Professional Documents
Culture Documents
Answer: 1
Answer: 3
Answer: 2
Answer: 1
Answer: 1
Answer: 3
Answer: 4
Answer: 3
11. The process of dividing a disk into sectors that the disk controller can
read and write, before a disk can store data is known as ____________
a) partitioning
b) swap space creation
c) low-level formatting
d) none of the mentioned
Answer: c
13. The header and trailer of a sector contain information used by the
disk controller such as _________ and _________
a) main section & disk identifier
b) error correcting codes (ECC) & sector number
c) sector number & main section
d) disk identifier & sector number
Answer: b
14. The two steps the operating system takes to use a disk to hold its
files are _______ and ________
a) partitioning & logical formatting
b) swap space creation & caching
c) caching & logical formatting
d) logical formatting & swap space creation
Answer: a
1
5. The _______ program initializes all aspects of the system, from CPU
registers to device controllers and the contents of main memory, and
then starts the operating system.
a) main
b) bootloader
c) bootstrap
d) rom
Answer: c
Answer: b
Answer: c
Answer: c
19. In SCSI disks used in high end PCs, the controller maintains a list of
_________ on the disk. The disk is initialized during ________
formatting which sets aside spare sectors not visible to the operating
system.
a) destroyed blocks, high level formatting
b) bad blocks, partitioning
c) bad blocks, low level formatting
d) destroyed blocks, partitioning
Answer: c
Answer: a
Answer: a
22. What filename extension is applied by default to custom consoles
that are created for the MMC?
1. .mmc
2. .msc
3. .con
4. .mcn
Answer – B
.
23. You want to create roaming profiles for users in the sales
department. They frequently log on at computers in a central area. The
profiles should be configured as mandatory and roaming profiles. Which
users are able to manage mandatory profiles on Windows 7 computers?
1. The user who uses the profile
2. Server operators
3. Power users
4. Administrators
Answer – D
24. You want to monitor the CPU, memory, and disk usage on your
computer to ensure that there are no bottlenecks. Which MMC snap – in
would you load to access System Monitor?
1. System Monitor
2. Reliability Monitor
3. ActiveX Control
4. Performance Logs and Alerts
Answer – C
28. You have a user with limited vision. Which accessibility utility is used
to read aloud screen text, such as the text in dialog boxes, menus, and
buttons?
1. Read – Aloud
2. Orator
3. Dialog Manager
4. Narrator
Answer – D
29. You have just purchased a new computer that has Windows 7 pre
installed. You want to migrate existing users from a previous computer
that was running Windows XP Professional. Which two files would you
use to manage this process through the User State Migration Tool?
1. usmt.exe
2. ScanState.exe
3. LoadState.exe
4. Windows7Migrate.exe
Answer – B,C
31. You are the network administrator for your company. Recently, one
of your users in the accounting department has reported that they were
unsure whether a banking website was legitimate or not. You want to
configure a utility that will verify whether a website is known to be
fraudulent. Which utility should you configure?
1. Pop – up Blocker
2. RSS Reader
3. Phishing Filter
4. Add – on Manager
Answer – C
32. You have a user, Jan, who suspects that her Windows 7 computer
has been infected with spyware. You remove the spyware from her
computer and want to prevent spyware from infecting it in the future.
Which of the following Windows 7 utilities should you configure?
1. Windows Defender
2. Phishing Filter
3. Pop – up Blocker
4. Windows OneCare
Answer – A
.
33. You are configuring power settings on your laptop. You configure the
laptop to enter sleep mode after a specified period of inactivity. Which of
the following will occur when the computer enters Sleep mode?
1. The computer will be shut down gracefully.
2. Data will be saved to the hard disk.
3. The monitor and hard disk will be turned off, but the computer will
remain in a fully active state.
4. The user session will not be available when you resume activity on
the computer.
Answer – B
34. You are using Internet Explorer to access several RSS feeds that
you subscribe to. One of the feeds stores only the 10 most recent
updates. You want to ensure that the last 100 updates are stored. What
should you do?
1. Configure the RSS feed to automatically download attached files.
2. Modify the schedule so that the RSS feed is updated more than
once a day.
3. Turn on feed reading view in IE.
4. Modify the archive setting so that the last 100 items are stored.
Answer – D
36. You are configuring a new Windows 7 computer for a new employee.
You configure the new user with a standard user account. Which of the
following functions will the new employee be allowed to perform?
(Choose all that apply.)
1. Install a printer.
2. Install network drivers.
3. Configure WPA keys.
4. Modify the Desktop settings.
Answer – A,C,D
.
37. You are the network administrator for Some Company. Your network
consists of 200 Windows 7 computers, and you want to assign static IP
addresses rather than use a DHCP server. You want to configure the
computers to reside on the 192.168.10.0 network. What subnet mask
should you use with this network address?
1. 255.0.0.0
2. 255.255.0.0
3. 255.255.255.0
4. 255.255.255.255
Answer – C
38. You are using a laptop running Windows 7 Home Premium. You
want to synchronize files between your laptop and a network folder.
Which of the following actions must you perform first in order to enable
synchronization to occur between your laptop and the network folder?
1. Upgrade your laptop to Windows 7 Ultimate.
2. Enable one – way synchronization between the laptop and the
network folder.
3. Enable two – way synchronization between the laptop and the
network folder.
4. Configure the files on your laptop as read – only.
Answer – A
Answer: b.
40. What are the characteristics of the stateless server?
a) Easier to implement
b) They are not fault-tolerant upon client or server failures
c) They store all information file server
d) They are redundant to keep data safe
Answer: a
Answer: b
42. What are the advantages of file replication?
a) Improves availability & performance
b) Decreases performance
c) They are consistent
d) Improves speed
Answer: a
Answer: d
Answer: d
Answer: b
Answer: d
Answer: b
47. What are non characteristics of session semantics?
a) Each client obtains a working copy from the server
b) When file is closed, the modified file is copied to the file server
c) The burden of coordinating file sharing is ignored by the system
d) Easy to implement in a single processor system
Answer: d
48. The file once created can not be changed is called ___________
a) immutable file
b) mutex file
c) mutable file
d) none of the mentioned
Answer: a
49. ______ of the distributed file system are dispersed among various
machines of distributed system.
a) Clients
b) Servers
c) Storage devices
d) All of the mentioned
Answer: d
Answer: b
51. Which one of the following hides the location where in the network
the file is stored?
a) transparent distributed file system
b) hidden distributed file system
c) escaped distribution file system
d) spy distributed file system
Answer: a
Answer: b
Answer: b
Answer: c
Answer: a
56. In distributed file system, file name does not reveal the file’s
___________
a) local name
b) physical storage location
c) both local name and physical storage location
d) none of the mentioned
Answer: b
Answer: d
58. What are the different ways in which clients and servers are
dispersed across machines?
a) Servers may not run on dedicated machines
b) Servers and clients can be on same machines
c) Distribution cannot be interposed between a OS and the file system
d) OS cannot be distributed with the file system a part of that distribution
Answer: b
Answer: c
Answer: d