Hardest Technical Support Quiz! Trivia

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rishabkumar
R
Rishabkumar
Community Contributor
Quizzes Created: 1 | Total Attempts: 9,904
| Attempts: 9,904 | Questions: 60
Please wait...
Question 1 / 60
0 %
0/100
Score 0/100
1. How many blocks of numbers make up an IP Address?

Explanation

An IP address is made up of four blocks of numbers. Each block can range from 0 to 255, and they are separated by periods. The four blocks together form a unique identifier for devices connected to a network.

Submit
Please wait...
About This Quiz
Hardest Technical Support Quiz! Trivia - Quiz

Challenge your skills with the Hardest Technical Support Quiz! Trivia, focusing on Windows XP. This quiz tests your knowledge on accessibility features, network troubleshooting, cryptographic operations, system recovery,... see moreand software issues. Perfect for enhancing technical support capabilities. see less

2. It is possible to close or show all active windows by using keyboard shortcuts.

Explanation

Keyboard shortcuts are a convenient way to perform various actions on a computer without using the mouse. Many operating systems and software applications provide keyboard shortcuts to close or show all active windows. By using these shortcuts, users can quickly and efficiently manage their open windows and switch between different tasks. Therefore, it is indeed possible to close or show all active windows using keyboard shortcuts.

Submit
3. If you use Windows Task Manager to close an application or to log off a user, you might cause data to be lost if opened files have not been saved.

Explanation

Closing an application or logging off a user through Windows Task Manager can abruptly terminate the program without giving it a chance to save any unsaved data. This can result in the loss of any changes made to files that were open in the application. Therefore, it is possible to cause data loss if opened files have not been saved before using Windows Task Manager to close an application or log off a user.

Submit
4. How to view ip address in Vista?

Explanation

To view the IP address in Vista, the correct command to use is "ipconfig". This command is used to display the IP configuration for all network interfaces on the computer. It provides information about the IP address, subnet mask, default gateway, and other network settings. By running the "ipconfig" command in the command prompt, the user can easily view their IP address in Vista.

Submit
5. You are using Norton 360 and unable to browse a few websites. What could be the reason to this?

Explanation

The reason for being unable to browse a few websites while using Norton 360 could be that the firewall settings of Norton are blocking access to those specific websites.

Submit
6.  A program that was compatible with Windows XP is not able to execute properly in vista. It is asking for some compatibility mode. What would you do to fix it?

Explanation

If a program that was compatible with Windows XP is not able to execute properly in Vista and is asking for compatibility mode, the best solution would be to use the program compatibility wizard and select the option "use an older program with this version of Windows." This option allows the program to run in a compatibility mode that emulates the environment of an older version of Windows, in this case, Windows XP. This can help resolve any compatibility issues and allow the program to run properly in Vista.

Submit
7. How would you troubleshoot the error "Windows Setup cannot locate a valid hard drive to store temporary installation files." that you might face during installation?

Explanation

This answer is correct because it provides a solution to the error message. It suggests checking the hard disk drives on the computer to ensure that they either have unallocated disk space or contain partitions with drive letters assigned to them. This is important because if the hard drives do not meet these criteria, the Windows Setup will not be able to locate a valid hard drive to store temporary installation files.

Submit
8. How can the operating system version that is currently running be found?

Explanation

To find the operating system version that is currently running, you can right click the My Computer icon and select Properties. This will open a window displaying information about the computer, including the operating system version.

Submit
9. A set of guidelines that allow different types of devices to communicate with each other is called a:

Explanation

A protocol is a set of guidelines that enables different types of devices to communicate with each other. It defines the rules and standards for data transmission, including the format, timing, and error control. By following the protocol, devices can understand and interpret the data being exchanged, ensuring effective and reliable communication. Modems, languages, and processes are all components that can be used in conjunction with protocols, but they do not encompass the entire concept of a set of guidelines for device communication.

