead of numerical IP addresses. Therefore, DHCP assigns IP addresses to devices, while DNS looks up the IP address associated with a domain name.

Submit
42. ________software identifies, prevents, and removes malware from a computer system

Explanation

Antivirus software is designed to identify, prevent, and remove malware from a computer system. It scans files, programs, and websites for any potential threats, such as viruses, worms, Trojans, and spyware. It helps to protect the computer from malicious attacks, ensuring the system's security and integrity. Antivirus software plays a crucial role in safeguarding sensitive data and preventing unauthorized access to the computer. It is an essential tool for maintaining a secure and reliable computing environment.

Submit
43. Total keys keyboard is most popular

Explanation

The given answer, 101, is the most popular key on a total keys keyboard. This can be inferred from the given options, where 101 appears twice while the other options only appear once. Therefore, based on the given information, it can be concluded that 101 is the most popular key.

Submit
44. A _______is a network security system designed to prevent unauthorized access to or from a private network.

Explanation

A firewall is a network security system designed to prevent unauthorized access to or from a private network. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. The firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to protect the network from potential threats, such as hackers, malware, and unauthorized access attempts. By filtering and blocking certain types of traffic, a firewall helps to ensure the confidentiality, integrity, and availability of the network resources.

Submit
45. Moving an item across the screen with the mouse

Explanation

The action of moving an item across the screen with the mouse is commonly referred to as "dragging". This involves clicking and holding the mouse button while moving the cursor to drag the item to a desired location on the screen. The other options, such as double-click, web browser, and recycle bin, do not specifically describe the action of moving an item across the screen with the mouse.

Submit
46. How do you clear CMOS password?

Explanation

The CMOS password can be cleared by changing the jumper setting on the motherboard. This involves locating the CMOS jumper on the motherboard and moving it to a different position for a specific amount of time. This action will reset the CMOS settings, including the password, to their default values. Formatting the system or removing the BIOS battery will not clear the CMOS password. Formatting only the operating system will not affect the CMOS settings.

Submit
47. Which of the letters in the picture represents where RAM modules would be plugged into?

Explanation

The letter G in the picture represents where RAM modules would be plugged into.

Submit
48. PAN stands for

Explanation

PAN stands for Personal Area Network. This refers to a network of devices that are connected to an individual's personal space, such as a smartphone, laptop, or wearable devices. It allows for communication and data sharing between these devices, typically over short distances. Public Area Network and Private Area Network refer to different types of networks that are not applicable in this context. Therefore, the correct answer is Personal Area Network.

Submit
49. What component is considered "the brains" of the computer?

Explanation

The Central Processing Unit (CPU) is considered "the brains" of the computer because it is responsible for executing instructions and performing calculations. It is the primary component that carries out all the processing tasks of a computer, including interpreting and executing program instructions, performing arithmetic and logical operations, and managing data input/output. The CPU acts as the control unit and coordinates the activities of all other hardware components, making it the most essential component for the overall functioning of the computer.

Submit
50. Which is a volatile memory

Explanation

RAM is a type of volatile memory because it is temporary and loses its data when the power is turned off. It is used to store data that is actively being used by the computer's operating system, applications, and processes. In contrast, ROM and Programmable Read Only Memory (PROM) are non-volatile memory types that retain their data even when the power is off.

Submit
51. Which device can understand difference between data & programs?

Explanation

A microprocessor is a central processing unit (CPU) that can understand and execute instructions or programs. It is capable of processing data and executing programs, making it able to differentiate between the two. Input and output devices, on the other hand, are responsible for transferring data to and from the computer, while memory stores data and programs for the microprocessor to access and execute. Therefore, the microprocessor is the correct answer as it is the component that can understand the difference between data and programs.

Submit
52. What command is used to verify network connectivity between two systems?

Explanation

The command "ping" is used to verify network connectivity between two systems. By sending ICMP echo request packets to the destination system and waiting for ICMP echo reply packets, the command measures the round-trip time and checks for any packet loss. This helps in determining if the destination system is reachable and if there are any network connectivity issues between the two systems.

Submit
53. Which is not a  Common types of area networks are :

Explanation

not-available-via-ai

Submit
54. Where are the setting changes kept that you make in the bios programs?

Explanation

The setting changes that you make in the BIOS programs are kept in the CMOS (Complementary Metal-Oxide-Semiconductor) memory. CMOS is a type of non-volatile memory that is powered by a small battery on the motherboard. It stores the BIOS settings, such as boot order, system time, and hardware configurations, even when the computer is turned off. This allows the computer to retain the customized settings and ensures that they are loaded correctly every time the computer is powered on.

Submit
55. Combination of characters that allows access to a computer

Explanation

A password is a combination of characters that allows access to a computer or a specific account or program. It is a security measure used to protect sensitive information and restrict unauthorized access. By entering the correct password, the user can gain access to the computer or the specific resource it is protecting. In this context, the password is the only option among the given choices that fulfills the requirement of providing access to a computer.

Submit
56. What is the complete name of UPS?

Explanation

The correct answer is "Uninterruptible Power Supply" because UPS stands for Uninterruptible Power Supply. This device provides backup power to a computer or other electronic equipment in case of a power outage or voltage fluctuation. It ensures that the connected devices continue to receive power without interruption, preventing data loss or equipment damage.

Submit
57. Your PC is unable to boot off the Linux install CD. Which utility should be used to create an installation boot floppy?

Explanation

Fdisk is a utility used for partitioning hard drives, not for creating installation boot floppies. Therefore, the correct answer is incorrect.

Submit
58. How many layers are present in ISO model:

Explanation

The ISO model, also known as the OSI model, is a conceptual framework that standardizes the functions of a communication system into seven different layers. Each layer has a specific role and interacts with the layers above and below it to ensure efficient and reliable communication. Therefore, the correct answer is 7.

Submit
59. ISP stands for

Explanation

ISP stands for Internet Service Provider. An ISP is a company that provides access to the internet for individuals and organizations. They offer various types of internet connections, such as dial-up, DSL, cable, and fiber optic, allowing users to connect to the internet and access websites, send emails, and use other online services. ISPs also typically offer additional services such as web hosting, domain registration, and virtual private networks (VPNs). Overall, ISPs play a crucial role in enabling internet connectivity for users and facilitating their online activities.

Submit
60. What is cache memory?

Explanation

Cache memory is a type of temporary memory that is used to store frequently accessed data or instructions to improve the overall speed and performance of a computer system. It is located closer to the CPU than the main memory and operates at a much faster speed. The purpose of cache memory is to reduce the time it takes for the CPU to access data, as accessing data from the cache is much faster than accessing it from the main memory or disk memory. Therefore, cache memory can be considered as a form of temporary memory.

Submit
61. Windows 7 is designed to

Explanation

Windows 7 is designed to recognize USB devices faster, sleep and resume faster, and use up less memory. This means that the operating system is optimized to provide efficient and faster performance when it comes to recognizing and connecting USB devices, as well as when it goes into sleep mode and resumes from it. Additionally, Windows 7 is designed to consume less memory, which helps improve overall system performance and responsiveness. Therefore, the correct answer is "All of the above."

Submit
62.  Older networks often use another type of cable, called ________

Explanation

Older networks often use another type of cable, called coaxial cable. Coaxial cable is a type of cable that has a central conductor surrounded by an insulating layer, a metallic shield, and an outer insulating layer. It is commonly used for transmitting television signals, as well as for networking purposes. Coaxial cable is known for its durability and ability to carry signals over long distances without interference.

Submit
63. Which Motherboard form factor uses one 20 pin connector

Explanation

The correct answer is ATX. ATX is a motherboard form factor that uses one 20 pin connector for power supply. This standard was introduced by Intel in 1995 and has become the most common form factor for desktop computers. It provides a standardized layout and power delivery system, allowing for easier compatibility and upgradability.

Submit
64. P { margin-bottom: 0.1in; line-height: 120%; }a:link { } p { margin-bottom: 0.1in; line-height: 120%; }a:link { }The computer size was very large in

Explanation

In the first generation of computers, which spanned from the late 1940s to the mid-1950s, computers were indeed very large in size. This was mainly because they used vacuum tubes as their primary electronic component, which were bulky and required a significant amount of space. These computers were also very expensive and required a lot of power to operate. Additionally, they had limited processing capabilities and storage capacity compared to modern computers. Therefore, the correct answer is that the computer size was very large in the first generation.

Submit
65. How many cable are used in rj45 lan cable

Explanation

The correct answer is 4 because an RJ45 LAN cable typically uses four cables. These cables are used for transmitting and receiving data in Ethernet networks. Each cable is responsible for carrying one of the four pairs of signals required for data transmission.

