Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
Windows NT corrected many problems with ____.
a. | Windows XP | c. | Windows 9x/Me | b. | Windows 2000 | d. | Windows Vista |
|
|
2.
|
Windows 2000 is an upgrade of ____.
a. | Windows XP | c. | Windows Vista | b. | Windows NT | d. | DOS |
|
|
3.
|
____ is an upgrade of Windows 2000.
a. | Windows NT | c. | Windows 98 | b. | Windows 95 | d. | Windows XP |
|
|
4.
|
Windows XP Professional requires a minimum of ____ MB of RAM.
|
|
5.
|
____ is code-named Longhorn.
a. | Windows NT | c. | Windows Vista | b. | Windows 2000 | d. | Windows XP |
|
|
6.
|
Applications written to provide a GUI shell for Unix and Linux are called
____.
a. | DOS | c. | X Windows | b. | Windows Vista | d. | OS/2 |
|
|
7.
|
When a Mac is turned on, the ____ program is automatically launched and it
provides the desktop.
a. | Finder | c. | Device Manager | b. | Windows Explorer | d. | Control Panel |
|
|
8.
|
Windows keeps some data in text files called ____ files.
a. | Windows | c. | manager | b. | initialization | d. | startup |
|
|
9.
|
When an OS is first executed, the initial screen that appears, together with its
menus, commands, and icons, is called the _____.
a. | registry | c. | device manager | b. | taskbar | d. | desktop |
|
|
10.
|
When each logical drive is formatted, a single directory table is placed on the
drive called the ____.
a. | sector directory | c. | cluster directory | b. | root directory | d. | initialization
directory |
|
|
11.
|
Subdirectories are also known as ____.
a. | clusters | c. | folders | b. | paths | d. | sectors |
|
|
12.
|
The method of using the hard drive as though it were RAM is called ____.
a. | multitasking | c. | preemptive multitasking | b. | virtual
memory | d. | initialization |
|
|
13.
|
A ____ on the desktop is an icon that points to a program you can execute, or to
a file or folder.
a. | shortcut | c. | circuit | b. | path | d. | driver |
|
|
14.
|
The ____ gives a graphical view of hardware devices configured under Windows and
the resources and drivers they use.
a. | Control Panel | c. | Device Manager | b. | Windows Explorer | d. | Resource
Manager |
|
|
15.
|
Windows XP ____ Edition is used for high-end gaming computers using AMD
processors, for servers, or for heavily technical workstations that run scientific and engineering
applications and need greater amounts of memory and higher performance than standard desktop
PCs.
a. | Media Center | c. | Home | b. | Professional x64 | d. | Tablet PC |
|
|
16.
|
____ mode is a processor mode in which programs have only limited access to
system information and can access hardware only through other OS services.
a. | User | c. | Software | b. | Kernel | d. | Guest |
|
|
17.
|
A ____ is a program or group of programs that is running, together with the
system resources assigned to it, such as memory addresses, environmental variables, and other
resources.
a. | process | c. | module | b. | thread | d. | partition |
|
|
18.
|
Executive services interface between the subsystems in user mode and the
____.
a. | kernel | c. | domain controller | b. | HAL | d. | RAM |
|
|
19.
|
____ is a directory database and service that allows for a single administration
point for all shared resources on a network.
a. | Active Directory | c. | Domain Controller | b. | Active Controller | d. | Domain
Directory |
|
|
20.
|
A hard drive is divided into ____-byte sectors.
|
|
21.
|
When Windows 2000/XP is installed on a new hard drive, each partition is divided
into one or more ____.
a. | sectors | c. | cylinders | b. | logical drives | d. | boot devices |
|
|
22.
|
FAT32 is efficient for logical drives up to ____ GB.
|
|
23.
|
To take full advantage of Windows 2000/XP power management abilities, your
system BIOS must be ____-compliant.
|
|
24.
|
Windows 2000/XP can support up to ____ partitions on a hard drive.
|
|
25.
|
____ is a process which replicates a drive to a new computer or to another drive
on the same computer.
a. | Unattended installation | c. | Dual booting | b. | Drive
imaging | d. | Drive
installation |
|
|
26.
|
Product ____ is a method used by Microsoft to prevent unlicensed use of its
software so that you must purchase a Windows XP license for each installation of Windows XP.