Submit
10. The Internet is an example of a:

Explanation

The Internet is an example of a packet switched network because it breaks data into small packets and sends them individually across the network. These packets can take different routes to reach their destination, and they are reassembled at the receiving end. This method allows for efficient use of network resources and enables data to be transmitted in a more flexible and reliable manner compared to circuit switched or cell switched networks.

Submit
11. Host Not Found (11001) when you try to check or send mail in Eudora. The first step of troubleshooting should be?

Explanation

The correct answer is to go to Tools: Options: Getting Started and verify the settings, especially the login name, Mail Server (Incoming), and SMTP Server (Outgoing). This is because the error message "Host Not Found (11001)" suggests that there may be an issue with the server settings in Eudora. By checking and verifying these settings, it can help identify if there are any incorrect or missing configurations causing the error.

Submit
12. Which piece of equipment installs in a PC and allows the PC to connect to a network?

Explanation

A NIC (Network Interface Card) is a piece of equipment that can be installed in a PC to allow it to connect to a network. It provides the necessary hardware and software components for the PC to communicate with other devices on the network. A hub is a device that connects multiple devices together in a network, but it does not directly connect a PC to a network. An access router is a device used to connect different networks together, and a graphic accelerator card is used to enhance the performance of graphics on a PC.

Submit
13. Which uses tunneling?

Explanation

A VPN (Virtual Private Network) uses tunneling to create a secure and encrypted connection over a public network, such as the internet. Tunneling is the process of encapsulating data packets within other packets to ensure that the original data remains secure and private during transmission. By using tunneling, a VPN can establish a private and secure connection between remote users and a private network, allowing them to access resources and communicate securely over an untrusted network like the internet.

Submit
14. To which of the OSI layers does Router belong?

Explanation

Routers belong to the Network Layer of the OSI model. The Network Layer is responsible for routing and forwarding data packets between different networks. Routers use network layer protocols, such as IP (Internet Protocol), to determine the best path for data packets to reach their destination. They examine the destination IP address in the packet's header and make decisions based on routing tables to forward the packet to the next hop on the network. Routers also perform functions like network address translation (NAT) and firewalling to enhance network security.

Submit
15. Which of these file systems are supported by Windows XP SP2?

Explanation

Windows XP SP2 supports the FAT32 and NTFS file systems. FAT32 is an older file system that is compatible with both Windows and other operating systems, making it useful for sharing files between different platforms. NTFS is a more advanced file system that offers improved security, reliability, and performance. It is the default file system for Windows XP and provides features such as file and folder permissions, encryption, and compression. Therefore, Windows XP SP2 supports both FAT32 and NTFS file systems.

Submit
16. What is SSL?

Explanation

SSL stands for Secured Socket Layer. It is a protocol that provides secure communication over the internet. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted by unauthorized parties. It establishes a secure connection, authenticates the server, and encrypts the data being transmitted. SSL is commonly used to secure online transactions, such as credit card payments, online banking, and sensitive data transfers.

Submit
17. One of the customers has a disability that limits his working with both hands. You want to enable the accessibility feature on his Windows XP computer that will allow him to type using a virtual keyboard. What accessibility will you ask the user to enable?

Explanation

The correct accessibility feature that should be enabled for the customer with a disability that limits his working with both hands is the On Screen Keyboard. This feature provides a virtual keyboard on the computer screen that can be operated using a mouse or other pointing device, allowing the user to type without the need for physical keyboard input.

Submit
18. What is a GPF?

Explanation

The correct answer is "A Windows General Protection Fault." A GPF, or General Protection Fault, is an error that occurs in the Windows operating system when a program tries to access a protected memory location. It is a type of software exception that can cause the program to crash or freeze. This answer is correct because it accurately describes what a GPF is in the context of Windows operating systems.

Submit
19.  What is Windows Vista complete Pc backup and restore?

Explanation

Windows Vista complete PC backup and restore is an image-based backup tool that allows users to create a backup of their entire system. This means that it creates a snapshot of the entire operating system, including all files, settings, and programs. In the event of a system failure or data loss, users can use this backup to restore their entire system to its previous state. It is different from system restore, which only restores system files and settings, and also different from the Files and Settings Transfer Wizard, which only transfers files and settings to a new computer.

