Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.
Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Principles of Operating System and its Application

Covers the fundamental principles of operating system design and function for both general-purpose computing and real-time application control.

network infrastructure

information technology

server roles

migrating to windows 7

implementing user accounts

configuring disks

device drivers

configuring file access

configuring network

configuring wireless

securing windows

client computers

It is a new authentication features that controls the ability of online IDs to authenticate to a computer.

  • Online Identity Integration
  • Biometrics
  • Smartcards
  • None of the choices

It allows the administrators to identify which software is allowed to run and was initially added to Windows XP and Windows Server 2003.

  • Software Restriction Policies
  • Group Policy
  • User Account Control
  • Advanced Security Settings

It allows you to control which role functionality is installed and enabled.

  • Server Features
  • Role Services
  • None of the choices
  • Role

Which of the following is not a Server Role of Windows Server 2008 R2?

  • DHCP Server
  • Active Directory Domain Services
  • Remote Desktop Services
  • Windows Power Shell

It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that using delete browsing history to maintain privacy because there are no logs kept or tracks made during browsing

  • InPrivate Browsing
  • Applocker
  • InPrivate Filtering
  • Bitlocker

It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.

  • Host ID
  • Subnet Mask
  • Network Address
  • Default Gateway

It is a software that is designed to deliberately harm a computer.

  • None of the Choices
  • Malicious Software
  • Applocker
  • Bitlocker

Which of the following is not a way to improve the signal strength?

  • Check for devices that may cause interference
  • None of the Choices
  • Ensure close proximity to the Wireless APs
  • Check all Physical obstructions

It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later

  • Certificate Mapping
  • None of the choices
  • NTLM
  • Kerberos v5

Provides a timeline of system changes and reliability. It also provides a system stability chart and reports on software installations and software or hardware failures.

  • Reliability Monitor
  • Windows Memory Diagnosstics Tool
  • Performance Monitor
  • Windows Network Diagnostics Tool

Which of the following is not a Physical WAN Components?

  • Network Adapter
  • Bridge
  • Backbone
  • Leased Lines

It is a feature of Windows 7 that allows windows 7 to be backward compatible

  • Windows XP mode
  • Windows XP compatibility
  • Virtual XP
  • None of the choices

It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information.

  • Reliability and Performance
  • Deployment
  • Security
  • Usability

It is a wireless network modes that allows a wireless network adapters connects directly to another wireless network adapter for the purpose of temporarily sharing of files, presentations or an internet connection among multiple computers and devices.

  • Ad hoc mode
  • Wired mode
  • Bluetooth mode
  • Infrastructure mode

It is the measurement of how a system conforms to expected behavior

  • Reliability
  • Security
  • Usability
  • Performance

Which of the following is a main type of group?

  • Universal
  • Domain Local
  • Distribution
  • Global

It enables you to manage network traffic, group physically dispersed nodes into logical area networks and isolate network traffic.

  • Metropolitan Area Network
  • Wireless Local Area Network
  • Visual Local Area Network
  • Virtual Local Area Network

APIPA stands for:

  • Automatic Private IP Addressing
  • Asia Pacific Intellectual Property Association
  • Association of Pacific Island Public Auditors
  • Automatic Protocol for Internet Public Address

It defines the type of access granted to a user, group, or computer for a file or folder.

  • Explicit Permission
  • None of the choices
  • Inherited Permission
  • NTFS Permission

Which of the following is not the common network architecture types?

  • Ethernet
  • WiMax
  • Token Ring
  • FDDI (Fiber Distributed Data Interface)

It is a graphical user interface that is used to manage disks and volumes both basic and dynamic, locally or on remote computers.

  • Diskpart
  • Disk Management
  • None of the choices
  • Local Disk

Checks for symptoms of defective computer memory and usually can be started from administratve tools in the control panel

  • Windows Network Diagnostics Tool
  • Reliability Monitor
  • Windows Memory Diagnostics Tool
  • Performance Monitor

It a server that is used to access the corporate resources from outside the corporate network.

