1.
Which of the following is a case sensitive text string used in wireless network and having a maxiumum length of 32 characters?
A. 
B. 
C. 
D. 
2.
You are selecting upgrade components for a PC. What sort of memory will you find specifically used in video?
A. 
B. 
C. 
D. 
3.
Which of the following statements about the compression feature of the NTFS file system are true? Choose two.
A. 
Compressed file on an NTFS volume can be read and written by any Windows-based application after they are decompressed
B. 
User can work with NTFS-compressed file without decompressing them
C. 
It supports compression only on volumes
D. 
It supports compression on volumes, folders, and files.
4.
Which of the following term is used for software designed and optimized for controlling what content is pertmitted to a reader, especially when it is used to restrict material delivered over the Web?
A. 
B. 
C. 
D. 
5.
How many pins are used in HDMI Type A and Type B connectors?
A. 
B. 
C. 
D. 
6.
Which of the following ports does not support hot pluggings?
A. 
B. 
C. 
D. 
7.
Which of the following refers to the process of verifying the identity of a person, network host, or system process?
A. 
B. 
C. 
D. 
8.
Which of the following techniques are used to secure wireless networks? Choose three
A. 
B. 
C. 
D. 
9.
You work as a Network Administrator for Infonet Inc. The companys office has a wireless netowork. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?
A. 
B. 
C. 
D. 
Internet service providers DNS server address
10.
Which of the following types of display takes the lease space on a desk?
A. 
B. 
C. 
D. 
11.
What is the maximum cable length that FireWire 800 supports?
A. 
B. 
C. 
D. 
12.
Which of the following statements about the XCPOPY command is true?
A. 
XCOPY /s copies system files only
B. 
XCOPY delectes all files and sub
C. 
XCOPY copies archived files only
D. 
XCOPY /s copies files and subdirectories
13.
Which of the following is the default resolution for a VGA monitor?
A. 
B. 
C. 
D. 
14.
Which of the following devices is used to provide visual input that can be easily transferred over the internet?
A. 
B. 
C. 
D. 
15.
Which of the following protocols are used by Network Attached Storage (NAS)?
A. 
Server Message Block (SMB)
B. 
Network File System (NFS)
C. 
Distributed file system (Dfs)
D. 
Apple Filing Protocol (AFP)
16.
Which of the following interfaces provides the fastest data transfer rate for printing a document on a printer?
A. 
B. 
C. 
D. 
17.
What is the thickness of Type II PCMCIA Card?
A. 
B. 
C. 
D. 
18.
Which of the following devices also works as a video capture card?
A. 
B. 
C. 
D. 
19.
Which of the following can be used to maintain data related to the user during navigation, possibly across multiple visits?
A. 
B. 
C. 
D. 
20.
Which of the following protocols allows an e-mail client to access e-mails that are stored ona remote mail server?
A. 
B. 
C. 
D. 
21.
You work as a Network Administrator for Infonet Inc. The company used Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?
A. 
Only users within the company
B. 
Only users with the correct WEP key
C. 
D. 
22.
Which of the following PCMCIA card supports hard disk drives?
A. 
B. 
C. 
D. 
23.
Which of the following statements about a serial port are true? Choose all that apply
A. 
It is used to connet a printer and a scanner to a computer
B. 
It sends data one bit at atime, over a single wire
C. 
It has 9-pin and 25-pin connectors on personal computers
D. 
It sends data eight bits at a time, over a single wire
24.
Which of the following statements about CPU throtting are true? Choose two
A. 
Is is a process of cutting down the CPU processing time for an application, which is malfunctioning
B. 
It is the process of running a computer component, such as CPU, at a higher clock rate than specified by th component manuuer
C. 
It prevents applications using more than a certain percentage of CPU time in a certain time frame
D. 
It is a method for minimizing performance bottlenecks and reducing network traffic by serving locally cached Web content
25.
Which of the following is an e-mail message retrieval protocol that allows e-mail clients to retrieve email messages from e-mail servers?
A. 
B. 
C. 
D.