Submit
20. What performs all cryptographic operations in Windows XP?

Explanation

CryptoAPI performs all cryptographic operations in Windows XP. It is a set of programming interfaces that allows developers to add security features such as encryption, decryption, and digital signatures to their applications. CryptoAPI provides a consistent interface for accessing cryptographic services, including symmetric and asymmetric encryption algorithms, hashing algorithms, and key management. It also supports various cryptographic protocols and standards, making it a comprehensive solution for cryptographic operations in Windows XP.

Submit
21. A customer gets the error "Error Getting Network Address (11002)" or "Error Getting Network Address (11004)" when he tries to check or send mail using Eudora. How will locate the cause of the issue

Explanation

If a customer is getting the error "Error Getting Network Address (11002)" or "Error Getting Network Address (11004)" when trying to check or send mail using Eudora, the most likely cause of the issue is incorrect POP3 or SMTP server settings. This means that the customer has not entered the correct server information for their email account in Eudora. By verifying and correcting the POP3 and SMTP server settings, the issue should be resolved.

Submit
22. You are unable to browse the internet and in the network properties, you find that both IPv6 and IPv4 are enabled. What would you try to fix the internet issue?

Explanation

Enabling both IPv6 and IPv4 can sometimes cause conflicts and connectivity issues. By disabling IPv6 and leaving IPv4 enabled, it allows the device to prioritize IPv4 for internet connectivity. This can help resolve the internet issue and ensure a stable connection.

Submit
23. You get the following error at startup of Vista "Windows has blocked some startup programs" how would you troubleshoot this issue?

Explanation

To troubleshoot the issue of "Windows has blocked some startup programs" error at startup of Vista, you can try disabling UAC (User Account Control) and then restart the computer. This can help determine if UAC is causing the problem. Additionally, you can remove any unwanted startup programs permanently, as they might be triggering the error. By doing both a and b, you cover multiple potential causes of the issue and increase the chances of resolving it.

Submit
24. Which of these is the loop back address?

Explanation

The loop back address is used to test network connectivity on a local machine. In this case, the correct loop back address is 127.0.0.1. This address is reserved for the loop back interface, which allows a computer to send and receive data to itself. It is commonly used for troubleshooting network issues or testing network applications.

Submit
25. An external modem connects to a PC via:

Explanation

An external modem can connect to a PC via either a serial port or a USB port. Both of these ports can be used to establish a connection between the modem and the PC. The choice between the two would depend on the specific hardware and connectivity options available on the PC.

Submit
26. The TCP in TCP/IP stands for:

Explanation

The correct answer is Transmission Control Protocol. TCP is a core protocol of the Internet protocol suite and it provides reliable, ordered, and error-checked delivery of data between applications running on different hosts. It ensures that the data packets are transmitted in the correct order and without any errors. TCP is responsible for establishing and terminating connections between devices and it also handles flow control to prevent overwhelming the receiving device with too much data at once.

Submit
27. Clock speed is measured in

Explanation

Clock speed is a measure of how fast a computer's processor can execute instructions. It represents the number of cycles per second that the processor can complete. The unit of measurement for clock speed is Hertz, which is named after the German physicist Heinrich Hertz. Therefore, the correct answer is Hertz.

Submit
28. What port used in Pop3 protocol?

Explanation

Port 110 is the correct answer because it is the port used in the Pop3 protocol. Pop3, which stands for Post Office Protocol version 3, is an internet standard protocol used by email clients to retrieve emails from a mail server. Port 110 is specifically designated for Pop3 communication, allowing the email client to connect to the server and retrieve incoming mail.

Submit
29. You get a tech call from a distraught Windows XP user who can't get into Windows. He says he has a Recover CD from the manufacturer and plans to run it. What would you suggest?