Submit
66. P { margin-bottom: 0.1in; line-height: 120%; }a:link { } Which of the following is the most powerful computers?

Explanation

Supercomputers are the most powerful computers among the options given. They are designed to process large amounts of data and perform complex calculations at incredibly high speeds. Supercomputers are used in various fields such as scientific research, weather forecasting, and simulations. They have the ability to handle massive workloads and solve problems that would be impossible for other types of computers.

Submit
67. The CPU is also known as the processor or _______.

Explanation

The CPU, also known as the processor, is responsible for executing instructions and performing calculations in a computer system. The term "microprocessor" refers to a small and integrated circuit that contains all the functions of a central processing unit. Therefore, the correct answer is "microprocessor."

Submit
68. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }How many pins does a SIMM have?

Explanation

A SIMM (Single In-Line Memory Module) can have either 30 or 72 pins. The number of pins depends on the type of SIMM and its capacity. Some SIMMs have 30 pins, while others have 72 pins.

Submit
69. Which is the first program run on a computer when the computer boots up?

Explanation

When a computer boots up, the first program that runs is the operating system. The operating system is responsible for managing all the hardware and software resources of the computer, including memory, input/output devices, and file systems. It provides a user interface and allows users to interact with the computer. Without the operating system, the computer would not be able to perform any tasks or run any other programs. Therefore, the operating system is the crucial first program that runs when a computer starts up.

Submit
70. A server that can perform no other task besides network services is called

Explanation

A server that can perform no other task besides network services is called a dedicated server. This type of server is specifically allocated to handle network services such as hosting websites, email services, or file sharing. It is dedicated solely to these tasks and does not perform any other functions, ensuring optimal performance and reliability for network-related activities.

Submit
71. What component is most responsible for the Processing part of the Information Processing Cycle?

Explanation

The CPU (Central Processing Unit) is the component that is most responsible for the processing part of the Information Processing Cycle. It is often referred to as the "brain" of the computer, as it performs most of the calculations and executes instructions. The CPU carries out tasks such as fetching, decoding, and executing instructions, as well as performing arithmetic and logical operations. It is responsible for processing data and transforming it into useful information for the user.

Submit
72. How much information can a CD (Compact Disk) usually store?

Explanation

A CD (Compact Disk) can usually store up to 650 Mb of information. This is because CDs use a digital storage method that allows for a large amount of data to be stored on a small physical disc. This makes CDs a popular choice for storing and distributing various types of media such as music, videos, and software.

Submit
73. Which command will be run, if I wish to set full access of particular file/golder in ubunut

Explanation

The correct answer is "chmod -R 777". This command will set full access to a particular file or folder in Ubuntu. The "chmod" command is used to change the permissions of files and directories. The "-R" option is used to apply the permission changes recursively to all files and subdirectories within the specified directory. The "777" represents the permission settings, where the first digit "7" grants read, write, and execute permissions to the owner, the second digit "7" grants the same permissions to the group, and the third digit "7" grants the same permissions to others.

Submit
74. What command is used to get the ip address of all interfaces on a system?

Explanation

The correct answer is "ifconfig". This command is used to get the IP address of all interfaces on a system. It provides detailed information about the network interfaces, including their IP addresses, netmasks, and other network configuration settings. By running the "ifconfig" command, users can easily view and manage the network interfaces on their system.

Submit
75. A disaster recovery plan (DRP) is a documented process  or set of procedures to _____ and protect a business.

Explanation

A disaster recovery plan (DRP) is a documented process or set of procedures to recover and protect a business. This means that the plan outlines the necessary steps and strategies to restore the business operations and infrastructure after a disaster or disruptive event. It includes measures to retrieve lost or damaged data, restore systems and applications, and ensure the continuity of business operations. The goal of a DRP is to minimize downtime, mitigate potential losses, and enable the business to resume normal operations as quickly as possible.

Submit
76. The Windows 7 OS is stored on which two partitions?

Explanation

The correct answer is B & C. The Windows 7 OS is stored on both the Boot Partition and the System Partition. The Boot Partition contains the files necessary for the computer to start up, while the System Partition contains the core operating system files. Both partitions are essential for the proper functioning of the Windows 7 OS.

Submit
77. What command (s) shows you disk partitions and percentage of disk space used?

Explanation

The correct answer is "df". The "df" command is used to display the disk space usage of file systems on a Linux or Unix-like system. It shows the disk partitions and the percentage of disk space used for each partition. This information can be helpful in monitoring disk usage and managing storage resources efficiently.

Submit
78. Which of the following devices have a limitation that we can only information to it but cannot erase or modify it

Explanation

A CDROM (Compact Disc Read-Only Memory) is a storage medium that can only receive information and cannot be erased or modified. Once data is written onto a CDROM, it becomes permanent and cannot be changed. This limitation is due to the way the CDROM is manufactured, with the data being physically encoded onto the disc during the production process. Therefore, CDROMs are commonly used for distributing software, music, and other content that needs to be read-only and cannot be altered.

Submit
79. ........command is used to show the logger or user

Explanation

The correct answer is "Who". The "Who" command is used to show the logger or user.

Submit
80. Which of the following commands can be used to change the group owner of a file?

Explanation

The correct answer is Chmod. The Chmod command is used to change the permissions of a file or directory, including the group owner. It allows the user to modify the read, write, and execute permissions for the owner, group, and others. By using the Chmod command with appropriate options and arguments, the group owner of a file can be changed.

Submit
81. How many Editions available for Windows server 2012 ?

Explanation

There are four editions available for Windows Server 2012.

Submit
82. Modem stands for

Explanation

A modem is a device that modulates (converts) digital signals from a computer into analog signals that can be transmitted over telephone lines. It also demodulates (converts) analog signals back into digital signals that can be understood by the computer. Therefore, the correct answer is "Modulator Demodulator" as it accurately describes the function of a modem.

Submit
83. Which of the following Operating System does not implement multitasking truly?

Explanation

MS DOS does not implement multitasking truly because it is a single-tasking operating system. It can only run one program at a time and does not have the capability to run multiple programs simultaneously. Unlike modern operating systems like Windows 98, Windows XP, and Windows NT, which support multitasking and can run multiple programs concurrently, MS DOS lacks this feature.

Submit
84. You work as a network administrator. The sales manager works on her laptop that runs Windows 7 Ultimate. Tha hard disk on her lap top is configured as shown.She wants to make one more partition in Disk 0 and not lose any existing data. Which steps should she take?  

Explanation

not-available-via-ai

Submit
85.
When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits

Explanation

ANSI (American National Standards Institute) is the standard used for converting keystrokes into corresponding bits. ANSI is widely used in the United States and is compatible with ASCII (American Standard Code for Information Interchange). ASCII is a character encoding standard that assigns unique numbers to each character, allowing computers to understand and display text. EBCDIC (Extended Binary Coded Decimal Interchange Code) is another character encoding standard used mainly on IBM mainframe computers. ISO (International Organization for Standardization) is a standard-setting body that develops and promotes international standards but is not specifically used for converting keystrokes into bits.

Submit
86.
Memory is made up of

Explanation

Memory is made up of a large number of cells. These cells are responsible for storing and retrieving data. Each cell can store a certain amount of information, and when combined together, they form the memory capacity of a device. The set of wires and circuits are also important components of memory, but they are used to connect and control the cells rather than being the main building blocks of memory itself. Therefore, the correct answer is that memory is made up of a large number of cells.

Submit
87. RAID 0 required minimum __ Hard Disk ? (Type Number)

Explanation

RAID 0 requires a minimum of 2 hard disks. RAID 0 is a data storage technique that distributes data across multiple disks in order to improve performance. In this configuration, data is split into smaller blocks and written to different disks simultaneously, allowing for parallel data access and faster read/write speeds. By using only 1 hard disk, RAID 0 cannot be implemented as it requires multiple disks to distribute the data.

Submit
88. What is the size of an IP address?

Explanation

An IP address is a unique numerical label assigned to each device connected to a computer network. It is used to identify and locate devices on the network. The size of an IP address refers to the number of bits used to represent it. In this case, the correct answer is 32 bit, which means that an IP address is represented by a sequence of 32 binary digits (0s and 1s). This allows for a total of 2^32 (4,294,967,296) unique IP addresses to be assigned in the IPv4 addressing scheme.

Submit
89. What is the port number for HTTP?

Explanation

The correct answer is 80 because HTTP (Hypertext Transfer Protocol) uses port 80 as the default port number for communication between web browsers and web servers. This port is specifically assigned for HTTP traffic, allowing the exchange of data and information over the internet.