  • DNS Server
  • DHCP Server
  • None of the Choices
  • Remote Access Server

It is a central location for viewing messages about your system and the starting point for diagnosing and solving issues with your system.

  • Applocker
  • Group Policy
  • Action Center
  • Control Panel

It provides authenticaltion, host operations of master roles, hosting the global catalog and support group policies and sysvol.

  • Domain Controller
  • Domain User
  • Groups
  • User Accounts

Which of the following is not an IPv6 Address types?

  • Multicast
  • Unicast
  • Anycast
  • Broadcast

It is a computer that is dedicated to running network-aware application software.

  • Web Server
  • Domain Controller
  • Application Server
  • File Server

It is an object that contains all of the information that defines a user in Windows Server 2008 R2.

  • Groups
  • User Account
  • Domain Controller
  • Domain User

It reduces the complexity and amount of administrative work by using automatic TCP/IP configuration.

  • Remote Access Server
  • DNS Server
  • DHCP Server
  • None of the Choices

Strong EAP methods provide strong authentication

  • IEEE 802.1X
  • WPA2-Personal
  • WPA-Personal
  • WPA-Enterprise

It specifies which part of an IPv4 address is the network ID and which part of the IPv4 address is the Host ID.

  • Subnet Mask
  • Network Address
  • Default Gateway
  • Host ID

It is a dynamic volume that joins areas of unallocated space disks into a single logical disk

  • Striped Volume
  • Spanned Volume
  • Simple Volume
  • None of the choices

It is a small software program that allows a hardware device to communicate with a computer

  • None of the choices
  • Drivers
  • Device Stage
  • Dynamic Update

It is one of the Considerations on why using the option of Upgrade rather than Migrate.

  • Typically, requires replacing existing computer hardware
  • Typically, requires more storage space
  • None of the choices
  • Does not require the reinstallation of applications

Which of the following is not a Boot-option for troubleshooting startup problems?

  • None of the choices
  • Safe Mode
  • Last known good configuration
  • Boot logging

It provides storage for the users' files and share folders that contain users' files.

  • File Server
  • Application Server
  • Domain Controller
  • Web Server

It is the built-in encryption tool for Windows file systems

  • Applocker
  • Encrypting File Systems
  • Bitlocker
  • User Account Control

It is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs.

  • Windows Upgrade Advisor
  • None of the choices
  • User State Migration Tool
  • Windows Easy Transfer

172.16.0.0 /12 is what type of IPv4 Address.

  • Private IP Address
  • Public IP Address
  • Broadcast Address
  • Host ID

How many bits are there in an IP version 4 address?

  • 32 bits
  • 24 bits
  • 128 bits
  • 64 bits

It enables IT Administrator to automate one-to-many management of users and computers.

  • Organizational Units
  • Group Policy
  • None of the Choices
  • Nesting Groups

Which of the following statement is not correct?

  • You can configure the client computer by going to the accessories in the start menu and clicking the network options.
  • You can configure the client computer by using the command line: netsh wlan
  • You can configure the client computer by using the Network Dialog Box and following the Wizard
  • You can configure the client computer by using the group policy

It is a device that converts instructions from the network protocol stack into electric signals.

  • Network Adapter
  • Switch
  • Firewall
  • Router

It provides assistance in resolving network-related issues

  • Windows Memory Diagnostic Tool
  • Performance Monitor
  • Windows Network Diagnostics Tool
  • Reliability Monitor

It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation.

  • Sysprep
  • Scanstate
  • Imagex
  • Loadstate

It is a scriptable command line utility that create scripts to automate disk related task.

  • None of the choices
  • Local Disk
  • Diskpart
  • Disk Management

It is an administrative tool for managing user settings and computer settings across a network.

  • None of the choices
  • Windows Backup
  • System Restore Points
  • Window Update Group Policy

It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive.

  • Spanned Volume
  • Striped Volume
  • Simple Volume
  • None of the choices

It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit.

