Windows Admin

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Abrunn11
A
Abrunn11
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,764
| Attempts: 3,795
SettingsSettings
Please wait...
  • 1/95 Questions

    Which protocol is the most common in today's computer networks?

    • TCP/IP
    • NetBEUI
    • IPX/SPX
    • Noe of the Above
Please wait...
About This Quiz

How much do you truly know about Windows Admin? Today we’ll be putting you through a gauntlet of questions about the operating system, various system requirements and everything in between to find out just that.

Windows Admin - Quiz

Quiz Preview

  • 2. 

    Right-clicking on the desktop background and choosing Properties opens up the ____________ Control Panel

    • Multimedia

    • Display

    • Ports

    • SCSI

    Correct Answer
    A. Display
    Explanation
    Right-clicking on the desktop background and choosing Properties opens up the "Display" Control Panel. This control panel allows users to customize and adjust various display settings such as screen resolution, color depth, and screen orientation. It also provides access to additional display options and features, such as multiple monitor configurations and screen saver settings.

    Rate this question:

  • 3. 

    If I were to install a program via CD, i would typically look for the _____________ file if the installation doesn't run automatically.

    • Getstarted.exe

    • Installation.ini

    • Installation.dll

    • Setup.exe

    Correct Answer
    A. Setup.exe
    Explanation
    When installing a program via CD, the typical file to look for if the installation doesn't run automatically is "setup.exe". This file is commonly used as the installer for software applications and is responsible for initiating the installation process. It may contain various instructions and configurations necessary for the program to be installed correctly on the computer.

    Rate this question:

  • 4. 

    The Windows XP operating system has a special program called _________ that allows you to shut down programs that are in endless loops.

    • Explorer

    • Task Manager

    • Help

    • UserManager

    Correct Answer
    A. Task Manager
    Explanation
    The correct answer is Task Manager. Task Manager is a special program in Windows XP that allows users to shut down programs that are in endless loops. It provides a way to view and manage running processes, monitor system performance, and end unresponsive applications. By accessing Task Manager, users can identify and terminate programs that are causing issues or consuming excessive system resources, helping to improve overall system stability and performance.

    Rate this question:

  • 5. 

    If you have administrator rights to a computer, you have the ability to track/monitor when a user logs into and out of that computer.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    If you have administrator rights to a computer, you have the ability to track/monitor when a user logs into and out of that computer. This is because administrator rights grant you access to the system logs and monitoring tools that record and track user activity on the computer. With these privileges, you can view and analyze the log files to see when users log in and out of the computer, providing you with the ability to track and monitor user activity.

    Rate this question:

  • 6. 

    If a user is reporting they have entered their password unsuccessfully multiple times and cannot log in, what is the cause?

    • Their account needs to be restored

    • Their account is awaiting activation

    • Their account is locked

    • Their account needs to have a username applied

    Correct Answer
    A. Their account is locked
    Explanation
    If a user is reporting that they have entered their password unsuccessfully multiple times and cannot log in, the cause is most likely that their account is locked. This could be due to security measures in place to protect the account from unauthorized access. To resolve this issue, the user may need to contact the appropriate support or administrator to unlock their account and regain access.

    Rate this question:

  • 7. 

    Passwords are case sensitive.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Passwords being case sensitive means that the system differentiates between uppercase and lowercase letters when checking the validity of a password. For example, if a password is "Password123", typing "password123" or "PASSWORD123" would be considered incorrect. Therefore, the correct answer is "True".

    Rate this question:

  • 8. 

    Connecting a shared printer with Windows Vista requires knowing at least either the IP address and make/model of the printer or the name of the server which the printer is installed on.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    To connect a shared printer with Windows Vista, you need to have either the IP address and make/model of the printer or the name of the server on which the printer is installed. This information is necessary to locate and establish a connection with the printer on the network. Without this information, Windows Vista would not be able to identify and connect to the shared printer. Therefore, the statement "Connecting a shared printer with Windows Vista requires knowing at least either the IP address and make/model of the printer or the name of the server which the printer is installed on" is true.

    Rate this question:

  • 9. 

    The Windows Security Dialog Box (which contains 6 buttons) is accessed by pressing which key combination when the Welcome screen is turned off?