Submit
90. Which letter in the picture above represents the PCI slots.

Explanation

The letter "M" in the picture represents the PCI slots.

Submit
91. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }SMPS stands for:

Explanation

SMPS stands for Switch Mode Power Supply. This term refers to a type of power supply that uses switching devices such as transistors to convert and regulate electrical power efficiently. Unlike linear power supplies, which use linear regulators, SMPSs operate by rapidly switching the input voltage on and off to control the output voltage. This switching action allows for higher efficiency and smaller size compared to traditional power supplies. Therefore, the correct answer is Switch Mode Power Supply.

Submit
92. P { margin-bottom: 0.1in; line-height: 120%; }a:link { } second generation computers were developed during

Explanation

Second generation computers were developed during the period of 1956 to 1965. This era marked a significant advancement in computer technology as vacuum tubes were replaced by transistors, resulting in smaller, faster, and more reliable computers. These computers were also capable of executing multiple tasks simultaneously and had higher storage capacity. Notable examples of second generation computers include the IBM 1401 and the UNIVAC 1107.

Submit
93. What command, followed by the directory name is used to access that specific directory?

Explanation

The correct answer is "Cd". The "Cd" command, followed by the directory name, is used to access that specific directory. It stands for "Change Directory" and is commonly used in command-line interfaces to navigate through different directories in the file system. By typing "Cd" followed by the directory name, the user can change their current working directory to the specified directory, allowing them to access its contents and perform operations within it.

Submit
94. What command shows you what directory you are in? P

Explanation

The command "pwd" stands for "print working directory" and it is used to display the current directory that the user is in. By typing "pwd" in the command line, the user can see the full path of the directory they are currently working in. This command is helpful for navigating through the file system and keeping track of the user's current location within it.

Submit
95. P { margin-bottom: 0.1in; line-height: 120%; }a:link { } Which of the following is not computer language?

Explanation

The correct answer is "Medium level language". This is because high level language, low level language, and assembly language are all types of computer languages. However, "medium level language" is not a recognized category of computer language.

Submit
96.
A Compiler is ____

Explanation

A compiler is a program that translates code written in a high-level programming language into machine code that can be understood and executed by a computer's hardware. It takes the human-readable code and converts it into a format that the computer can directly understand and execute. This allows the program to be run efficiently and accurately on the computer's hardware.

Submit
97. You are requested to disable a particular hardware device, which is built into the motherboard. Which of the following are the valid ways to do so?

Explanation

To disable a hardware device built into the motherboard, you can right-click the My Computer icon on the desktop, choose Manage, and then select Device Manager. This will open the Device Manager window where you can locate the specific hardware device and disable it. The other options mentioned, such as selecting Device Management from the Properties menu or entering ilocaldev.msc in a command prompt, are not valid ways to disable a hardware device.

Submit
98. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }A byte is equivalent to...?

Explanation

A byte is equivalent to 8 bits. This is because a bit is the smallest unit of data in a computer, and a byte is a group of 8 bits. In computer systems, data is typically stored and manipulated in multiples of bytes, making the byte the most common unit of measurement for data storage and processing.

Submit
99. LPT stands for

Explanation

LPT stands for Line Printer. This is a type of printer that prints one line at a time. It is commonly used for printing large volumes of text or data.

Submit
100. How much information can a CD (Compact Disk) usually store?

Explanation

A CD (Compact Disk) can usually store 4.7 GB of information. This is the standard capacity for a single-layer DVD, which is commonly used for storing movies, music, and other data. The larger capacity allows for more content to be stored on the disk, making it a popular choice for multimedia storage.

Submit
101. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }What are the four key functions of a computer system?

Explanation

The four key functions of a computer system are input, processing, output, and storage. Input refers to the data and instructions that are entered into the computer system. Processing involves the manipulation and transformation of the input data to produce meaningful results. Output refers to the information or results that are generated by the computer system. Storage involves the retention and retrieval of data and instructions for future use. This answer accurately identifies the four essential functions of a computer system.

Submit
102. What are two types of user accounts in Windows Server 2012?

Explanation

In Windows Server 2012, there are two types of user accounts: Local Users and Domain Users. Local Users are accounts that are created on a specific server and are only valid on that server. They are used for accessing resources and performing tasks on that server. Domain Users, on the other hand, are accounts that are created in a domain and can be used to access resources and perform tasks on any server within that domain. They provide a centralized way of managing user accounts and permissions across multiple servers.

Submit
103. _________________is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.

Explanation

The correct answer is Dynamic Host Configuration Protocol (DHCP). DHCP is a client/server protocol that automatically provides an IP host with its IP address and other related configuration information such as the subnet mask and default gateway. DHCP allows hosts to obtain necessary network parameters dynamically, making it easier to manage and configure IP addresses in a network.

Submit
104. Which command to use for upgrade of ubuntu os?

Explanation

The correct answer is "sudo apt-get upgrade" because it is the command used in Ubuntu to upgrade the operating system. The "sudo" part is used to run the command with administrative privileges, "apt-get" is the package handling command, and "upgrade" is the option used to upgrade all installed packages on the system.

Submit
105. What is BIOS battery?

Explanation

The BIOS battery is used to maintain the system's date and time even when the computer is turned off or unplugged. It provides power to the CMOS (Complementary Metal-Oxide-Semiconductor) chip, which stores the BIOS settings and system information. Without the BIOS battery, the system would lose track of time and the BIOS settings would revert to default values. Therefore, the BIOS battery is essential for keeping the system's date and time accurate.

Submit
106. Is the following statement about Hyper-V true or false?Hyper-V does not support wireless networks

Explanation

The statement that Hyper-V does not support wireless networks is true. Hyper-V is a virtualization platform developed by Microsoft that allows users to create and manage virtual machines. However, Hyper-V does not have built-in support for wireless networking. It primarily relies on wired connections for networking purposes. This means that if a user wants to connect a virtual machine to a network, they would need to use a wired connection or set up an external wireless bridge.

Submit
107. RAID 10 required minimum __ Hard Disk ? (Type Number)

Explanation

RAID 10, also known as RAID 1+0, is a combination of RAID 1 (mirroring) and RAID 0 (striping). In RAID 10, data is mirrored across multiple pairs of drives and then striped across these pairs. This provides both redundancy and improved performance. In order to implement RAID 10, a minimum of 4 hard disks is required.

Submit
108. Which of the following below is a loop back IP address?

Explanation

The loopback IP address is a special IP address used to test network connectivity on a local machine. It allows a computer to send and receive data to itself. In this case, the correct answer is 127.0.0.1, as it is the standard loopback IP address. The other options, 127.0.0.0, 127.0.1.1, and 127.0.1.0, are not loopback addresses.

Submit
109. Any system that only allows the possibility of 2  values or states is referred as:

Explanation

A system that only allows the possibility of 2 values or states is referred to as binary. In binary, there are only two digits, 0 and 1, which represent the off and on states respectively. This system is widely used in computing and digital electronics as it provides a simple and efficient way to represent and manipulate information.

Submit
110. P { margin-bottom: 0.1in; line-height: 120%; }a:link { } Which term is used to describe RAM?

Explanation

The term used to describe RAM is "All of the above" because all three options - Dynamic RAM (DRAM), Static RAM (SRAM), and Video RAM (VRAM) - are different types of RAM. DRAM is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit, while SRAM uses flip-flops to store each bit of data. VRAM is a type of RAM specifically designed for storing video data. Therefore, all three options accurately describe different types of RAM.

Submit
111. The cabinet containing the computer’s working parts is known as the

Explanation

The correct answer is workstation because a workstation typically refers to a high-performance computer system designed for professional use. It includes the cabinet or system unit that houses the computer's working parts such as the motherboard, processor, memory, and storage devices. The term "workstation" is commonly used in the context of specialized tasks like graphic design, video editing, and scientific simulations, where powerful hardware and processing capabilities are required. Therefore, the workstation is the most appropriate term for the cabinet containing the computer's working parts.

Submit
112. IP Addresses has ________ bytes

Explanation

IP addresses consist of four bytes, each representing a different part of the address. This is known as IPv4 and is the most commonly used version of IP addresses. Each byte consists of 8 bits, allowing for a total of 256 possible values (0-255) for each part of the address. By combining the four bytes, a unique IP address is created, allowing devices to communicate with each other over the internet.

Submit
113. The most important characteristic of a _____ is how much data the hard drive can store, referred to as the storage capacity.  

Explanation

The most important characteristic of a hard drive is its storage capacity, which refers to how much data it can store.

