Windows Admin

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Abrunn11
A
Abrunn11
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,294
Questions: 95 | Attempts: 3,297

SettingsSettingsSettings
Windows Admin - Quiz

How much do you truly know about Windows Admin? Today we’ll be putting you through a gauntlet of questions about the operating system, various system requirements and everything in between to find out just that.


Questions and Answers
  • 1. 

    Which control panle is used to make changes to your workstation's name?

    • A.

      Multimedia

    • B.

      Display

    • C.

      Network

    • D.

      System

    Correct Answer
    D. System
    Explanation
    The correct answer is System. The System control panel is used to make changes to your workstation's name. This control panel allows you to modify various settings and configurations related to your computer's operating system, including the computer name. By accessing the System control panel, you can change the name of your workstation to suit your preferences or organizational requirements.

    Rate this question:

  • 2. 

    The taskbar must always be visually present on the bottom of the screen.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because the taskbar can be visually present on any side of the screen, not just the bottom. Users have the flexibility to customize the taskbar's position according to their preferences. They can choose to have it on the left, right, or top of the screen as well.

    Rate this question:

  • 3. 

    When installing Windows XP, you are only given one partition option.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    When installing Windows XP, you are not only given one partition option. Windows XP allows users to choose between different partition options based on their preferences and requirements. Users can create multiple partitions, resize existing partitions, or choose to install Windows XP on an existing partition. This flexibility in partition options allows users to customize their installation process according to their specific needs. Therefore, the given statement is false.

    Rate this question:

  • 4. 

    According to Microsoft, the recommended minimum RAM required to install Windows XP Professional is:

    • A.

      8 MB

    • B.

      128 MB

    • C.

      1,024 MB

    • D.

      4 GB

    Correct Answer
    B. 128 MB
    Explanation
    The recommended minimum RAM required to install Windows XP Professional is 128 MB. This is because Windows XP Professional is a relatively lightweight operating system compared to newer versions of Windows, and it can run reasonably well with this amount of memory. However, it is important to note that this is the minimum requirement and having more RAM, such as 256 MB or higher, would provide better performance and allow for smoother multitasking.

    Rate this question:

  • 5. 

    According to Microsoft, the recommended minimum hard drive space required to install Windows XP Professional is:

    • A.

      400 MB

    • B.

      800 MB

    • C.

      1.5 GB

    • D.

      25 GB

    Correct Answer
    C. 1.5 GB
    Explanation
    The correct answer is 1.5 GB. This is the recommended minimum hard drive space required to install Windows XP Professional according to Microsoft.

    Rate this question:

  • 6. 

    According to Microsoft, the recommended minimum processor speed required to install Windows XP Professional is:

    • A.

      300 MHz

    • B.

      850 MHz

    • C.

      2.6 GHz

    • D.

      12 GHz

    Correct Answer
    A. 300 MHz
    Explanation
    The recommended minimum processor speed required to install Windows XP Professional is 300 MHz. This means that the processor of the computer must have a speed of at least 300 MHz in order to properly run and install the operating system.

    Rate this question:

  • 7. 

    What is the folder name on the installation CD that should be copied to the root of the C: drive immediately after installing Windows XP?

    • A.

      Driver Assistance

    • B.

      Compatibility Assistance

    • C.

      F497

    • D.

      I386

    Correct Answer
    D. I386
    Explanation
    After installing Windows XP, the folder name "i386" on the installation CD should be copied to the root of the C: drive. This folder contains essential files and drivers necessary for the functioning of the operating system. By copying it to the root of the C: drive, the system can easily access these files when needed, ensuring smooth operation and compatibility with various hardware components.

    Rate this question:

  • 8. 

    If you want to ensure your Windows OS has the lastest updates, the best site to visit is:

    • A.

      Update.mywindows.com

    • B.

      Microsoft.com/updatemyos

    • C.

      Update.microsoft.com

    • D.

      Microsoft.update.com

    Correct Answer
    C. Update.microsoft.com
    Explanation
    The best site to visit for ensuring the latest updates for Windows OS is update.microsoft.com. This is because Microsoft is the official provider of Windows updates and their website is specifically dedicated to providing these updates. The other options mentioned, such as update.mywindows.com and microsoft.com/updatemyos, are not recognized as official sources for Windows updates.