    • Alt+ESC

    • CTRL+SHIFT

    • CTRL+ALT+DEL

    • ALT+TAB

    Correct Answer
    A. CTRL+ALT+DEL
    Explanation
    When the Welcome screen is turned off, pressing CTRL+ALT+DEL will bring up the Windows Security Dialog Box. This dialog box contains 6 buttons and allows the user to perform various security-related tasks such as locking the computer, switching users, changing passwords, and opening the Task Manager. This key combination is commonly used to access this dialog box and is a security measure to ensure that the user is interacting with the authentic Windows login screen.

    Rate this question:

  • 10. 

    If I were installing a 32-bit application from my computer, what would be the most common way to go about it?

    • Start, Programs, Accessories, System Tools, Disk Defragmenter

    • Start (Settings), Printers and Faxes, Add or Remove Programs

    • Start (Settings), Control Panel, Add or Remove Programs

    • Start, Program, Accessories, Communication, IP Telephony

    Correct Answer
    A. Start (Settings), Control Panel, Add or Remove Programs
    Explanation
    The most common way to install a 32-bit application from a computer is to go to the "Start" menu, then click on "Settings" and select "Control Panel". From there, you can choose "Add or Remove Programs" to install the application.

    Rate this question:

  • 11. 

    It is possible to allow NTFS permissions to cascade down to subfolders.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    NTFS permissions can be set to cascade down to subfolders, meaning that the permissions set on a parent folder can be inherited by its subfolders. This allows for easier management of permissions, as changes made to the parent folder's permissions will automatically apply to all subfolders. This can be useful in situations where you want to grant or restrict access to multiple folders within a directory hierarchy without having to individually set permissions for each folder.

    Rate this question:

  • 12. 

    It is not important that you properly shut down Windows XP Professional every time you power down your system.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    It is important to properly shut down Windows XP Professional every time you power down your system in order to avoid data loss, corruption, and other potential issues. Improperly shutting down the system can lead to file errors, system instability, and the loss of unsaved work. Therefore, it is crucial to follow the proper shutdown procedure to ensure the safe and reliable operation of the system.

    Rate this question:

  • 13. 

    What is the leading theory for what NT stands for

    • New Technology

    • Nice Try

    • Neverworking Technology

    • Nightmare To-us

    Correct Answer
    A. New Technology
    Explanation
    The leading theory for what NT stands for is "New Technology". This is supported by the fact that NT is commonly used as an abbreviation for new and innovative technology in various fields. It is a widely accepted understanding that NT refers to advancements and developments in technology that are considered new and cutting-edge. This theory aligns with the common usage and context in which NT is used, making it the most plausible explanation.

    Rate this question:

  • 14. 

    If a computer is used only for documnet processing, spreadsheet manipulation, photo editing and music production with no internet connectivity, there is no need to utilize the Disk Defragmenter tool during the life of that computer.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The statement is false because even if a computer is used only for document processing, spreadsheet manipulation, photo editing, and music production without internet connectivity, the Disk Defragmenter tool may still be necessary. Over time, the computer's hard drive can become fragmented, which can slow down the system's performance. The Disk Defragmenter tool helps to reorganize the files on the hard drive, improving overall system efficiency. Therefore, it is still beneficial to utilize the tool, even without internet connectivity.

    Rate this question:

  • 15. 

    If you just hit Enter when at the Windows Security Dialog Box, you will be logged off.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    If you just hit Enter when at the Windows Security Dialog Box, you will not be automatically logged off. This is because hitting Enter without entering any credentials or selecting any options will not trigger any action in the dialog box. Therefore, you will remain logged in until you manually choose an option or enter the required information.

    Rate this question:

  • 16. 

    What is the quickest way to begin sharing a folder via My Computer?

    • Right click that folder and click "sharing and Security"

    • Click the edit menu and click share

    • Click the view menu and click New

    • Click the File menu and click Create Shortcut

    Correct Answer
    A. Right click that folder and click "sharing and Security"
    Explanation
    To quickly begin sharing a folder via My Computer, you can right-click on the folder and select "sharing and Security." This option allows you to configure the sharing settings for the folder, such as granting permissions to specific users or groups. By choosing this option, you can easily initiate the process of sharing the folder with others on the network.

    Rate this question:

  • 17. 

    The latest and greatest applications on the market today are __-bit applications.