Submit
114. Brain of a computer system

Explanation

The brain of a computer system is the Central Processing Unit (CPU). The CPU is responsible for executing instructions and performing calculations. It acts as the control center of the computer, coordinating and managing all the other components. The CPU consists of two main components: the Control Unit, which manages the execution of instructions, and the Arithmetic Logic Unit (ALU), which performs mathematical and logical operations. While memory is an important component of a computer system, it is not the brain or control center of the system. Therefore, the correct answer is Central Processing Unit.

Submit
115. The purpose of a ______is to accept typed text and graphic images from a computer and transfer it to paper.

Explanation

A printer is a device that accepts typed text and graphic images from a computer and transfers it onto paper. It is specifically designed for the purpose of producing hard copies of digital documents. Unlike a computer or scanner, which are used for inputting or digitizing information, a printer serves as an output device. It allows users to obtain physical copies of their digital files, making it an essential tool for document reproduction and distribution.

Submit
116. This network is purely IP based. You are troubleshooting some IP connectivity issues. You are using some of the command line utilities on a connected WinXP PC. Refer to the exhibit. What command can you use to display such result?

Explanation

The correct answer is "ipconfig /all" because the command "ipconfig" is used to display the IP configuration of the network interfaces on a Windows PC. The "/all" option is used to display detailed information about all network interfaces, including IP addresses, subnet masks, default gateways, and DNS servers. This command can help troubleshoot IP connectivity issues by providing information about the current network configuration.

Submit
117. What component is used as temporary storage area for the Central Processing Unit.

Explanation

RAM, or Random Access Memory, is used as a temporary storage area for the Central Processing Unit (CPU). It is a volatile memory that allows the CPU to quickly access and store data that is actively being used. RAM provides fast read and write speeds, allowing for efficient data processing. Unlike ROM, which is non-volatile and stores permanent instructions for the computer, RAM can be read from and written to, making it an ideal temporary storage solution for the CPU. The BIOS, or Basic Input/Output System, is responsible for initializing hardware components during the boot process, while the hard drive is a long-term storage device.

Submit
118. Users limit of foundation edition is ___ in windows server 2012

Explanation

In Windows Server 2012, the user limit for the Foundation edition is 15. This means that the Foundation edition of Windows Server 2012 can support up to 15 users simultaneously. It is important to note that this user limit is specific to the Foundation edition and may vary for other editions of Windows Server 2012.

Submit
119. P { margin-bottom: 0.1in; line-height: 120%; }a:link { } From which generation computers the printers were used?

Explanation

Printers were first used in the second generation of computers. The first generation of computers did not have the capability to connect to printers or any other external devices. It was in the second generation that computer systems were developed with the ability to connect to printers, allowing for the printing of documents and other outputs. Therefore, the correct answer is second.

Submit
120. .............is the command used to create new directory.

Explanation

The command "mkdir" is used to create a new directory.

Submit
121. Which letter in the above picture identifies the ROM Chip?

Explanation

In the given picture, the letter "O" identifies the ROM Chip. The ROM Chip is a type of memory chip that stores permanent data and instructions. It stands for Read-Only Memory, meaning that the data stored in it cannot be modified or erased. The ROM Chip is often used to store firmware and software that are essential for the operation of electronic devices.

Submit
122. A picture that represents a file

Explanation

The given answer "Icon" is the most suitable explanation for the given context. An icon is a small graphical representation that is used to represent a file, folder, or program. In the context of the question, an icon can be seen in the start menu or in a library, and it is typically double-clicked to open or access the associated file or program. Therefore, "Icon" is the correct answer in this case.

Submit
123. Minimum Hard Disk required for Windows Server 2012

Explanation

The minimum hard disk required for Windows Server 2012 is 32 GB. This means that in order to install and run Windows Server 2012, you need at least 32 GB of available storage space on your hard drive.

Submit
124. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }From what location are the 1st computer instructions available on boot up?

Explanation

The 1st computer instructions are available on boot up from ROM BIOS. ROM BIOS (Read-Only Memory Basic Input/Output System) is a firmware chip on the motherboard that contains the initial instructions for the computer to start up. It is responsible for initializing and testing hardware components, loading the operating system, and providing basic input/output functions. CPU (Central Processing Unit) is the main processing unit of the computer and does not store the initial instructions. CONFIG.SYS is a configuration file used by the operating system and is not involved in the boot up process. Therefore, the correct answer is ROM BIOS.

Submit
125. Td p{margin-bottom:0in;direction:ltr;color:rgb(0,0,10);text-align:left;}td p.western{font-family:"Liberation Serif",serif;font-size:12pt;}td p.cjk{font-family:"Noto Sans CJK SC Regular";font-size:12pt;}td p.ctl{font-family:"FreeSans";font-size:12pt;}p{margin-bottom:0.1in;direction:ltr;color:rgb(0,0,10);line-height:120%;text-align:left;}p.western{font-family:"Liberation Serif",serif;font-size:12pt;}p.cjk{font-family:"Noto Sans CJK SC Regular";font-size:12pt;}p.ctl{font-family:"FreeSans";font-size:12pt;}a:link{}What is BIOS an acronym for?

Explanation

BIOS stands for Basic Input Output System. It is a firmware that is built into the computer's motherboard. It is responsible for initializing and testing hardware components during the booting process and providing the computer with basic instructions on how to load the operating system. The BIOS also provides a platform for configuring hardware settings and performing system diagnostics. Overall, the BIOS plays a crucial role in the startup process of a computer and acts as a bridge between the hardware and software components.

Submit
126. How much RAM does Windows Server 2012 support?

Explanation

Windows Server 2012 supports up to 4 TB of RAM. This means that the operating system is capable of utilizing and managing a maximum of 4 terabytes of random access memory.

Submit
127. MAC addresses are also known as.

Explanation

MAC addresses are unique identifiers assigned to network devices. They are also known as hardware addresses or physical addresses. These addresses are used to identify devices on a local network and are essential for communication between devices. Therefore, the correct answer is "both a and b above" as MAC addresses are referred to by both these terms.

Submit
128. A Computer that is On the Network is a

Explanation

A computer that is on the network is referred to as a node. In computer networking, a node is any device that is connected to a network and can send, receive, or forward data. This can include computers, servers, printers, routers, or any other network-enabled device. Therefore, the correct answer is "Node."

Submit
129. You have written a shell script that must be run as root in order to work properly. What is the most secure way to give a normal user the ability to run this program?

Explanation

Setting permissions to 777 on the script allows any user to read, write, and execute the script. However, this is not the most secure way to give a normal user the ability to run the program. It is important to follow the principle of least privilege, which means giving users only the permissions they need to perform their tasks. Allowing any user to have full access to the script can be a security risk as it provides unnecessary privileges. A more secure approach would be to set the SUID (Set User ID) bit on the script, which allows the user to run the script with the permissions of the owner (root) while still restricting access to other users.

Submit
130. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }Which IRQ does LPT1 commonly use?

Explanation

LPT1 commonly uses IRQ 7. IRQ stands for Interrupt Request and it is a signal sent to the computer's processor to interrupt the normal execution of a program. In the case of LPT1, which is the first parallel port on a computer, it typically uses IRQ 7 to communicate with the processor and handle data transfer between the computer and external devices connected to the parallel port.

Submit
131. What is the command to switch to the root user account?

Explanation

The command "sudo su" is used to switch to the root user account. "sudo" is used to execute a command with superuser privileges, and "su" is used to switch to another user account. By combining these two commands, "sudo su" allows the user to switch to the root user account.

Submit
132. What is GNU/Linux?

Explanation

GNU/Linux is the official name of the complete Linux operating system according to Richard Stallman. It is not just a combination of a free software kernel with Linux apps, a fancy way of identifying new distros, or a distro meant for wildebeests. Richard Stallman, a prominent figure in the free software movement, advocates for the use of the term GNU/Linux to acknowledge the contributions of the GNU Project to the development of the operating system.

Submit
133. You need to change some settings on your Apache server. Which is the best tool to use for logging in remotely?

Explanation

The best tool to use for logging in remotely to change settings on an Apache server is SSH (Secure Shell). SSH provides a secure and encrypted connection between the client and server, ensuring that the data transmitted is protected from eavesdropping and manipulation. Rsh, Rlogin, and Telnet do not provide the same level of security as SSH, making them less suitable for remote server administration tasks.