  • Domain Controller
  • Domain User
  • User Account
  • Groups

Which of the following is not an advantage of installing a 64-bit edition of Windows 7?

  • It supports 16-bit Windows on Windows (WOW) environment
  • More Memory
  • Improved Performance
  • Improved Security

It is the foundation of the Internet naming scheme and it supports accessing resources by using alphanumeric names.

  • DNS Server
  • None of the Choices
  • Remote Access Server
  • DHCP Server

It is the process of verifying the identity of something or someone.

  • Access
  • None of the choices
  • Authentication
  • Authorization

What is the maximum bit rate for the 802.11n technologies?

  • 600mbps
  • 54mbps
  • 11mbps
  • None of the choices

How many bits are there in an IP version 6 address?

  • 128 bits
  • 32 bits
  • 64 bits
  • 24 bits

It is a security feature that simplifies the ability of users to run as standard users and perform all neccessary daily tasks

  • User Account Control
  • Encrypting File Systems
  • Bitlocker
  • Applocker

Which of the following is not a Wireless LAN Standards?

  • 802.11 b
  • 802.11 n
  • 802.11 a
  • 802.11 h

It is a method of sharing folders that allow multiple default public folders for each computer and files shared with same computer and with same network.

  • Advance Sharing
  • None of the choices
  • Basic Sharing
  • Public Sharing

It is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA.

  • Broadcast Address
  • Public IP Address
  • Private IP Address
  • Network Address

It is a type of network that interconnect devices by means of radio waves instead of wires and cables.

  • Wireless Network
  • Wired Network
  • Campus Area Network
  • Virtual Local Area Network

It is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses enhanced metafile format (EMF) as the spool file format.

  • GDI based printing
  • None of the choices
  • XPS based printing
  • PDF based printing

What is the binary notation for the 255.255.255.0 subnet mask?

  • 11111111.11111111.11111111.00000000
  • 11111111.00000000.00000000.00000000
  • 11111111.11111111.11111000.00000000
  • 11111111.11111111.11111110.00000000

It is a way for you to limit use of disk space on a volume for each user to conserve disk space.

  • Disk Quotas
  • Disk Fragmentation
  • None of the choices
  • Disk Shrinking

It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption used by medium and large organization.

  • WPA-Enterprise
  • WPA2-Personal
  • WPA-Personal
  • IEEE 802.1X

It is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to run on user desktops.

  • Applocker
  • Bitlocker
  • User Account Control
  • Encrypting File Systems

It is one of the feature of Windows 7 that encrypts the computer operating system and data stored on the operating system volume.

  • Encrypting File Systems
  • Applocker
  • Bitlocker
  • User Account Control

It is a group of services hosted on a network which is a private structure and has the internet-like service provision.

  • Extranet
  • Internet
  • Intranet
  • Cloud

It enables the user to log on and access resources on a specific computer and usually reside in SAM.

  • None of the Choices
  • Built-in User Accounts
  • Local User Accounts
  • Domain User Accounts

Which of the following is not a Specialized version of Windows 7?

  • Windows 7 Enterprise
  • Windows 7 Professional
  • Windows 7 Home Basic
  • Windows 7 Ultimate

It is the most common form of computer network.

  • Metropolitan Area Network
  • Wide Area Network
  • Local Area Network
  • Campus Area Network

Which of the following is not a LAN Physical Topology?

  • Mesh
  • Bus
  • Crown
  • Hybrid

It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and replace an existing operating system on a partition.

  • None of the Choices
  • Upgrade Installation
  • Migration
  • Clean Installation

What is the IEEE 802 Standards for Local Wireless Networks?

  • IEEE 802.11
  • IEEE 802.16
  • IEEE 802.5
  • IEEE 802.3

Which of the following version of Windows are allowed for Upgrade?

  • Windows Vista SP1
  • Windows XP
  • None of the choices
  • Windows 95

It is the process of determining whether something or someone has permission to access the resources

  • Authentication
  • Access
  • Authorization
  • None of the choices

It is the measurement on how quickly the computer completes a task.