Explanation

Trying to get the computer to boot into Safe Mode is suggested because it is a troubleshooting step that can help identify and resolve any issues that may be preventing the user from accessing Windows. Running the Recover CD may restore or return the system to factory settings, but it may also result in data loss. Reinstalling Windows using a Windows XP disc is not necessary at this stage and may be a more drastic solution.

Submit
30. Which of the following is not possible with the Recovery Console?

Explanation

The Recovery Console is a feature in Windows that allows users to repair their computer in the event of a system failure. It provides various tools and commands to troubleshoot and fix issues. However, one thing that is not possible with the Recovery Console is retrieving a forgotten administrative password. The Recovery Console does not have the capability to recover or reset passwords. This task requires separate tools or methods, such as using password reset disks or third-party software.

Submit
31. What is NAT?

Explanation

NAT stands for Network Address Translation. It is a process used in computer networks to convert private IP addresses into public IP addresses and vice versa, allowing devices on a private network to communicate with devices on the internet. This helps in conserving IP addresses and enhances network security by hiding the internal network structure.

Submit
32. You are trying to maximize your system resources to make your computer start faster. When you open the Windows System Configuration Utility to check which programs are loading at startup, you see a file called ccApp.exe. You want to know what will happen if you uncheck the program to stop it from loading on startup.

Explanation

Disabling ccApp.exe from loading at startup will prevent Norton AntiVirus or Norton Internet Security from functioning properly as ccApp.exe is an important component of these security programs. It is not a spyware, virus, or malware, but a legitimate program necessary for the proper functioning of Norton security software.

Submit
33. A router: 

Explanation

A router determines on which outgoing link a packet is to be forwarded. This is because routers are responsible for directing network traffic to its intended destination. When a packet arrives at a router, it examines the packet's destination address and uses its routing table to determine the appropriate outgoing link for the packet. The router then forwards the packet to that outgoing link, ensuring that it reaches its intended destination efficiently.

Submit
34. Before you can use any PC for a dial-up connection, what must be installed and configured on the PC?

Explanation

In order to establish a dial-up connection on a PC, a modem must be installed and configured. A modem is a hardware device that allows the computer to transmit and receive data over telephone lines. It converts the digital signals from the computer into analog signals that can be transmitted over the phone line, and vice versa. Without a modem, the PC would not be able to establish a connection with the dial-up network.

Submit
35. What is the Port number of HTTPS?

Explanation

HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that uses encryption to protect the communication between a web browser and a web server. The port number 443 is the designated port for HTTPS. When a user accesses a website using HTTPS, the web browser establishes a secure connection with the server on port 443, ensuring that the data transmitted between them is encrypted and secure from unauthorized access.

Submit
36. Which statement is true about starting the Recovery Console?

Explanation

The Recovery Console can be accessed in two ways: it can be installed as an advanced startup option, or it can be started from the installation CD. This means that users have the flexibility to choose how they want to access the Recovery Console, depending on their specific needs and preferences. They can either install it as an advanced startup option, which allows them to access it directly from the boot menu, or they can start it from the installation CD if they prefer. This flexibility ensures that users can easily access the Recovery Console when needed, regardless of their system setup.

Submit
37. Which feature of Microsoft Internet Explorer 7 is available only when it is used with Windows Vista?

Explanation

Running in Protected Mode is a feature of Microsoft Internet Explorer 7 that is available only when it is used with Windows Vista. This feature enhances the security of the browser by isolating it from the rest of the operating system. It prevents malicious software from accessing system files and settings, providing a safer browsing experience for the user.

Submit
38. Which of the following files is used to resolve web site names (FQDN) to IP addresses in a Windows XP based computer when a WINS server is unavailable?

Explanation

The HOSTS file is used to resolve web site names (FQDN) to IP addresses in a Windows XP based computer when a WINS server is unavailable. This file is a local text file that contains mappings of IP addresses to host names. When a user enters a web site name, the computer first checks the HOSTS file to see if there is a corresponding IP address. If there is, it uses that IP address to connect to the website. If not, it will then try to resolve the name using other methods such as DNS.