Submit
134. ___________is a set of interrelated desktop applications, servers and services, collectively referred to as an office suite, for the Microsoft Windows and Mac OS X operating systems

Explanation

Microsoft Office is a set of interrelated desktop applications, servers, and services that make up an office suite for both Microsoft Windows and Mac OS X operating systems. It is a widely used software package that includes applications such as Word, Excel, PowerPoint, and Outlook, among others. Microsoft Office is known for its productivity tools and is commonly used in professional and educational settings for creating documents, spreadsheets, presentations, and managing emails and calendars.

Submit
135. First, insert the _______ installation disc into your computer's disc drive and restart your computer. You should see the _________installer appear.

Explanation

The correct answer is "Windows" because the question is asking for the installation process of a specific operating system. The instruction suggests inserting the Windows installation disc and restarting the computer, indicating that the installation process is for Windows.

Submit
136. You have a computer that runs Windows 7. You open Disk Management snap-in as shown in the exhibit. According to the company requirement, you have to make sure that you are able to create a new partition on Disk 0. What should you do?

Explanation

To create a new partition on Disk 0, you should shrink Volume C. By shrinking the volume, you will free up some space on the disk, which can then be used to create a new partition. This can be done using the Disk Management snap-in in Windows 7.

Submit
137. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }
Which is the best choice for a specification for a video card?

Explanation

AGP (Accelerated Graphics Port) is the best choice for a specification for a video card. AGP is specifically designed for video cards and offers faster data transfer rates compared to other options like SCSI (Small Computer System Interface) and PCI (Peripheral Component Interconnect). AGP provides a dedicated pathway between the video card and the computer's memory, allowing for smoother and faster graphics processing. SCSI is a different type of interface primarily used for connecting storage devices, while PCI is a general-purpose interface that can be used for various peripherals. Therefore, AGP is the most suitable choice for a video card specification.

Submit
138. What is the full form of CAN?

Explanation

The full form of CAN is both Campus Area Network and Cluster Area Network. A Campus Area Network is a network that connects multiple buildings within a limited geographic area, such as a university campus, while a Cluster Area Network is a network that connects multiple computers or servers within a close proximity, typically used in high-performance computing environments. Therefore, both options a and c are correct.

Submit
139. Which of the following protocol below are suited for email retrieval?

Explanation

Both POP3 and IMAP are suited for email retrieval. POP3 (Post Office Protocol version 3) is a protocol that allows users to retrieve emails from a mail server to their local device. IMAP (Internet Message Access Protocol) is another protocol that enables users to access their emails stored on a mail server and synchronize them across multiple devices. FTP (File Transfer Protocol) is not specifically designed for email retrieval but rather for transferring files between computers. Therefore, the correct answer is "Both a and b above."

Submit
140.  ________The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.

Explanation

The correct answer is Domain Name System (DNS). DNS is the Internet's system for converting alphabetic names into numeric IP addresses. When a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.

Submit
141. The primary purpose of an operating system is:

Explanation

The primary purpose of an operating system is to make the most efficient use of the computer hardware. This means that the operating system manages and coordinates various hardware resources such as the processor, memory, and input/output devices to ensure that they are utilized effectively. It also provides a layer of abstraction between the hardware and the user, allowing them to interact with the computer in a more user-friendly manner. Additionally, the operating system provides services and functionalities that enable the execution of applications and manages system resources efficiently.

Submit
142. What are not a editions of Windows Server 2012?

Explanation

not-available-via-ai

Submit
143. Which command need to enter, if you wish to set the stander user password

Explanation

The correct answer is "passwd USERNAME". This command is used to set or change the password for a specific user. By replacing "USERNAME" with the actual username, the command will prompt for a new password and update it accordingly.

Submit
144. What action allows you to open user account and makes the computer available

Explanation

Logging on is the action that allows you to open a user account and make the computer available. When you log on, you enter your username and password, which authenticates your identity and grants you access to the computer's resources and user interface. Without logging on, the computer remains locked and inaccessible to users.

Submit
145. Windows 7 is an Operating System launched by Microsoft in

Explanation

Windows 7 is an operating system developed by Microsoft and was launched in 2009. It was the successor to Windows Vista and brought several improvements and new features to the Windows platform. Windows 7 was praised for its stability, performance, and user-friendly interface, making it one of the most popular versions of Windows to date.

Submit
146. Passwords for Windows Server , Windows Vista, and Microsoft Windows XP clients can be __________ characters in length.

Explanation

Passwords for Windows Server, Windows Vista, and Microsoft Windows XP clients can be up to 127 characters in length. This means that users have the flexibility to create longer and more secure passwords, which can help protect their accounts from unauthorized access. Having a longer password length increases the complexity and makes it harder for hackers to guess or crack the password using brute force or other methods.

Submit
147. P { margin-bottom: 0.1in; line-height: 120%; }a:link { } Which of the following is first generation of computer

Explanation

EDSAC is considered the first generation of computer because it was the first practical stored-program computer. It was built at the University of Cambridge in the late 1940s and became operational in 1949. EDSAC used vacuum tubes for circuitry and mercury delay lines for memory. It was a significant advancement in computer technology as it introduced the concept of storing programs in memory, allowing for more flexible and efficient computation.

Submit
148. RAM is considered volatile memory, which means that the stored information is lost when there is no power. So, RAM is used by the _________ when a computer is running to store information that needs to be used very quickly, but it does not store any information permanently.

Explanation

RAM is considered volatile memory, meaning that the stored information is lost when there is no power. The CPU is responsible for executing instructions and performing calculations in a computer. It needs to access and store data quickly, which is why it uses RAM to temporarily store information that it needs to access frequently. However, RAM does not store any information permanently, so the CPU relies on other storage devices like the hard disk or ROM for long-term storage.

Submit
149. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }Which of the following retains the information it's storing when the power to the system is turned off?

Explanation

ROM (Read-Only Memory) retains the information it's storing when the power to the system is turned off. Unlike other types of memory such as RAM (DRAM) or DIMM, which are volatile and lose their data when the power is cut off, ROM is non-volatile and its contents are permanently stored even without power. ROM is commonly used to store firmware or BIOS instructions that are essential for the computer to start up and perform basic functions.

Submit
150. What command displays your current username?

Explanation

The command "whoami" displays the current username.

Submit
151. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }Parity is:

Explanation

Parity is an extra bit stored with data in RAM that is used to check for errors when the data is read back. This additional bit allows for error detection by ensuring that the number of bits in a given set of data is either even or odd. When the data is read back, the parity bit is compared to the rest of the data to determine if any errors occurred during storage or transmission. If the number of bits does not match the expected parity, it indicates that an error has occurred. Therefore, parity is a method of ensuring data integrity and detecting errors in computer systems.

Submit
152. A network point that provides entrance into another network is called as ___________

Explanation

A node is a generic term used to refer to any device connected to a network. It can be a computer, printer, or any other device. However, a network point that provides entrance into another network is specifically called a gateway. A gateway acts as an entry point for data to enter or exit a network. It is responsible for routing data between different networks, enabling communication between them. Therefore, the correct answer for this question is gateway.

Submit
153. Command used to create an empty file.

Explanation

The correct answer is "Touch". The touch command is used to create an empty file in various operating systems, including Unix, Linux, and macOS. It updates the access and modification timestamps of the file if it already exists or creates a new empty file if it doesn't exist.

Submit
154. Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?

Explanation

Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into .msi files. The Windows Installer technology allows for the installation, maintenance, and removal of software on Windows operating systems. The .msi file format is specifically designed for software installation and contains all the necessary information and resources needed to install the software correctly. By using Group Policy, administrators can centrally manage and deploy software installations across multiple computers in a networked environment.

Submit
155. Firewalls works at which Layers ?

Explanation

Firewalls work at layers 3, 4, and 7 of the OSI model. Layer 3 is the network layer, where the firewall can filter and block traffic based on IP addresses and network protocols. Layer 4 is the transport layer, where the firewall can examine and control traffic based on port numbers and TCP/UDP protocols. Layer 7 is the application layer, where the firewall can inspect and filter traffic based on application-specific protocols and content. By operating at these layers, firewalls can provide network security by controlling and monitoring traffic flow.

Submit
156. How many layers are present in TCP/IP model:

Explanation

The TCP/IP model consists of four layers: the Network Interface layer, the Internet layer, the Transport layer, and the Application layer. Each layer has a specific role in the communication process. The Network Interface layer handles the physical connection between devices, the Internet layer handles IP addressing and routing, the Transport layer ensures reliable data delivery, and the Application layer enables communication between applications. Therefore, the correct answer is 4.

Submit
157. What are two types of user accounts in Windows Server 2012?