    Rate this question:

  • 9. 

    Passwords are case sensitive.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Passwords being case sensitive means that the system differentiates between uppercase and lowercase letters when checking the validity of a password. For example, if a password is "Password123", typing "password123" or "PASSWORD123" would be considered incorrect. Therefore, the correct answer is "True".

    Rate this question:

  • 10. 

    By default, all files written in WordPad have a .txt extension as part of their name when saved.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    WordPad is a text editing program that saves files with a .rtf (Rich Text Format) extension by default, not a .txt extension. Therefore, the given statement is false.

    Rate this question:

  • 11. 

    Which groups would have rights to make a copy of a particular user in order to cross domains?

    • A.

      Power Users

    • B.

      Backup Operators

    • C.

      Users

    • D.

      Replicators

    Correct Answer
    D. Replicators
    Explanation
    Replicators would have the rights to make a copy of a particular user in order to cross domains. Replicators are a group that is specifically designated for the purpose of replicating directory information between domain controllers in different domains. They are responsible for ensuring that changes made in one domain are replicated to other domains. Therefore, they would have the necessary permissions to create copies of users across domains.

    Rate this question:

  • 12. 

    Which Groups would have rights to unlock a workstation when the person who locked it is no longer available

    • A.

      Administrators

    • B.

      Backup Operators

    • C.

      Users

    • D.

      Replicator

    Correct Answer
    A. Administrators
    Explanation
    Administrators would have the rights to unlock a workstation when the person who locked it is no longer available. Administrators typically have full control and privileges over a system, including the ability to manage user accounts and access permissions. Therefore, they would have the necessary authority to unlock a workstation in such a situation.

    Rate this question:

  • 13. 

    Which group has rights to make copies of any information with archived property rights checked?

    • A.

      Power Users

    • B.

      Backup Operators

    • C.

      Users

    • D.

      Replicator

    Correct Answer
    B. Backup Operators
    Explanation
    Backup Operators have the rights to make copies of any information with archived property rights checked. They are specifically designated to perform backup and restore operations on a computer system. This includes the ability to make copies of files and folders, including those with archived property rights. Other user groups such as Power Users, Users, and Replicator do not have the same level of permissions and rights as Backup Operators in this context.

    Rate this question:

  • 14. 

    What group has many of the rights needed to add drivers or some software but not to unlock a workstation?

    • A.

      Power Users

    • B.

      Backup Operators

    • C.

      Users

    • D.

      Replicator

    Correct Answer
    A. Power Users
    Explanation
    Power Users is the correct answer because this group in a computer system has the necessary rights and permissions to add drivers or software to the system. However, they do not have the authority to unlock a workstation, which is a separate privilege typically reserved for administrators or higher-level user groups.

    Rate this question:

  • 15. 

    When you make a new user in Windows XP, by default he/she becomes a member of the Power Users group.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    By default, when a new user is created in Windows XP, they do not become a member of the Power Users group. Instead, they become a member of the Users group. The Power Users group has additional privileges and permissions compared to the Users group.

    Rate this question:

  • 16. 

    Where would you go in order to force your users to change their passwords the next time they log in?

    • A.

      Computer management admin tool

    • B.

      Server control panel

    • C.

      Users and Passwords control panel

    • D.

      Local Security Policy admin tool

    Correct Answer
    A. Computer management admin tool
    Explanation
    You would go to the Computer Management admin tool in order to force your users to change their passwords the next time they log in. This tool allows you to manage various aspects of your computer, including user accounts and passwords. By accessing the user accounts section in the Computer Management admin tool, you can enforce password changes for your users, ensuring that they are prompted to change their passwords the next time they log in.

    Rate this question:

  • 17. 

    If a user is reporting they have entered their password unsuccessfully multiple times and cannot log in, what is the cause?

    • A.

      Their account needs to be restored

    • B.

      Their account is awaiting activation

    • C.

      Their account is locked

    • D.

      Their account needs to have a username applied

    Correct Answer
    C. Their account is locked
    Explanation
    If a user is reporting that they have entered their password unsuccessfully multiple times and cannot log in, the cause is most likely that their account is locked. This could be due to security measures in place to protect the account from unauthorized access. To resolve this issue, the user may need to contact the appropriate support or administrator to unlock their account and regain access.