    • 16

    • 32

    • 64

    • 128

    Correct Answer
    A. 64
    Explanation
    The latest and greatest applications on the market today are 64-bit applications. This means that these applications are designed to run on 64-bit operating systems, which offer several advantages over 32-bit systems. 64-bit applications can access more memory, allowing for improved performance and the ability to handle larger data sets. They also offer better security features and compatibility with newer hardware. Overall, 64-bit applications are more advanced and capable than their 32-bit counterparts, making them the preferred choice for modern software development.

    Rate this question:

  • 18. 

    The first (possibly only) word of the DOS command to determine your IP address is _______________

    Correct Answer
    ipconfig
    Explanation
    The correct answer is "ipconfig" because it is a DOS command used to display the IP configuration settings of a computer. By entering "ipconfig" in the command prompt, the user can retrieve information about their IP address, subnet mask, default gateway, and other network settings. This command is commonly used for troubleshooting network connectivity issues or checking the IP address assigned to a computer.

    Rate this question:

  • 19. 

    You are planning to use your Windows Vista Pro workstation as a small server.  What file system offers the most security for your needs in this scenario?

    • FAT16

    • FAT32

    • HPFS

    • NTFS

    Correct Answer
    A. NTFS
    Explanation
    NTFS (New Technology File System) offers the most security for the given scenario. NTFS provides features like file and folder permissions, encryption, and auditing, which enhance the security of the system. It allows administrators to control access to files and folders, ensuring that only authorized users can access sensitive data. NTFS also supports file compression and disk quotas, which can further enhance security by managing disk space and preventing unauthorized usage. Compared to other file systems like FAT16, FAT32, and HPFS, NTFS provides better security features and is more suitable for a small server setup.

    Rate this question:

  • 20. 

    There is no need to distinguish between share and NTFS permissions; they mean the same thing and have the same capabilities.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    This statement is false. Share permissions and NTFS permissions are two different types of permissions in Windows operating systems. Share permissions control access to shared folders over a network, while NTFS permissions control access to files and folders on the local file system. Although they both regulate access, they have different capabilities and are applied at different levels. Share permissions are applied to the shared folder itself, while NTFS permissions are applied to individual files and folders within the shared folder. Therefore, it is important to distinguish between share and NTFS permissions.

    Rate this question:

  • 21. 

    What file system offers the most security if you intended to use your Windows XP Professional machine as a file server?

    • FAT16

    • FAT32

    • HPFS

    • NTFS

    Correct Answer
    A. NTFS
    Explanation
    NTFS (New Technology File System) offers the most security if you intend to use your Windows XP Professional machine as a file server. NTFS provides advanced security features such as file and folder permissions, encryption, and auditing. It allows you to set access control lists (ACLs) to restrict or grant permissions to specific users or groups. NTFS also supports file-level encryption, which adds an extra layer of protection to sensitive data. Overall, NTFS is the most secure file system option for a Windows XP Professional file server.

    Rate this question:

  • 22. 

    Windows Vista Professional supports Plug&Play technologies

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Windows Vista Professional supports Plug&Play technologies. Plug&Play is a feature that allows devices to be automatically recognized and configured by the operating system without the need for manual intervention. This feature makes it easier for users to connect and use new devices with their computer. Since Windows Vista Professional is a more advanced version of the Windows Vista operating system, it is expected to have support for Plug&Play technologies. Therefore, the statement "Windows Vista Professional supports Plug&Play technologies" is true.

    Rate this question:

  • 23. 

    How can deleting temp files help speed up a slow computer?

    • Frees up disk space

    • Removes any viruses from the computer

    • Adds virtual memory

    • Adds RAM

    Correct Answer
    A. Frees up disk space
    Explanation
    Deleting temp files can help speed up a slow computer because it frees up disk space. Temp files are temporary files created by various programs and applications, and over time they can accumulate and take up a significant amount of storage space. When the computer's storage is nearly full, it can slow down the system's performance. By deleting these unnecessary temp files, more disk space becomes available, allowing the computer to run more efficiently and faster.

    Rate this question:

  • 24. 

    Which control panle is used to make changes to your workstation's name?