Explanation

In Windows Server 2012, there are two types of user accounts: Local Users and Domain Users. Local Users are accounts that are created specifically for a particular server and are limited to that server only. They are typically used for local administration and management of the server. On the other hand, Domain Users are accounts that are managed by a central directory service, such as Active Directory, and can be used to access resources across multiple servers and domains within a network. These accounts provide a centralized and unified approach to user management in a network environment.

Submit
158. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }Missing slot covers on a computer can cause?

Explanation

Missing slot covers on a computer can cause overheating. Slot covers are designed to cover empty expansion slots in a computer case, preventing dust and debris from entering the system. When these covers are missing, it allows for unrestricted airflow, which can lead to an accumulation of dust and an increase in temperature inside the computer. Overheating can cause damage to the components and may result in system instability or failure.

Submit
159. A network router joins two _________ together.

Explanation

A network router joins two computers together.

Submit
160. "cat" is the command used to

Explanation

The "cat" command is used to display the contents of a file in the terminal. It reads the file and outputs its content to the screen. This command is commonly used to quickly view the contents of a file without opening it in an editor.

Submit
161. Which type of software restriction would prevent the execution of a Windows Installer application from the Internet?

Explanation

Network zone rules would prevent the execution of a Windows Installer application from the Internet. Network zone rules are used to restrict the execution of software based on the network location or zone from which it is being accessed. By setting up network zone rules, an administrator can specify that certain types of software, such as Windows Installer applications, cannot be executed if they are downloaded from the Internet. This helps to protect against potential security risks and ensures that only trusted software can be executed from the Internet.

Submit
162. Users limit of Essentials edition is ___ in windows server 2012

Explanation

The correct answer is 25. In Windows Server 2012 Essentials edition, the user limit is set to 25. This means that the server can support up to 25 user accounts or active sessions at a time. This limitation is specific to the Essentials edition and may vary in other editions of Windows Server 2012.

Submit
163. Minimum system RAM requirements of Windows Server 2012 ?

Explanation

The correct answer is 512 MB because Windows Server 2012 has a minimum system RAM requirement of 512 MB. This means that the server needs at least this amount of memory in order to function properly.

Submit
164. 4. How many Active Directory domains can a Windows Server 2012 domain controller host concurrently?

Explanation

A Windows Server 2012 domain controller can host only one Active Directory domain concurrently. This means that it can only be responsible for managing and authenticating users, computers, and other resources within a single domain. It cannot simultaneously handle multiple domains at the same time.

Submit
165. Which one of the following is not a profile under Windows Firewall?

Explanation

The correct answer is "Internet" because Windows Firewall does not have a specific profile named "Internet". Windows Firewall has four profiles: Domain, Private, Public, and Guest. Each profile has different settings and rules to control network traffic based on the type of network the device is connected to.

Submit
166. A _________ is a network that is constructed using public wires - usually the internet - to connect to a private network such as company's internal network.

Explanation

A Virtual Private Network (VPN) is a network that is constructed using public wires, usually the internet, to connect to a private network such as a company's internal network. VPNs provide a secure and encrypted connection, allowing users to access the private network remotely while ensuring that their data is protected from unauthorized access. This makes VPNs a popular choice for businesses to enable secure remote access for their employees.

Submit
167. What is the minimum amount of storage space required for the Active Directory installation files?

Explanation

The minimum amount of storage space required for the Active Directory installation files is 200 MB. This means that in order to install Active Directory, at least 200 MB of storage space is needed on the system.

Submit
168. The CPU is responsible for executing a sequence of stored instructions called a _____.

Explanation

The CPU is responsible for executing a sequence of stored instructions called a program. This program consists of a set of instructions that the CPU follows to perform specific tasks or operations. By executing these instructions, the CPU carries out the desired operations and performs the necessary calculations or manipulations on the data.

Submit
169. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }What is different between AT and ATX power supplies?

Explanation

The correct answer states that AT supplies use P8 and P9 power connectors while ATX uses a single P1 connector. This means that the main difference between AT and ATX power supplies lies in the power connectors they use. AT power supplies require two separate connectors (P8 and P9) for power input, while ATX power supplies only require a single connector (P1). This difference in power connectors is what sets AT and ATX power supplies apart from each other.

Submit
170. Spool stands for

Explanation

The term "spool" typically refers to a process in which data is temporarily stored in a buffer before being sent to an output device, such as a printer. In the context of the given options, "Simultaneous Peripheral Output On-Line" best fits the definition of spooling. This term suggests that multiple devices can send data for output simultaneously, while the output device can handle the data in an efficient and continuous manner.

Submit
171. The Linux kernel was invented by

Explanation

Linus Torvalds is the correct answer because he is the creator and primary developer of the Linux kernel. He started developing the kernel in 1991 and released the first version of Linux in 1994. His contributions and leadership have been instrumental in the success and widespread adoption of the Linux operating system.

Submit
172. What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications?

Explanation

A directory service allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications. It provides a centralized database of information about network resources and enables users to easily locate and access these resources. With a directory service, businesses can efficiently organize and control access to their network resources, making it an essential tool for managing and securing the network infrastructure.

Submit
173. What is the full form of url in computer

Explanation

The correct answer is "Uniform Resource locator". A URL is a string of characters that provides the address of a specific resource on the internet. It is used to locate and access resources such as web pages, images, videos, etc. The term "Uniform Resource locator" accurately describes the purpose and functionality of a URL in computer systems.

Submit
174. A Windows Server computer that has been configured with the Active Directory DS role is referred to as a __________.

Explanation

A Windows Server computer that has been configured with the Active Directory DS role is referred to as a domain controller. A domain controller is responsible for authenticating users, managing their permissions, and maintaining the directory database that stores information about objects in the network, such as users, computers, and groups. It also replicates this information to other domain controllers in the same domain, ensuring consistency and fault tolerance in the Active Directory environment.

Submit
175. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }What type of connector is used to plug a telephone line into a modem?

Explanation

The correct answer is RJ-11. RJ-11 is a type of connector that is commonly used to plug a telephone line into a modem. It has four or six pins and is smaller in size compared to other connectors like RJ-45 or RJ-10. RJ-11 connectors are specifically designed for telephone applications and are widely used in residential and commercial settings for connecting telephones, modems, and fax machines to a telephone line.

Submit
176. When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named __________.

Explanation

When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named "Default-First-Site-Name". This default site is created to represent the first site in the forest. It is automatically created during the installation process and can be used to manage and organize the network resources within the forest.

Submit
177. If you are installing a software package from source code, the file will typically have which extension?

Explanation

When installing a software package from source code, the file will typically have the ".src" extension. This extension is commonly used to denote that the file contains the source code of the software, which is the human-readable version of the program that needs to be compiled or interpreted into machine code before it can be executed. The source code files usually contain instructions written in programming languages like C, C++, Python, etc., and need to be compiled or interpreted to create the executable file that can be run on the computer.

Submit
178. Unit of a computer system is the unit where place where the actual executions of instructions takes place during processing operation ?

Explanation

The Arithmetic Logic Unit (ALU) is the unit in a computer system where the actual executions of instructions take place during processing operations. It performs arithmetic and logical operations on the data stored in the memory and produces results that are then stored back in the memory. The control unit is responsible for coordinating and controlling the activities of the other units in the computer system. The Central Processing Unit (CPU) is a combination of the control unit, ALU, and other components. Memory is where data and instructions are stored for processing.

Submit
179. How many logical drives is it possible to fit onto a physical disk?

Explanation

The correct answer is maximum of 24 logical drives. This is because a logical drive is a partition on a physical disk, and the number of partitions that can be created is determined by the file system and the size of the disk. With modern file systems and large disk sizes, it is possible to fit up to 24 logical drives onto a physical disk.

Submit
180. What is the difference between a switch and a hub?

Explanation

Switches operate at the data link layer of the OSI model, which is the second layer. They use MAC addresses to forward data packets to the appropriate destination. On the other hand, hubs operate at the physical layer, which is the first layer of the OSI model. Hubs simply broadcast incoming data packets to all connected devices without any intelligence or filtering. Therefore, the correct answer is "Switches operate at data link layer while hubs operate at physical layer."

Submit
181. Which command to use for complete details of a command on the shell?

Explanation

The correct answer is "Man". The "Man" command is used to display the manual page for a given command on the shell. It provides a detailed explanation of the command, including its usage, options, and examples. By using the "Man" command, users can access comprehensive information about various commands and understand how to use them effectively.

Submit
182. __________are elements that are vital for a strategy to be successful or for an objective to be achieved

Explanation

Critical success factors are elements that are vital for a strategy to be successful or for an objective to be achieved. These factors are specific to each organization or project and can vary depending on the industry, goals, and context. Identifying and focusing on critical success factors helps organizations prioritize their efforts and allocate resources effectively to ensure success.