Submit
39. Customer calls and says that whenever he right clicks on a File/Folder and clicks on delete, it does not go into the Recycle Bin, but gets permanently deleted. What will you do to fix this problem for the customer?

Explanation

The correct answer is to right click on Recycle Bin, select Properties, and uncheck. By unchecking the option, the files and folders will no longer get permanently deleted when the customer right clicks and selects delete. Instead, they will be sent to the Recycle Bin where they can be restored if needed.

Submit
40. How would you troubleshoot the following error "Windows is unable to find a system volume which meets its criteria for installation"?

Explanation

The error message "Windows is unable to find a system volume which meets its criteria for installation" indicates that there is an issue with the system volume that Windows needs to install. One possible cause of this error is the presence of a USB device attached to the system. Removing any USB device attached to the system can resolve this issue by ensuring that Windows can properly detect and install on the system volume.

Submit
41. What are the main operating system files required for a successful boot of Windows 2000/XP?

Explanation

The main operating system files required for a successful boot of Windows 2000/XP are NTLDR, NTDETECT.COM, and BOOT.INI. NTLDR (NT Loader) is responsible for loading the operating system kernel and starting the boot process. NTDETECT.COM is used to detect hardware devices during the boot process. BOOT.INI is a configuration file that contains information about the operating systems installed on the computer and their boot options. These three files work together to initiate and configure the boot process for Windows 2000/XP.

Submit
42. A user reports that he has lost his Windows XP CD however he had earlier taken the backup of the Windows XP Home CD on one of the partitions of his computer. He also informs that the partitions on the hard drive are FAT 32. The customer has windows ME boot disk and wishes to do a parallel install. What will you advise the customer to do?

Explanation

The customer should be advised to boot with the Windows Me CD and run winnt.exe from the XP backup. Since the customer has lost his Windows XP CD, using the backup on one of the partitions is the best option. Additionally, since the partitions on the hard drive are FAT 32, it is compatible with both Windows Me and Windows XP. Running winnt.exe from the XP backup will allow the customer to perform a parallel install of Windows XP.

Submit
43. Which of the following run line command can be used to open Excel in safe mode:

Explanation

The correct answer is "Excel /safe" because the /safe command line switch is used to start Excel in safe mode. Safe mode allows Excel to start without loading any add-ins or customization files, which can help troubleshoot issues caused by these elements.

Submit
44. Which Windows Vista application replaces the collaboration and application-sharing features previously available in Microsoft Windows NetMeeting?

Explanation

Windows Meeting Space is the correct answer because it is the Windows Vista application that replaces the collaboration and application-sharing features previously available in Microsoft Windows NetMeeting. Windows Easy Transfer is used for transferring files and settings from one computer to another. Windows Calendar is a calendar application, and Windows Online Meeting is not a known Windows Vista application.

Submit
45. Which feature in Windows Vista can users enable to visually indicate network activity?

Explanation

The logical network map in the Network and Sharing Center is the feature in Windows Vista that users can enable to visually indicate network activity. This feature provides a graphical representation of the network connections and displays the activity on each connection, allowing users to easily see if there is any network activity happening. It helps users monitor their network connections and identify any issues or disruptions in the network.

Submit
46. Your computer freezes on the Windows startup screen during boot. What is the most likely cause of the problem?

Explanation

The most likely cause of the computer freezing on the Windows startup screen is an error in the BOOT.INI file. The BOOT.INI file is responsible for loading the operating system, and if it is corrupt or contains errors, it can prevent the computer from properly starting up. This can result in the computer freezing on the startup screen.

Submit
47. While trying to uninstall Norton Antivirus on a Windows XP based computer, you get a message - Error 1719. The Windows Installer service could not be accessed. What would be one of the basic steps we would perform to troubleshoot this issue?