    • Multimedia

    • Display

    • Network

    • System

    Correct Answer
    A. System
    Explanation
    The correct answer is System. The System control panel is used to make changes to your workstation's name. This control panel allows you to modify various settings and configurations related to your computer's operating system, including the computer name. By accessing the System control panel, you can change the name of your workstation to suit your preferences or organizational requirements.

    Rate this question:

  • 25. 

    When installing Windows XP, you are only given one partition option.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    When installing Windows XP, you are not only given one partition option. Windows XP allows users to choose between different partition options based on their preferences and requirements. Users can create multiple partitions, resize existing partitions, or choose to install Windows XP on an existing partition. This flexibility in partition options allows users to customize their installation process according to their specific needs. Therefore, the given statement is false.

    Rate this question:

  • 26. 

    Which Groups would have rights to unlock a workstation when the person who locked it is no longer available

    • Administrators

    • Backup Operators

    • Users

    • Replicator

    Correct Answer
    A. Administrators
    Explanation
    Administrators would have the rights to unlock a workstation when the person who locked it is no longer available. Administrators typically have full control and privileges over a system, including the ability to manage user accounts and access permissions. Therefore, they would have the necessary authority to unlock a workstation in such a situation.

    Rate this question:

  • 27. 

    When you make a new user in Windows XP, by default he/she becomes a member of the Power Users group.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    By default, when a new user is created in Windows XP, they do not become a member of the Power Users group. Instead, they become a member of the Users group. The Power Users group has additional privileges and permissions compared to the Users group.

    Rate this question:

  • 28. 

    Which control panel "location" tool would be best to install/configure a new protocol?

    • Devices

    • Network Connections

    • Display

    • Multimedia

    Correct Answer
    A. Network Connections
    Explanation
    The "Network Connections" control panel tool would be the best option to install/configure a new protocol. This tool allows users to manage and configure network connections on their device, including setting up new protocols for network communication. By accessing the Network Connections control panel, users can add, remove, or modify network protocols to ensure proper network connectivity and communication.

    Rate this question:

  • 29. 

    The taskbar must always be visually present on the bottom of the screen.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The statement is false because the taskbar can be visually present on any side of the screen, not just the bottom. Users have the flexibility to customize the taskbar's position according to their preferences. They can choose to have it on the left, right, or top of the screen as well.

    Rate this question:

  • 30. 

    If I am going to install a networked printer as a local printer on my computer, I just need the following two items:

    • Printer model number and serial number

    • Printer driver information for the make/model and location in the building

    • Printer IP address and location in the building

    • Printer IP address and driver files for that make/model

    Correct Answer
    A. Printer IP address and driver files for that make/model
    Explanation
    To install a networked printer as a local printer on a computer, two items are required: the printer's IP address and the driver files for the specific make and model of the printer. The IP address is necessary to establish a connection between the computer and the printer over the network. The driver files are needed to enable the computer to communicate with and control the printer, ensuring compatibility and proper functioning.

    Rate this question:

  • 31. 

    Which of the following specific NTFS permissions needs to be applied to allow users to do whatever they chose within the folder the permissions are set at and, by default, any subfilder therein?

    • Modify

    • Read

    • Full Control

    • None of the Above

    Correct Answer
    A. Full Control
    Explanation
    The specific NTFS permission that needs to be applied to allow users to do whatever they chose within the folder and its subfolders is "Full Control". This permission grants users the ability to perform all actions, including modifying files, deleting files, creating new files, and changing permissions. It provides the highest level of access and control over the folder and its contents.

    Rate this question:

  • 32. 

    If I were to share out my printer, that would mean that I would be responsible for sharing out paper for that printer as well.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The statement suggests that if someone shares their printer, they would also be responsible for sharing paper for that printer. However, this is not necessarily true. Sharing a printer does not automatically imply sharing paper as well. It is possible for individuals to share a printer while each person provides their own paper. Therefore, the answer is false.

    Rate this question:

  • 33. 

    Which of the following NTFS permissions can be applied to specifically allow users to edit existing content?

    • Modify

    • Read and Execute

    • Read

    • Write

    Correct Answer
    A. Modify
    Explanation
    The Modify NTFS permission allows users to edit existing content. This permission grants the user the ability to make changes to files and folders, including creating new files, modifying existing files, deleting files, and changing file attributes. It provides a higher level of access compared to the Read and Write permissions, as it includes both read and write capabilities. The Modify permission is useful for users who need to make changes to files or folders without having full control over them.