  • Reliability
  • Security
  • Usability
  • Performance

It is the non-contiguous storage of data on a volume

  • None of the choices
  • Disk Shrinking
  • Disk Fragmentation
  • Disk Quotas

It is a method of sharing folders that allows you to share folders quickly.

  • None of the choices
  • Basic Sharing
  • Advance Sharing
  • Public Sharing

It contains the partition table for the disk and a small amount of executable code called as the master boot code.

  • Master Boot Record Disk
  • GUID Partition (GPT)
  • Dynamic Disk
  • None of the choices

It contains an array of partition entries describing the start and end LBA of each partition on disk.

  • Master Boot Record Disk
  • Dynamic Disk
  • None of the choices
  • GUID Partition (GPT)

This are equivalents to door locks, employee badges and security systems. It protects the computer and networks from intrusions.

  • Firewall
  • Bitlocker
  • Group Policy
  • Internet

It holds a copy of AD DS and responds to request for active directory information.

  • File Server
  • Application Server
  • Domain Controller
  • Web Server

It is a collection of Domain Trees.

  • Domain Local
  • Forest
  • Global
  • Universal

It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows.

  • Reliability and Performance
  • Deployment
  • Usability
  • Security

It enables the IT Administrators to automate one-to-several management of users and computers.

  • Group Policy
  • Action Center
  • Applocker
  • Control Panel

It enables users to log on to the domain to gain access to the network resources and it is reside in Active Directory.

  • None of the Choices
  • Built-in User Accounts
  • Local User Accounts
  • Domain User Accounts

It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, performs firewall functions and makes routing decisions based upon traffic priority.

  • Switch
  • Hub
  • Firewall
  • Router

Where will you see the Manage Wireless Networks tool in your PC?

  • Control Panel
  • Accessories
  • System Tools
  • Program Files

What type of notation does IP version 6 address uses?

  • Hexadecimal
  • Decimal
  • Octal
  • Binary

It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained.

  • Migration
  • Upgrade Installation
  • Clean Installation
  • None of the Choices

Which of the following is not a Performance Monitor tool?

  • Data Collector Sets
  • Reports
  • Monitoring Tools
  • Windows Memory Diagnostics Tool
Comments
Paypal Donation

To keep up this site, we need your assistance. A little gift will help us alot.

Donate

- The more you give the more you receive.

Related Subject

Object Oriented Programming Laboratory

Mobile Programming

Network Security

Management Information Systems

Managing Information and Technology

Mobile Application Design and Development

Mobile Application Design and Development 2

Living in the Information Technology Era

Mail and Web Services

Information Technology Practicum

Information Technology Capstone Project

Introduction to Computing

Intro to Hardware Description Language

Introduction to Human Computer

Introduction to Information Systems

Introduction to Multimedia

Integrative Programming and Technology 2

Internet Marketing and Entrepreneurship

Internet Technology in Real Estate

Information Assurance and Security 2

Information Assurance and Security 3

Information Security and Management

Information Systems Operations and Maintenance

Fundamentals of Investigation and Intelligence

Fundamentals of Database System

Digital Imaging

Data Communications and Networking 2

Cyber Security: Theories and Practice

Data Communications and Networking

Data Structures and Algorithms

Database Management System

Chemistry for Engineers

Computer Fundamentals

Load Testing

3D Game Art Development

Animation Project

Auditing and Assurance Concepts and Applications

Current Trends and Issues

Applied Business Tools and Technologies

System Administration and Maintenance

Integrative Programming and Technology

Software Engineering

Computer Programming

Linux Administration

Data Communications and Networking 4

Information Assurance and Security

Data Communications and Networking 3

Application Lifecycle Management

Systems Integration and Architecture


Show All Subject
Affiliate Links

Shopee Helmet

Shopee 3D Floor

Lazada Smart TV Box