Submit
183. What command is used to clear up the command prompt window?

Explanation

The correct answer is "Clear." This command is used to clear the command prompt window and remove all the previous commands and outputs, providing a clean and empty screen to work with.

Submit
184. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }How much data will a high density (HD) floppy disk hold?

Explanation

A high density (HD) floppy disk can hold 1.44 MB of data. This is the correct answer because HD floppy disks were a common storage medium in the late 1980s and 1990s, and they had a storage capacity of 1.44 MB. This was a significant improvement over the earlier double density (DD) floppy disks which could only hold 720 KB of data. The 1.44 MB capacity of HD floppy disks made them popular for storing and transferring files, especially before the widespread use of CDs and USB drives.

Submit
185. DNS record types come in many forms, but which record type is being described below?Maps a domain name such as.www.google.com to an IP address

Explanation

The correct answer is A.

The A record type maps a domain name, such as www.google.com, to an IP address. This record type is commonly used to translate domain names into their corresponding IP addresses, allowing users to access websites and other resources on the internet.

Submit
186. SLA stands for

Explanation

SLA stands for Service Level Agreement, which is a contract or agreement between a service provider and a customer. It defines the level of service that the provider will deliver, including the quality, availability, and responsiveness of the service. The SLA also outlines the responsibilities and expectations of both parties, ensuring that the service meets the agreed-upon standards. This term is commonly used in the IT industry to ensure that the service provider meets the needs and requirements of the customer.

Submit
187. ______, short for random access memory, is used by computers to store data that is being used currently or was recently used. Accessing data stored in RAM is much quicker than directly accessing data stored on the hard drive, allowing a computer to run much faster.

Explanation

Random Access Memory (RAM) is used by computers to store data that is currently being used or was recently used. Accessing data stored in RAM is much quicker than directly accessing data stored on the hard drive, allowing a computer to run much faster. RAM is a type of computer memory that can be both read from and written to, making it an essential component for the functioning of a computer. It is different from Read Only Memory (ROM) and Cache Memory, as ROM is non-volatile and retains data even when the computer is powered off, while Cache Memory is a smaller and faster type of memory used to temporarily store frequently accessed data for quicker retrieval.

Submit
188. To back up Active Directory, you must install what feature from the Server Manager console?

Explanation

To back up Active Directory, you need to install the Windows Server Backup feature from the Server Manager console. This feature allows you to create and manage backups of the Active Directory database, including system state data and other critical components. Windows Server Backup provides a reliable and efficient way to protect and restore Active Directory in case of data loss or system failure. It is specifically designed for this purpose and is the recommended tool for backing up Active Directory.

Submit
189. Change Management is a process used to ensure that overall business risk is minimized by responding to customers business requirements while minimizing value and reducing incidents, disruption and re-work. Which of the following is NOT one of the seven R?s of Change Management?

Explanation

The question asks for the option that is NOT one of the seven R's of Change Management. The seven R's of Change Management are Reason, Return, Risk, Resources, Roles, Relationships, and Roadmap. The option "What is the financial cost of the change" does not fall under any of these categories and is therefore not one of the seven R's.

Submit
190.  _________, on the other hand, are measures used to quantify management objectives, are accompanied with a target or threshold and enable measurement of performance

Explanation

Key Performance Indicators (KPIs) are measures used to quantify management objectives. They are accompanied by a target or threshold and enable the measurement of performance. KPIs provide a clear and measurable way to track progress towards specific goals and objectives. They help organizations assess their performance and make informed decisions based on the data collected. KPIs are essential in evaluating the success of a company and identifying areas that require improvement.

Submit
191. Which is the commmand used to remove or delete file with out confirmation msg ?

Explanation

The correct answer is "Rm" because the "rm" command is used in Unix and Linux systems to remove or delete files. By default, the "rm" command does not prompt for confirmation before deleting files, so it can be used to delete files without any confirmation messages.

Submit
192. Which peripheral port provides the FASTEST throughput to laser printers?

Explanation

RS-232 is not the correct answer for this question. RS-232 is a standard for serial communication, but it does not provide the fastest throughput to laser printers. The correct answer would be SCSI (Small Computer System Interface), as it is specifically designed for high-speed data transfer and can provide faster throughput to laser printers compared to the other options listed.

Submit
193. How would you show a list of files and directories that are inside the current directory?

Explanation

The correct answer is "Ls". "Ls" is a command used in Unix and Unix-like operating systems to list files and directories in the current directory. It displays the names of all files and directories in the current directory, providing a clear and concise way to view the contents of the current directory.

Submit
194. Your sales manager complains that his Windows 7 computer is unable to boot. You suspect that a missing or corrupt OS file is causing it. You find Safe Mode booting and Last Known Good Configuration don't work. Which steps will resolve the issue with the least administrative burden?

Explanation

Running the system recovery options and choosing the Startup Repair option is the best choice to resolve the issue with the least administrative burden. This option will attempt to automatically fix any issues that are preventing Windows from booting properly. It is a quick and efficient solution that does not require extensive troubleshooting or manual intervention.

Submit
195. A service level agreement is a part of a service contract where the level of service is formally defined. This usually occurs via negotiation between two parties where one is the customer and the other the service provider. In the real world, the term SLA is commonly used to bind a contract to a delivery time or performance.Which of the following is NOT a type of SLA?

Explanation

Just in Time SLA is not a type of SLA because it is not a commonly recognized or established category of service level agreements. While service-based SLA, multi-level SLA, and customer-based SLA are all valid types of SLAs that are commonly used in contracts to define the level of service, Just in Time SLA is not widely recognized or used in the industry.

Submit
196. What command line utility can you use to join a computer to a domain when the computer does not have a working network connection to any of the domain controllers for that domain?

Explanation

The correct answer is "djoin." This command line utility allows you to join a computer to a domain even when there is no working network connection to any of the domain controllers for that domain. It provides a way to perform the domain join operation offline, by using an offline domain join blob file. This file contains the necessary information for the computer to join the domain when it is connected to the network.

Submit
197. What feature gives Windows Server 2012 the ability to retrieve source files for a feature from another location, such as from an image file?

Explanation

Features on Demand is a feature in Windows Server 2012 that allows the operating system to retrieve source files for a feature from another location, such as from an image file. This feature helps to reduce the size of the operating system installation by only installing the necessary features and components when they are needed. It also allows administrators to add or remove features without having to insert the installation media.

Submit
198. Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10); text-align: left; }td p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }td p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }td p.ctl { font-family: "FreeSans"; font-size: 12pt; }p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 10); line-height: 120%; text-align: left; }p.western { font-family: "Liberation Serif",serif; font-size: 12pt; }p.cjk { font-family: "Noto Sans CJK SC Regular"; font-size: 12pt; }p.ctl { font-family: "FreeSans"; font-size: 12pt; }a:link { }IRQ 1 is commonly assigned to:

Explanation

IRQ 1 is commonly assigned to the keyboard. This means that when a key is pressed on the keyboard, an interrupt request is generated and sent to the CPU, which then processes the input. The other options, such as system timer and real-time clock, are also commonly assigned IRQ values, but in this case, IRQ 1 specifically refers to the keyboard.

Submit
199. What PowerShell command would you use to restart a computer?

Explanation

The correct answer is "restart-computer" because it is a PowerShell command specifically designed to restart a computer. The other options, such as "shutdown /r" and "reboot", may be valid commands in other contexts or operating systems, but they are not specific to PowerShell. Additionally, "restart" is not a recognized PowerShell command for restarting a computer. Therefore, "restart-computer" is the most appropriate and accurate choice for this task.

Submit
200. A level covering all the generic Service Level Management issues appropriate to every customer throughout the organisation.