    Rate this question:

  • 34. 

    What does Disk Defragmenter do to help speed up a slow computer?

    • Rearranges files stored on a disk to occupy contiguous storage locations

    • Deletes cookies and other adware

    • Both of the above

    • None of the above

    Correct Answer
    A. Rearranges files stored on a disk to occupy contiguous storage locations
    Explanation
    Disk defragmenter helps speed up a slow computer by rearranging files stored on the disk to occupy contiguous storage locations. This process eliminates fragmented files and reduces the time it takes for the computer to access and retrieve data, resulting in improved performance and faster response times. Deleting cookies and other adware may help improve computer performance in terms of internet browsing, but it is not directly related to the function of disk defragmenter.

    Rate this question:

  • 35. 

    How can using msconfig help speed up a slow computer?

    • It allows you to access the start-up menu to view which programs start when the computer boots

    • It takes you to the temporary internet file location, allowing you to delete unused files

    • It takes you to windows updates, allowing you to get needed updates

    • It takes you to install/uninstall programs windows, allowing to to remove unused programs

    Correct Answer
    A. It allows you to access the start-up menu to view which programs start when the computer boots
    Explanation
    By accessing the start-up menu through msconfig, you can see the list of programs that start when the computer boots up. This allows you to identify any unnecessary or resource-intensive programs that may be slowing down the computer's startup time. By disabling or removing these programs from the start-up list, you can improve the computer's boot time and overall performance.

    Rate this question:

  • 36. 

    Where can you go to change your password?

    • The main screen of the Systems Properties window

    • User Accounts Control Panel

    • Both of the Above

    • None of the Above

    Correct Answer
    A. User Accounts Control Panel
    Explanation
    The User Accounts Control Panel is the correct answer because it is the specific location in which users can go to change their password. The main screen of the Systems Properties window may have various options and settings, but it does not specifically provide the option to change passwords. Therefore, "Both of the Above" is not the correct answer. "None of the Above" is also incorrect as the User Accounts Control Panel is indeed the appropriate place to change passwords.

    Rate this question:

  • 37. 

    Only share permissions need to be considered when allowing other to access information; there is no need to consider addressing file/folder permissions.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    This statement is false. When allowing others to access information, both share permissions and file/folder permissions need to be considered. Share permissions control access at the network level, while file/folder permissions control access at the local level. Both sets of permissions are important in determining who can access and modify the information.

    Rate this question:

  • 38. 

    Usernames are case sensitive.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    Usernames are case sensitive means that the system distinguishes between uppercase and lowercase letters when considering the username. In this case, the correct answer is "False" because usernames are not case sensitive. This means that the system treats uppercase and lowercase letters as the same when it comes to usernames. For example, if a username is "JohnDoe", "johndoe" or "JOHNDOE" would be considered the same username in the system.

    Rate this question:

  • 39. 

    If a user forgets their password, an administrator can look up their password for them.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The statement is incorrect. In a secure system, passwords are typically stored in a hashed or encrypted format, which means they cannot be easily retrieved by an administrator or anyone else. Instead, when a user forgets their password, the administrator can usually assist them in resetting their password or providing them with a temporary password to regain access to their account.

    Rate this question:

  • 40. 

    When a share name ends in a dollar sign, it is a _________ share

    • NTFS

    • Read

    • Hidden

    • Execute

    Correct Answer
    A. Hidden
    Explanation
    When a share name ends in a dollar sign, it is a hidden share. Hidden shares are not visible when browsing the network, and their names are typically followed by a dollar sign to indicate their hidden status. These shares are often used for administrative purposes and are not intended for regular user access.

    Rate this question:

  • 41. 

    Which service is probably not installed if you right click on a folder and "sharing and Security" is not an option?

    • Client for Microsoft Networks

    • NW Link

    • QoS Packet Scheduler

    • File and Printer Sharing of Microsoft Networks

    Correct Answer
    A. File and Printer Sharing of Microsoft Networks
    Explanation
    If the "sharing and Security" option is not available when right-clicking on a folder, it is likely that the "File and Printer Sharing of Microsoft Networks" service is not installed. This service allows users to share files and printers on a network. Without this service, the option to share and secure folders may not be available.