    Rate this question:

  • 18. 

    If a user forgets their password, an administrator can look up their password for them.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is incorrect. In a secure system, passwords are typically stored in a hashed or encrypted format, which means they cannot be easily retrieved by an administrator or anyone else. Instead, when a user forgets their password, the administrator can usually assist them in resetting their password or providing them with a temporary password to regain access to their account.

    Rate this question:

  • 19. 

    When using Computer Management to create a new account, Windows asks you to supply a user's full name.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    When creating a new account using Computer Management in Windows, the operating system prompts the user to provide the full name of the user. This is because Windows uses the full name to identify the user and display it in various places, such as the login screen and user directories. By providing the full name, Windows can personalize the user's experience and ensure proper identification and organization of user accounts.

    Rate this question:

  • 20. 

    When using Computer Management to create a new account, Windows Forces you to supply a description of the user before you are allowed to create the account.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    When using Computer Management to create a new account, Windows does not force you to supply a description of the user before creating the account. This means that the statement is false.

    Rate this question:

  • 21. 

    If I were to install a program via CD, i would typically look for the _____________ file if the installation doesn't run automatically.

    • A.

      Getstarted.exe

    • B.

      Installation.ini

    • C.

      Installation.dll

    • D.

      Setup.exe

    Correct Answer
    D. Setup.exe
    Explanation
    When installing a program via CD, the typical file to look for if the installation doesn't run automatically is "setup.exe". This file is commonly used as the installer for software applications and is responsible for initiating the installation process. It may contain various instructions and configurations necessary for the program to be installed correctly on the computer.

    Rate this question:

  • 22. 

    The latest and greatest applications on the market today are __-bit applications.

    • A.

      16

    • B.

      32

    • C.

      64

    • D.

      128

    Correct Answer
    C. 64
    Explanation
    The latest and greatest applications on the market today are 64-bit applications. This means that these applications are designed to run on 64-bit operating systems, which offer several advantages over 32-bit systems. 64-bit applications can access more memory, allowing for improved performance and the ability to handle larger data sets. They also offer better security features and compatibility with newer hardware. Overall, 64-bit applications are more advanced and capable than their 32-bit counterparts, making them the preferred choice for modern software development.

    Rate this question:

  • 23. 

    If I were installing a 32-bit application from my computer, what would be the most common way to go about it?

    • A.

      Start, Programs, Accessories, System Tools, Disk Defragmenter

    • B.

      Start (Settings), Printers and Faxes, Add or Remove Programs

    • C.

      Start (Settings), Control Panel, Add or Remove Programs

    • D.

      Start, Program, Accessories, Communication, IP Telephony

    Correct Answer
    C. Start (Settings), Control Panel, Add or Remove Programs
    Explanation
    The most common way to install a 32-bit application from a computer is to go to the "Start" menu, then click on "Settings" and select "Control Panel". From there, you can choose "Add or Remove Programs" to install the application.

    Rate this question:

  • 24. 

    If I were to remove a DOS application from my computer, I would take the exact same steps as I would to remove a 32-bit application.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because removing a DOS application and removing a 32-bit application would involve different steps. DOS applications are typically removed by deleting their files or uninstalling them using specific commands, while 32-bit applications are usually uninstalled through the control panel or using an uninstaller program. Therefore, the steps to remove these two types of applications would not be the same.

    Rate this question:

  • 25. 

    Windows runs programs within the NT kernel since it makes sense to have the OS crash if an application crashes.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. Windows does not run programs within the NT kernel with the intention of having the OS crash if an application crashes. In fact, Windows uses a protected memory model where each application runs in its own isolated process, separate from the kernel. This design ensures that if an application crashes, it does not affect the stability of the entire operating system. The NT kernel provides a layer of abstraction and manages system resources, but it is not directly responsible for running applications.

    Rate this question:

  • 26. 

    If I install a printer through another computer (workstation or server), I still have to obtain the driver on my own every time; it isn't possible to have the driver provided for me automatically.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. When installing a printer through another computer (workstation or server), it is possible for the driver to be provided automatically. This can be achieved through a process called driver sharing or driver deployment, where the driver is installed on the server or workstation and then made available to other computers on the network. This eliminates the need for each individual computer to obtain the driver separately.