Explanation

To troubleshoot the "Error 1719" message and resolve the issue, one of the basic steps would be to re-register the Windows Installer. Re-registering the Windows Installer can help fix any issues with its configuration or registration, allowing it to be accessed properly. This can be done by opening the command prompt as an administrator and running the command "msiexec /unregister" followed by "msiexec /regserver". This will unregister and then re-register the Windows Installer, potentially resolving the problem.

Submit
48. Which of these is an Email client?

Explanation

All the options given are examples of Email clients. Lotus Notes and Outlook Express are both popular email clients used for managing and sending emails. Therefore, "All the above" is the correct answer as it includes both Lotus Notes and Outlook Express.

Submit
49. You suspect your system is failing to boot because of a corrupt master boot record. Which utility is the best to fix this?

Explanation

The Recovery Console is the best utility to fix a corrupt master boot record. The Recovery Console is a command-line tool available in Windows operating systems that allows users to perform advanced troubleshooting and repair tasks, including fixing boot-related issues. It provides access to various system recovery options and allows users to manually repair the master boot record, which is responsible for loading the operating system. By using the Recovery Console, users can restore the master boot record to its original state and resolve booting problems caused by corruption.

Submit
50. Which of the following dictionary file is used to store the words added by users in MS Word:

Explanation

The correct answer is "Custom.dic". In MS Word, the "Custom.dic" dictionary file is used to store the words added by users. This file allows users to personalize their spell check by adding new words to the dictionary. It is separate from the default dictionary files and can be customized according to the user's preferences.

Submit
51. What command should you run to check and fix corrupt system files, DLLs, and other critical files?

Explanation

The correct answer is "SFC /SCANNOW." The SFC (System File Checker) command is used to scan and repair corrupt system files, DLLs, and other critical files in Windows. Running this command will check the integrity of these files and replace any corrupt or missing ones with a cached copy stored in a compressed folder at %WinDir%\System32\dllcache. This helps to ensure the stability and proper functioning of the operating system.

Submit
52. Creating Identities in Outlook Express is equivalent to creating what in Eudora?

Explanation

Creating Identities in Outlook Express is equivalent to creating Personalities in Eudora. Personalities in Eudora allow users to manage multiple email accounts and send emails from different identities. Similarly, Identities in Outlook Express enable users to manage multiple email accounts, each with its own settings, signatures, and email folders. Both features provide a convenient way to separate and organize emails from different accounts or personalities within the email client.

Submit
53. Which of the following files can be downloaded from the Symantec site in order to remove the Norton antivirus 2003 and earlier versions

Explanation

Rnav2003.exe is the correct answer because it is a file that can be downloaded from the Symantec site specifically for the purpose of removing Norton antivirus 2003 and earlier versions. The other files listed are not specifically designed for this purpose.

Submit
54. How to open task Manager?

Explanation

The correct answer is "Only 1 and 3". This is because pressing CTRL+Shift+Esc or CTRL+ALT+DEL opens the task manager in Windows operating systems. CTRL+ALT+ESC is not a valid shortcut to open the task manager. Therefore, options 2, 4, and 6 are incorrect.

Submit
55. You are in charge of managing migration of user state data from existing Windows 2000 Professional computers to recently purchased Windows XP Professional computers. Which of the following is the migration tool?

Explanation

Fastwiz.exe is the migration tool in this scenario. Fastwiz.exe is a utility that allows for the migration of user state data from one computer to another. It is specifically designed for migrating user state data from Windows 2000 Professional computers to Windows XP Professional computers. Sysprep is a tool used for preparing Windows installations for imaging and deployment, while Setupmgr is a tool used for creating answer files for unattended installations. Therefore, the correct answer is Fastwiz.exe.

Submit
56. You are a desktop support technician. A user calls & complains that till yesterday he was able to view his CD drive in My Computer. Now today when he turned his computer on he is not able to view the CD drive. What could be done to fix the problem?

Explanation

By opening the registry editor and deleting the Upper and Lower filter keys, it is possible to fix the problem with the CD drive not being visible in My Computer. The Upper and Lower filter keys are registry entries that can sometimes cause issues with CD/DVD drives. By removing these keys, it can resolve any conflicts or errors that may be preventing the CD drive from being recognized by the operating system.