    Rate this question:

  • 42. 

    When using Computer Management to create a new account, Windows asks you to supply a user's full name.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    When creating a new account using Computer Management in Windows, the operating system prompts the user to provide the full name of the user. This is because Windows uses the full name to identify the user and display it in various places, such as the login screen and user directories. By providing the full name, Windows can personalize the user's experience and ensure proper identification and organization of user accounts.

    Rate this question:

  • 43. 

    If I install a printer through another computer (workstation or server), I still have to obtain the driver on my own every time; it isn't possible to have the driver provided for me automatically.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The given statement is false. When installing a printer through another computer (workstation or server), it is possible for the driver to be provided automatically. This can be achieved through a process called driver sharing or driver deployment, where the driver is installed on the server or workstation and then made available to other computers on the network. This eliminates the need for each individual computer to obtain the driver separately.

    Rate this question:

  • 44. 

    Specifically setting the "Deny" permission should be used as a last resort due to the fact that it can lead to troubleshooting difficulty in the future.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Setting the "Deny" permission should be used as a last resort because it can create troubleshooting difficulties in the future. When the "Deny" permission is set, it overrides any other permissions granted to a user or group, effectively blocking their access. This can make it challenging to identify and resolve issues later on, as it may not be immediately clear why a user is being denied access. It is generally recommended to use other permission settings first and only resort to "Deny" when absolutely necessary.

    Rate this question:

  • 45. 

    It is possible to export extensive information on a particular workstation to text file via the System Information utility.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The System Information utility allows users to export extensive information about a particular workstation to a text file. This feature enables users to save and share detailed information about their system configuration, hardware, and software. By exporting this information, users can easily analyze and troubleshoot any issues, as well as provide accurate information to technical support or other parties who may require it. Therefore, the statement is true.

    Rate this question:

  • 46. 

    When attepmting to open Microsoft Management Console, the simplest way is to type ____ after clicking the Windows icon in the lower left-hand corner in Microsoft Vista.

    Correct Answer
    MMC
    Explanation
    To open Microsoft Management Console in Microsoft Vista, you can simply type "MMC" after clicking the Windows icon in the lower left-hand corner. MMC stands for Microsoft Management Console, which is a built-in tool in Windows operating systems that allows users to manage and configure system components, services, and applications. By typing "MMC" in the search bar, the user can quickly access this tool and perform various administrative tasks.

    Rate this question:

  • 47. 

    How can using regedit help speed up a slow computer?

    • Allows you to change how fast windows load, improve boot and shutdown time

    • Allows you to register websites faster

    • Takes you to the disk defragmenter screen

    • Uninstalls unused programs

    Correct Answer
    A. Allows you to change how fast windows load, improve boot and shutdown time
    Explanation
    Using regedit can help speed up a slow computer by allowing you to change how fast Windows loads, improve boot and shutdown time. The Windows Registry is a database that stores settings and configurations for the operating system and installed applications. By accessing the registry editor (regedit), you can modify certain settings to optimize the performance of Windows, such as disabling unnecessary startup programs, adjusting system services, and tweaking system parameters. These changes can result in faster boot times and improved overall responsiveness of the computer.

    Rate this question:

  • 48. 

    If I were to remove a DOS application from my computer, I would take the exact same steps as I would to remove a 32-bit application.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The statement is false because removing a DOS application and removing a 32-bit application would involve different steps. DOS applications are typically removed by deleting their files or uninstalling them using specific commands, while 32-bit applications are usually uninstalled through the control panel or using an uninstaller program. Therefore, the steps to remove these two types of applications would not be the same.

    Rate this question:

  • 49. 

    Windows runs programs within the NT kernel since it makes sense to have the OS crash if an application crashes.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The given statement is false. Windows does not run programs within the NT kernel with the intention of having the OS crash if an application crashes. In fact, Windows uses a protected memory model where each application runs in its own isolated process, separate from the kernel. This design ensures that if an application crashes, it does not affect the stability of the entire operating system. The NT kernel provides a layer of abstraction and manages system resources, but it is not directly responsible for running applications.

    Rate this question:

Quiz Review Timeline (Updated): Aug 19, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 19, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 30, 2012
    Quiz Created by
    Abrunn11
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.