    Rate this question:

  • 27. 

    If I am going to install a networked printer as a local printer on my computer, I just need the following two items:

    • A.

      Printer model number and serial number

    • B.

      Printer driver information for the make/model and location in the building

    • C.

      Printer IP address and location in the building

    • D.

      Printer IP address and driver files for that make/model

    Correct Answer
    D. Printer IP address and driver files for that make/model
    Explanation
    To install a networked printer as a local printer on a computer, two items are required: the printer's IP address and the driver files for the specific make and model of the printer. The IP address is necessary to establish a connection between the computer and the printer over the network. The driver files are needed to enable the computer to communicate with and control the printer, ensuring compatibility and proper functioning.

    Rate this question:

  • 28. 

    PS drivers are much "lighter" to use over PCL print drivers since they don't have as much "overhead" communication.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement suggests that PS drivers are lighter to use over PCL print drivers because they have less overhead communication. However, the correct answer is False. This implies that the statement is incorrect and PS drivers are not necessarily lighter to use compared to PCL print drivers.

    Rate this question:

  • 29. 

    Which of the following paths would likely provide me connectivity to a printer assuming a printer in installed on a lab workstation with the naming convention we have been using and that computer is powered on:

    • A.

      \G30-TB\Printer

    • B.

      \G30-SM\4050n_Printer

    • C.

      \\G30-DR\i386

    • D.

      \\G30-WA\4050n_Printer

    Correct Answer
    D. \\G30-WA\4050n_Printer
    Explanation
    The correct answer is \\G30-WA\4050n_Printer. This path follows the naming convention we have been using and specifies the location of the printer on the lab workstation with the name G30-WA.

    Rate this question:

  • 30. 

    If I were to share out my printer, that would mean that I would be responsible for sharing out paper for that printer as well.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement suggests that if someone shares their printer, they would also be responsible for sharing paper for that printer. However, this is not necessarily true. Sharing a printer does not automatically imply sharing paper as well. It is possible for individuals to share a printer while each person provides their own paper. Therefore, the answer is false.

    Rate this question:

  • 31. 

    Which of the following is not an applicable share permission?

    • A.

      Read

    • B.

      Change

    • C.

      List Folder Contents

    • D.

      Full Control

    Correct Answer
    C. List Folder Contents
    Explanation
    List Folder Contents is not an applicable share permission because it is a permission that applies to folders, not shares. The other three permissions (Read, Change, and Full Control) are applicable share permissions that determine the level of access a user has to the shared resources.

    Rate this question:

  • 32. 

    Which of the following share permissions is granted by default when initially sharing out a folder?

    • A.

      Full Control

    • B.

      Change

    • C.

      List Folder Contents

    • D.

      None of the Above

    Correct Answer
    D. None of the Above
    Explanation
    When initially sharing out a folder, none of the above share permissions are granted by default. The default share permission is usually set to "Read" access, which allows users to view the contents of the folder but not make any changes or modifications. Full Control, Change, and List Folder Contents are all higher-level permissions that need to be explicitly granted by the folder owner or administrator.

    Rate this question:

  • 33. 

    Share permissions need to be set to restrict/allow access for ________users.

    • A.

      Local

    • B.

      Remote

    • C.

      None-authenticated

    • D.

      All of the Above

    Correct Answer
    B. Remote
    Explanation
    Share permissions need to be set to restrict/allow access for remote users. This means that the permissions can be configured to allow or deny access to files or folders for users who are accessing them remotely, such as over a network or through the internet. By setting share permissions, administrators can control the level of access that remote users have to shared resources.

    Rate this question:

  • 34. 

    Specifically setting the "Deny" permission should be used as a last resort due to the fact that it can lead to troubleshooting difficulty in the future.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Setting the "Deny" permission should be used as a last resort because it can create troubleshooting difficulties in the future. When the "Deny" permission is set, it overrides any other permissions granted to a user or group, effectively blocking their access. This can make it challenging to identify and resolve issues later on, as it may not be immediately clear why a user is being denied access. It is generally recommended to use other permission settings first and only resort to "Deny" when absolutely necessary.

    Rate this question:

  • 35. 