Explanation

The correct answer is Corporate level of a Multi-Level SLA. This answer suggests that the level being referred to in the statement is the corporate level of a multi-level SLA. This means that the SLA covers all the generic Service Level Management issues that are appropriate for every customer throughout the organization, indicating that it is a comprehensive and overarching agreement that applies to all customers at the corporate level.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 12, 2017
    Quiz Created by
    Karimshaikh71
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
"www" stands for
A computer network is a set of computers connected together for the...
A hard disk drive (HDD), hard disk, hard drive or fixed disk...
IP address means
Malware is any number of viruses and software bits that intend to harm...
A service level agreement (SLA) is a contract between a service...
Firewalls can be implemented in both hardware and software, or a...
All IP addresses are divided into network address and host address
The cache is a smaller, faster memory which stores copies of the data from frequently used main memory locations. Most CPUs have different independent caches, including instruction and data caches, where the data cache is usually organized as a hierarchy of more cache levels (L1, L2, etc.)....
What is the full form of CD-ROM?
What is the name of the software that allows us to browse through web...
What is the address given to a computer connected to a network called?
The Central Processing Unit is the part of a computer system that is commonly referred to as the "brains" of a computer....
The primary objectives of problem management are to prevent problems...
What is the address given to a computer connected to a network called?
P { margin-bottom: 0.1in; line-height: 120%; }a:link { } WAN stands...
When you delete a file from a hard disk, the deleted file is stored in...
Full form of html
 Firefox and google chrom is an example of a(n)...
Firewall is a device that is placed between a trusted and an untrusted...
P { margin-bottom: 0.1in; line-height: 120%; }a:link { } What is the...
ISO stands for
Ubuntu is one of the most secured operating system and definens the...
Which of the following storage devices can store maximum amount of...
____ stands for Redundant Array of Inexpensive (Independant) Disk
IP4 is more commonly used than IPv6
Windows 7 Operating System is an upgrade from 
NIC Stands for
Ubuntu is an _____ source os.
Which of the following is not an output device?
Which device allows your computer to talk to other computers over a...
Refer to the picture above. Which 2 Letters represent the Chipset? You...
Is the following statement true or false?When a printer is installed...
What does TCP stand for?
When you press and release the primary mouse button is called
Instructions that control the allocation of computer hardware
Which command to use for update of ubuntu os?
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
A computer which links several PCs together in a network is called a
Approximately how many bytes make one Megabyte.
_______ is what is used by the router to assign an IP address to a...
________software identifies, prevents, and removes malware from a...
Total keys keyboard is most popular
A _______is a network security system designed to prevent unauthorized...
Moving an item across the screen with the mouse
How do you clear CMOS password?
Which of the letters in the picture represents where RAM modules would...
PAN stands for
What component is considered "the brains" of the computer?
Which is a volatile memory
Which device can understand difference between data & programs?
What command is used to verify network connectivity between two...
Which is not a  Common types of area networks are :
Where are the setting changes kept that you make in the bios programs?
Combination of characters that allows access to a computer
What is the complete name of UPS?
Your PC is unable to boot off the Linux install CD. Which utility...
How many layers are present in ISO model:
ISP stands for
What is cache memory?
Windows 7 is designed to
 Older networks often use another type of cable, called ________
Which Motherboard form factor uses one 20 pin connector
P { margin-bottom: 0.1in; line-height: 120%; }a:link { } p {...
How many cable are used in rj45 lan cable
P { margin-bottom: 0.1in; line-height: 120%; }a:link { } Which of the...
The CPU is also known as the processor or _______....
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
Which is the first program run on a computer when the computer boots...
A server that can perform no other task besides network services is...
What component is most responsible for the Processing part of the...
How much information can a CD (Compact Disk) usually store?
Which command will be run, if I wish to set full access of particular...
What command is used to get the ip address of all interfaces on a...
A disaster recovery plan (DRP) is a documented process  or set of...
The Windows 7 OS is stored on which two partitions?
What command (s) shows you disk partitions and percentage of disk...
Which of the following devices have a limitation that we can only...
........command is used to show the logger or user
Which of the following commands can be used to change the group owner...
How many Editions available for Windows server 2012 ?
Modem stands for
Which of the following Operating System does not implement...
You work as a network administrator. The sales manager works on her...
When a key is pressed on the keyboard, which standard is used for...
Memory is made up of
RAID 0 required minimum __ Hard Disk ? (Type Number)
What is the size of an IP address?
What is the port number for HTTP?
Which letter in the picture above represents the PCI slots.
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
P { margin-bottom: 0.1in; line-height: 120%; }a:link { } second...
What command, followed by the directory name is used to access that...
What command shows you what directory you are in? P
P { margin-bottom: 0.1in; line-height: 120%; }a:link { } Which of the...
A Compiler is ____
You are requested to disable a particular hardware device, which is...
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
LPT stands for
How much information can a CD (Compact Disk) usually store?
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
What are two types of user accounts in Windows Server 2012?
_________________is a client/server protocol that automatically...
Which command to use for upgrade of ubuntu os?
What is BIOS battery?
Is the following statement about Hyper-V true or false?Hyper-V does...
RAID 10 required minimum __ Hard Disk ? (Type Number)
Which of the following below is a loop back IP address?
Any system that only allows the possibility of 2  values or...
P { margin-bottom: 0.1in; line-height: 120%; }a:link { } Which term...
The cabinet containing the computer’s working parts is known as the
IP Addresses has ________ bytes
The most important characteristic of a _____ is how much data the hard drive can store, referred to as the storage capacity.  ...
Brain of a computer system
The purpose of a ______is to accept typed text and graphic images from...
This network is purely IP based. You are troubleshooting some IP...
What component is used as temporary storage area for the Central...
Users limit of foundation edition is ___ in windows server 2012
P { margin-bottom: 0.1in; line-height: 120%; }a:link { } From which...
.............is the command used to create new directory.
Which letter in the above picture identifies the ROM Chip?
A picture that represents a file
Minimum Hard Disk required for Windows Server 2012
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
Td...
How much RAM does Windows Server 2012 support?
MAC addresses are also known as.
A Computer that is On the Network is a
You have written a shell script that must be run as root in order to...
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
What is the command to switch to the root user account?
What is GNU/Linux?
You need to change some settings on your Apache server. Which is the...
___________is a set of interrelated desktop applications, servers and...
First, insert the _______ installation disc into your computer's...
You have a computer that runs Windows 7. You open Disk Management...
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
What is the full form of CAN?
Which of the following protocol below are suited for email retrieval?
 ________The Internet's system for converting alphabetic...
The primary purpose of an operating system is:
What are not a editions of Windows Server 2012?
Which command need to enter, if you wish to set the stander user...
What action allows you to open user account and makes the computer...
Windows 7 is an Operating System launched by Microsoft in
Passwords for Windows Server , Windows Vista, and Microsoft Windows XP...
P { margin-bottom: 0.1in; line-height: 120%; }a:link { } Which of the...
RAM is considered volatile memory, which means that the stored information is lost when there is no power. So, RAM is used by the _________ when a computer is running to store information that needs to be used very quickly, but it does not store any information permanently....
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
What command displays your current username?
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
A network point that provides entrance into another network is called...
Command used to create an empty file.
Microsoft Windows Server 2008 uses the Windows Installer with Group...
Firewalls works at which Layers ?
How many layers are present in TCP/IP model:
What are two types of user accounts in Windows Server 2012?
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
A network router joins two _________ together.
"cat" is the command used to
Which type of software restriction would prevent the execution of a...
Users limit of Essentials edition is ___ in windows server 2012
Minimum system RAM requirements of Windows Server 2012 ?
4. How many Active Directory domains can a Windows Server 2012 domain...
Which one of the following is not a profile under Windows Firewall?
A _________ is a network that is constructed using public wires -...
What is the minimum amount of storage space required for the Active...
The CPU is responsible for executing a sequence of stored instructions called a _____....
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
Spool stands for
The Linux kernel was invented by
What allows businesses to define, manage, access, and secure network...
What is the full form of url in computer
A Windows Server computer that has been configured with the Active...
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
When you install the forest root domain controller in an Active...
If you are installing a software package from source code, the file...
Unit of a computer system is the unit where place where the actual...
How many logical drives is it possible to fit onto a physical disk?
What is the difference between a switch and a hub?
Which command to use for complete details of a command on the shell?
__________are elements that are vital for a strategy to be successful...
What command is used to clear up the command prompt window?
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
DNS record types come in many forms, but which record type is being...
SLA stands for
______, short for random access memory, is used by computers to store data that is being used currently or was recently used. Accessing data stored in RAM is much quicker than directly accessing data stored on the hard drive, allowing a computer to run much faster....
To back up Active Directory, you must install what feature from the...
Change Management is a process used to ensure that overall business...
 _________, on the other hand, are measures used to quantify...
Which is the commmand used to remove or delete file with out...
Which peripheral port provides the FASTEST throughput to laser...
How would you show a list of files and directories that are inside the...
Your sales manager complains that his Windows 7 computer is unable to...
A service level agreement is a part of a service contract where the...
What command line utility can you use to join a computer to a domain...
What feature gives Windows Server 2012 the ability to retrieve source...
Td p { margin-bottom: 0in; direction: ltr; color: rgb(0, 0, 10);...
What PowerShell command would you use to restart a computer?
A level covering all the generic Service Level Management issues...
Alert!

Advertisement