Submit
57. What is the best way to replace a corrupted Registry with an earlier, good version?

Explanation

The best way to replace a corrupted Registry with an earlier, good version is to boot from the installation CD and perform an upgrade install. This option allows for a fresh installation of the operating system while preserving user files and settings. It replaces the entire system, including the Registry, with a clean version from the installation CD. This ensures that any corruption or errors in the previous Registry are completely resolved.

Submit
58. Launch command for Outlook Express from run window is:

Explanation

The launch command for Outlook Express from the run window is "Msimn".

Submit
59. What is the command to install recovery console on a computer? (Assume x: is the CD drive)

Explanation

The correct answer is x:\i386\winnt32.exe /cmdcons. This command is used to install the recovery console on a computer. The "/cmdcons" parameter specifies that the command console should be installed. The "x:\i386\winnt32.exe" is the path to the installation file for the recovery console.

Submit
60. What are the proper steps for repairing a Windows XP system with an Emergency Repair Disk?

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 29, 2011
    Quiz Created by
    Rishabkumar
Cancel
  • All
    All (60)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
How many blocks of numbers make up an IP Address?
It is possible to close or show all active windows by using keyboard...
If you use Windows Task Manager to close an application or to log off...
How to view ip address in Vista?
You are using Norton 360 and unable to browse a few websites. What...
 A program that was compatible with Windows XP is not able to...
How would you troubleshoot the error "Windows Setup cannot locate...
How can the operating system version that is currently running be...
A set of guidelines that allow different types of devices to...
The Internet is an example of a:
Host Not Found (11001) when you try to check or send mail in Eudora....
Which piece of equipment installs in a PC and allows the PC to connect...
Which uses tunneling?
To which of the OSI layers does Router belong?
Which of these file systems are supported by Windows XP SP2?
What is SSL?
One of the customers has a disability that limits his working with...
What is a GPF?
 What is Windows Vista complete Pc backup and restore?
What performs all cryptographic operations in Windows XP?
A customer gets the error "Error Getting Network Address...
You are unable to browse the internet and in the network properties,...
You get the following error at startup of Vista "Windows has...
Which of these is the loop back address?
An external modem connects to a PC via:
The TCP in TCP/IP stands for:
Clock speed is measured in
What port used in Pop3 protocol?
You get a tech call from a distraught Windows XP user who can't get...
Which of the following is not possible with the Recovery Console?
What is NAT?
You are trying to maximize your system resources to make your computer...
A router: 
Before you can use any PC for a dial-up connection, what must be...
What is the Port number of HTTPS?
Which statement is true about starting the Recovery Console?
Which feature of Microsoft Internet Explorer 7 is available only when...
Which of the following files is used to resolve web site names (FQDN)...
Customer calls and says that whenever he right clicks on a File/Folder...
How would you troubleshoot the following error "Windows is unable to...
What are the main operating system files required for a successful...
A user reports that he has lost his Windows XP CD however he had...
Which of the following run line command can be used to open Excel in...
Which Windows Vista application replaces the collaboration and...
Which feature in Windows Vista can users enable to visually indicate...
Your computer freezes on the Windows startup screen during boot. What...
While trying to uninstall Norton Antivirus on a Windows XP based...
Which of these is an Email client?
You suspect your system is failing to boot because of a corrupt master...
Which of the following dictionary file is used to store the words...
What command should you run to check and fix corrupt system files,...
Creating Identities in Outlook Express is equivalent to creating what...
Which of the following files can be downloaded from the Symantec site...
How to open task Manager?
You are in charge of managing migration of user state data from...
You are a desktop support technician. A user calls & complains...
What is the best way to replace a corrupted Registry with an earlier,...
Launch command for Outlook Express from run window is:
What is the command to install recovery console on a computer? (Assume...
What are the proper steps for repairing a Windows XP system with an...
Alert!

Advertisement