    There is no need to distinguish between share and NTFS permissions; they mean the same thing and have the same capabilities.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false. Share permissions and NTFS permissions are two different types of permissions in Windows operating systems. Share permissions control access to shared folders over a network, while NTFS permissions control access to files and folders on the local file system. Although they both regulate access, they have different capabilities and are applied at different levels. Share permissions are applied to the shared folder itself, while NTFS permissions are applied to individual files and folders within the shared folder. Therefore, it is important to distinguish between share and NTFS permissions.

    Rate this question:

  • 36. 

    Which of the following NTFS permissions can be applied to specifically allow users to edit existing content?

    • A.

      Modify

    • B.

      Read and Execute

    • C.

      Read

    • D.

      Write

    Correct Answer
    A. Modify
    Explanation
    The Modify NTFS permission allows users to edit existing content. This permission grants the user the ability to make changes to files and folders, including creating new files, modifying existing files, deleting files, and changing file attributes. It provides a higher level of access compared to the Read and Write permissions, as it includes both read and write capabilities. The Modify permission is useful for users who need to make changes to files or folders without having full control over them.

    Rate this question:

  • 37. 

    Which of the following specific NTFS permissions needs to be applied to allow users to do whatever they chose within the folder the permissions are set at and, by default, any subfilder therein?

    • A.

      Modify

    • B.

      Read

    • C.

      Full Control

    • D.

      None of the Above

    Correct Answer
    C. Full Control
    Explanation
    The specific NTFS permission that needs to be applied to allow users to do whatever they chose within the folder and its subfolders is "Full Control". This permission grants users the ability to perform all actions, including modifying files, deleting files, creating new files, and changing permissions. It provides the highest level of access and control over the folder and its contents.

    Rate this question:

  • 38. 

    It is possible to allow NTFS permissions to cascade down to subfolders.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    NTFS permissions can be set to cascade down to subfolders, meaning that the permissions set on a parent folder can be inherited by its subfolders. This allows for easier management of permissions, as changes made to the parent folder's permissions will automatically apply to all subfolders. This can be useful in situations where you want to grant or restrict access to multiple folders within a directory hierarchy without having to individually set permissions for each folder.

    Rate this question:

  • 39. 

    For ease of administration, one method is to set share permissions to ___________ for the Everyone group and the modify _________________ permissions accordingly.

    • A.

      1. Read and Execute; 2. individual

    • B.

      1. Modify; 2. Group

    • C.

      1. Full Control; 2. NTFS

    • D.

      1. Write; 2. share

    Correct Answer
    C. 1. Full Control; 2. NTFS
    Explanation
    To ensure ease of administration, it is suggested to set share permissions to "Full Control" for the Everyone group. This allows all users to have complete control over the shared resource. Then, the modify permissions can be adjusted accordingly using NTFS permissions. NTFS permissions enable more granular control over individual users or groups, allowing specific actions such as read, write, execute, etc. This approach ensures that the Everyone group has the necessary access to the shared resource, while still allowing for more specific modifications through NTFS permissions.

    Rate this question:

  • 40. 

    When a share name ends in a dollar sign, it is a _________ share

    • A.

      NTFS

    • B.

      Read

    • C.

      Hidden

    • D.

      Execute

    Correct Answer
    C. Hidden
    Explanation
    When a share name ends in a dollar sign, it is a hidden share. Hidden shares are not visible when browsing the network, and their names are typically followed by a dollar sign to indicate their hidden status. These shares are often used for administrative purposes and are not intended for regular user access.

    Rate this question:

  • 41. 

    The Windows XP operating system has a special program called _________ that allows you to shut down programs that are in endless loops.

    • A.

      Explorer

    • B.

      Task Manager

    • C.

      Help

    • D.

      UserManager

    Correct Answer
    B. Task Manager
    Explanation
    The correct answer is Task Manager. Task Manager is a special program in Windows XP that allows users to shut down programs that are in endless loops. It provides a way to view and manage running processes, monitor system performance, and end unresponsive applications. By accessing Task Manager, users can identify and terminate programs that are causing issues or consuming excessive system resources, helping to improve overall system stability and performance.

    Rate this question:

  • 42. 

    Usernames are case sensitive.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Usernames are case sensitive means that the system distinguishes between uppercase and lowercase letters when considering the username. In this case, the correct answer is "False" because usernames are not case sensitive. This means that the system treats uppercase and lowercase letters as the same when it comes to usernames. For example, if a username is "JohnDoe", "johndoe" or "JOHNDOE" would be considered the same username in the system.

