Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
Covers the fundamental principles of operating system design and function for both general-purpose computing and real-time application control.
It enables IT Administrator to automate one-to-many management of users and computers.
It is an administrative tool for managing user settings and computer settings across a network.
It enables the user to log on and access resources on a specific computer and usually reside in SAM.
It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.
It is the most common form of computer network.
It is one of the Considerations on why using the option of Upgrade rather than Migrate.
It defines the type of access granted to a user, group, or computer for a file or folder.
APIPA stands for:
Where will you see the Manage Wireless Networks tool in your PC?
It is the built-in encryption tool for Windows file systems
It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption used by medium and large organization.
It is one of the feature of Windows 7 that encrypts the computer operating system and data stored on the operating system volume.
It is a central location for viewing messages about your system and the starting point for diagnosing and solving issues with your system.
It is a security feature that simplifies the ability of users to run as standard users and perform all neccessary daily tasks
Which of the following is not a Physical WAN Components?
It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later
It is a type of network that interconnect devices by means of radio waves instead of wires and cables.
Which of the following is not a way to improve the signal strength?
It contains the partition table for the disk and a small amount of executable code called as the master boot code.
How many bits are there in an IP version 6 address?
It is a collection of Domain Trees.
It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive.
It is a way for you to limit use of disk space on a volume for each user to conserve disk space.
It contains an array of partition entries describing the start and end LBA of each partition on disk.
It is a feature of Windows 7 that allows windows 7 to be backward compatible
It is a wireless network modes that allows a wireless network adapters connects directly to another wireless network adapter for the purpose of temporarily sharing of files, presentations or an internet connection among multiple computers and devices.
Which of the following is not a Performance Monitor tool?
It is a software that is designed to deliberately harm a computer.
It enables you to manage network traffic, group physically dispersed nodes into logical area networks and isolate network traffic.
It is the measurement on how quickly the computer completes a task.
Which of the following is not a LAN Physical Topology?
It is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to run on user desktops.
It provides storage for the users' files and share folders that contain users' files.
What is the maximum bit rate for the 802.11n technologies?
It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information.
It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and replace an existing operating system on a partition.
It provides assistance in resolving network-related issues
Which of the following statement is not correct?
It is the process of determining whether something or someone has permission to access the resources
It is a computer that is dedicated to running network-aware application software.
It a server that is used to access the corporate resources from outside the corporate network.
It is a method of sharing folders that allow multiple default public folders for each computer and files shared with same computer and with same network.
It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, performs firewall functions and makes routing decisions based upon traffic priority.
Strong EAP methods provide strong authentication
Which of the following is not an IPv6 Address types?
It is a method of sharing folders that allows you to share folders quickly.
How many bits are there in an IP version 4 address?
It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows.
It is the non-contiguous storage of data on a volume
What type of notation does IP version 6 address uses?
It is a graphical user interface that is used to manage disks and volumes both basic and dynamic, locally or on remote computers.
It allows you to control which role functionality is installed and enabled.
It specifies which part of an IPv4 address is the network ID and which part of the IPv4 address is the Host ID.
It enables the IT Administrators to automate one-to-several management of users and computers.
It is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses enhanced metafile format (EMF) as the spool file format.
It holds a copy of AD DS and responds to request for active directory information.
It is a new authentication features that controls the ability of online IDs to authenticate to a computer.
It is a device that converts instructions from the network protocol stack into electric signals.
It is the process of verifying the identity of something or someone.
It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained.
Which of the following is not a Boot-option for troubleshooting startup problems?
Which of the following is not an advantage of installing a 64-bit edition of Windows 7?
It reduces the complexity and amount of administrative work by using automatic TCP/IP configuration.
It provides authenticaltion, host operations of master roles, hosting the global catalog and support group policies and sysvol.
It is a group of services hosted on a network which is a private structure and has the internet-like service provision.
Which of the following is not the common network architecture types?
Which of the following is not a Server Role of Windows Server 2008 R2?
It allows the administrators to identify which software is allowed to run and was initially added to Windows XP and Windows Server 2003.
It is a dynamic volume that joins areas of unallocated space disks into a single logical disk
It is the foundation of the Internet naming scheme and it supports accessing resources by using alphanumeric names.
It is the measurement of how a system conforms to expected behavior
It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation.
Which of the following is not a Wireless LAN Standards?
It is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs.
Which of the following is not a Specialized version of Windows 7?
It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit.
What is the IEEE 802 Standards for Local Wireless Networks?
Which of the following is a main type of group?
Provides a timeline of system changes and reliability. It also provides a system stability chart and reports on software installations and software or hardware failures.
It is a small software program that allows a hardware device to communicate with a computer
It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that using delete browsing history to maintain privacy because there are no logs kept or tracks made during browsing
Checks for symptoms of defective computer memory and usually can be started from administratve tools in the control panel
It enables users to log on to the domain to gain access to the network resources and it is reside in Active Directory.
Which of the following version of Windows are allowed for Upgrade?
It is an object that contains all of the information that defines a user in Windows Server 2008 R2.
It is a scriptable command line utility that create scripts to automate disk related task.
This are equivalents to door locks, employee badges and security systems. It protects the computer and networks from intrusions.
What is the binary notation for the 255.255.255.0 subnet mask?
It is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA.
172.16.0.0 /12 is what type of IPv4 Address.
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectObject Oriented Programming Laboratory
Mobile Programming
Network Security
Mobile Application Design and Development 2
Mobile Application Design and Development
Management Information Systems
Managing Information and Technology
Mail and Web Services
Living in the Information Technology Era
Information Technology Capstone Project
Information Technology Practicum
Intro to Hardware Description Language
Introduction to Multimedia
Introduction to Information Systems
Introduction to Human Computer
Introduction to Computing
Internet Marketing and Entrepreneurship
Internet Technology in Real Estate
Integrative Programming and Technology 2
Information Assurance and Security 2
Information Systems Operations and Maintenance
Information Security and Management
Information Assurance and Security 3
Fundamentals of Investigation and Intelligence
Fundamentals of Database System
Digital Imaging
Database Management System
Data Structures and Algorithms
Data Communications and Networking 2
Data Communications and Networking
Cyber Security: Theories and Practice
Chemistry for Engineers
Computer Fundamentals
Load Testing
3D Game Art Development
Animation Project
Auditing and Assurance Concepts and Applications
Software Engineering
System Administration and Maintenance
Integrative Programming and Technology
Data Communications and Networking 4
Current Trends and Issues
Linux Administration
Applied Business Tools and Technologies
Computer Programming
Data Communications and Networking 3
Application Lifecycle Management
Systems Integration and Architecture
Information Assurance and Security
Shopee Cashback Voucher
Temu $0 Shipping Fee
Amazon 75% Off Discounts