a. | activation | c. | acquisition | b. | installation | d. | renewal |
|
|
27.
|
You can use ____ to update drivers to the manufacturer drivers.
a. | Windows Explorer | c. | My Computer | b. | Device Manager | d. | System
Information |
|
|
28.
|
After Windows 2000/XP is installed, any partition or logical drive except the
one on which Windows is installed can be created using ____, available from the Windows
desktop.
a. | Disk Management | c. | Install Drive | b. | New Drive | d. | Add/Remove
Hardware |
|
|
29.
|
____ is a graphical, user-friendly utility that you can use to create partitions
and format logical drives.
a. | System Restore | c. | ASR | b. | SFC | d. | Disk Management |
|
|
30.
|
If you update a driver and the new driver does not perform as expected, you can
revert to the old driver by using the ____ feature.
a. | Update Driver | c. | Uninstall Driver | b. | Driver Rollback | d. | Driver
Reinstall |
|
|
31.
|
To use the File Signature Verification tool, you need to type the ____ command
in the Run dialog box.
a. | Signcheck.exe | c. | validate.exe | b. | Verify.exe | d. | Sigverif.exe |
|
|
32.
|
To access Computer Management, open ____, open the Administrative Tools window,
and then double-click the Computer Management icon.
a. | My Computer | c. | Windows Explorer | b. | Control Panel | d. | Task Manager |
|
|
33.
|
The ____ log records events based on audit policies, which an administrator sets
to monitor user activity.
a. | security | c. | system | b. | application | d. | administration |
|
|
34.
|
The ____ log records events triggered by Windows components, such as a device
driver failing to load during the boot process.
a. | security | c. | system | b. | application | d. | administration |
|
|
35.
|
You can use the ____ tool to back up the entire drive on which Windows is
installed.
|
|
36.
|
The Windows 2000/XP registry is logically organized in an upside-down tree
structure of keys, subkeys, and ____.
a. | values | c. | subfiles | b. | files | d. | leaves |
|
|
37.
|
Memory is allocated in 4K segments, also known as ____.
a. | hives | c. | pages | b. | trees | d. | tablets |
|
|
38.
|
When Windows 2000/XP is first installed, it automatically creates two local
accounts, called ____ user accounts.
a. | default | c. | general | b. | built-in | d. | administrative |
|
|
39.
|
An account that is a member of the ____ group can back up and restore any files
on the system regardless of their access privileges to these files.
a. | Power User | c. | Backup Operator | b. | Limited Users | d. | Guests |
|
|
40.
|
An account that is a member of the ____ group is intended to be used by people
who use a workstation only once or occasionally and have limited access to files and
resources.
a. | Limited Users | c. | Backup | b. | Guests | d. | Local Users |
|
|
41.
|
With ____ user profiles, settings established by a user at one computer are
stored in a file on a file server on the network and shared with all computers in the
workgroup.
a. | server | c. | public | b. | shared | d. | roaming |
|
|
42.
|
A ____ user profile is a roaming user profile that applies to all users in a
user group, and individual users cannot change that profile.
a. | public | c. | common | b. | group | d. | mandatory |
|
|
43.
|
User names for Windows 2000/XP logon can consist of up to ____
characters.
|
|
44.
|
Passwords for Windows 2000/XP logon can be up to ____ characters.
|
|
45.
|
With Windows 2000, the only way to log on to the system is by pressing the ____
keys to open the logon window.
a. | Ctrl+Esc | c. | Shift+Alt | b. | Alt+Shift+Del | d. | Ctrl+Alt+Del |
|
|
46.
|
The ____ is a wildcard for one character.
a. | asterisk (*) | c. | question mark (?) | b. | slash (/) | d. | pound sign (#) |
|
|
47.
|
The ____ command changes the current default directory.
a. | Chdir | c. | Attrib | b. | Rmdir | d. | Chkdsk |
|
|
48.
|
The ____ command removes a subdirectory.
a. | Deldir | c. | Cutdir | b. | Erase | d. | Rmdir |
|
|
49.
|
When several clusters are used to hold a single file, this group of clusters is
called a ____.
a. | hive | c. | tree | b. | chain | d. | family |
|
|
50.
|
In ____ backup, all files that have been created or changed since the last
backup are backed up, and all files are marked as backed up.
a. | differential | c. | full | b. | copy | d. | incremental |
|