    Rate this question:

  • 43. 

    What button do you need to hold down to avoid having to empty the trash after dragging and dropping a file there?

    • A.

      Shift

    • B.

      Control

    • C.

      Tab

    • D.

      Backspace

    Correct Answer
    A. Shift
    Explanation
    To avoid having to empty the trash after dragging and dropping a file there, you need to hold down the Shift button. When you hold down the Shift button while dragging and dropping a file into the trash, it bypasses the trash and permanently deletes the file.

    Rate this question:

  • 44. 

    Which of the following is not found on the Windows Security dialog box?

    • A.

      Shutdown

    • B.

      Change Password

    • C.

      Sharing

    • D.

      Task Manager

    Correct Answer
    C. Sharing
    Explanation
    The option "Sharing" is not found on the Windows Security dialog box. The Windows Security dialog box typically includes options related to user accounts, passwords, system settings, and security features. Sharing, on the other hand, is a feature that allows users to share files, folders, and printers with other users or devices on a network. It is not directly related to security settings and therefore not included in the Windows Security dialog box.

    Rate this question:

  • 45. 

    Where can you go to change your password?

    • A.

      The main screen of the Systems Properties window

    • B.

      User Accounts Control Panel

    • C.

      Both of the Above

    • D.

      None of the Above

    Correct Answer
    B. User Accounts Control Panel
    Explanation
    The User Accounts Control Panel is the correct answer because it is the specific location in which users can go to change their password. The main screen of the Systems Properties window may have various options and settings, but it does not specifically provide the option to change passwords. Therefore, "Both of the Above" is not the correct answer. "None of the Above" is also incorrect as the User Accounts Control Panel is indeed the appropriate place to change passwords.

    Rate this question:

  • 46. 

    It is not important that you properly shut down Windows XP Professional every time you power down your system.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    It is important to properly shut down Windows XP Professional every time you power down your system in order to avoid data loss, corruption, and other potential issues. Improperly shutting down the system can lead to file errors, system instability, and the loss of unsaved work. Therefore, it is crucial to follow the proper shutdown procedure to ensure the safe and reliable operation of the system.

    Rate this question:

  • 47. 

    What is the leading theory for what NT stands for

    • A.

      New Technology

    • B.

      Nice Try

    • C.

      Neverworking Technology

    • D.

      Nightmare To-us

    Correct Answer
    A. New Technology
    Explanation
    The leading theory for what NT stands for is "New Technology". This is supported by the fact that NT is commonly used as an abbreviation for new and innovative technology in various fields. It is a widely accepted understanding that NT refers to advancements and developments in technology that are considered new and cutting-edge. This theory aligns with the common usage and context in which NT is used, making it the most plausible explanation.

    Rate this question:

  • 48. 

    Only share permissions need to be considered when allowing other to access information; there is no need to consider addressing file/folder permissions.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false. When allowing others to access information, both share permissions and file/folder permissions need to be considered. Share permissions control access at the network level, while file/folder permissions control access at the local level. Both sets of permissions are important in determining who can access and modify the information.

    Rate this question:

  • 49. 

    Which of the following settings cannot be performed with your screen saver in Windows XP?

    • A.

      Password Protect

    • B.

      Preview the Screen Saver

    • C.

      Determine date and time settings

    • D.

      Determine the length of inactivity before the screen saver starts

    Correct Answer
    C. Determine date and time settings
    Explanation
    The screen saver settings in Windows XP allow users to password protect the screen saver, preview it, and determine the length of inactivity before it starts. However, determining date and time settings is not a feature available in the screen saver settings.

    Rate this question:

  • 50. 

    Idenify the order of the release of these Windows operating systems (1-5) _Windows 200 _Windows 98 _Windows XP _Windows 7 _Windows Vista Answer should be in the form of #,#,#,#,#

    Correct Answer
    2,1,3,5,4
    Explanation
    The correct order of the release of these Windows operating systems is as follows: Windows 98 (1), Windows 2000 (2), Windows XP (3), Windows Vista (4), and Windows 7 (5).

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 05, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 30, 2012
    Quiz Created by
    Abrunn11
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.