MCQ's For Computer/EC/IT -13



1)       We can create our own Power Plan
a)       True
b)       False

               Ans  a


2)       Windows Firewall can help prevent hackers or malicious software from gaining access to our computer through the Internet or network
a)       True
b)       False
              Ans  a

3)       ---------------  options enables us to hide the task bar
a)       Show Quick Launch
b)       Auto hide the task bar
c)       Keep the task bar on the top of the other window
d)       Lock the task bar
               Ans   b

4)       By default, Guest Account is-------------
a)       Disabled
b)       Enabled
               Ans  a

5)       The ----------- tool has to be used for deleting a particular account
a)       User Account
b)       Guest Account
c)       Administrator Account
d)       Standard Account
                Ans  a

6)       The -------------- policy stores a password as text which provides better security level
a)       Enforce password history
b)       Minimum password age
c)       Password must meet complexity requirement
d)       Stores password using reversible encryption for all users in the domain
               Ans  d

7)       XYZ company is facing problem as there are visitors who use the computer for a short while and have to be provided with credentials of employee. The engineer want to provide an account using which the employee’s data can’t be accessed by the visitors which method we use
a)       Administrator Account
b)       Standard Account
c)       Guest Account
d)       Temporary Account               Ans    c   

 

8)       The Boot.ini file is saved in

a)       Active Directory

b)       NTLDR

c)       System Memory

d)       System Partition

              Ans   d

 

9)       ---------------- is the process of  collecting all the scattered files & folders

a)       Fragmentation

b)       Defragmentation

c)       Disk Cleanup

d)       Disk Check


               Ans   b

 

10)   --------- means exchanging data between the RAM and the paging files.

a)       Virtual Memory
b)       Disk-Fragmentation
c)       Paging
d)       Demand Paging
               Ans  d

11)   In -------------- backup,selected files & folder have a marker
a)       Normal Backup
b)       Incremental Backup
c)       Daily Backup
d)       Differential Backup

               Ans   d

12)   A striped volume supports up to ______________ dynamic disks.
a)       16
b)       32
c)       18
d)       24

               Ans  b


13)   We require at least _____________ dynamic disks to create a spanned volume.
a)       2
b)       4
c)       16
d)       18

               Ans   a

14)   ________________ reduces the waiting time of the documents.
a)       Printer Pooling
b)       Printer Sharing
c)       Additional Driver
d)       Printer Port

               Ans    a


15)   _____________ is a software interface between the operating system and the print devices.
a)       Printer Server
b)       Printer
c)       Printer Port
d)       Local Printer

               Ans   c


16)   Once you attach a ____________ to your computer, the Windows Vista automatically install the necessary device drivers for printing.
a)       Printer
b)       Printer Server
c)       Plug & Play Printer
d)       Print jobs
              Ans    c

17)   The ____________ mode restore the latest hard disk state before the computer turns off.
a)       UPS
b)       Hibernate
c)       APM
d)       Balanced

              Ans   b

18)   ____________________ controls the peripheries device of a computer
a)       Device Manager
b)       Driver
c)       Devices
d)       Driver Signature checking

              Ans    b

19)   You can troubleshoot the I/O devices, using the ________________.
a)       Device Manager
b)       Add Hardware Wizard
c)       System Information
d)       Direct Diagnostics

             Ans    a


20)   A shared folder is identified with a symbol of a _______ below its icon.
a)       Hand
b)       Underline
c)       Star
d)       None of above

            Ans    a


21)   A __________ folder is folder on another computer that has been made available for other users on the network.
a)       Data
b)       Read only
c)       Shared
d)       None
              Ans   c

22)   Is the process of encoding data, preventing it from unauthorized acess.
a)       Encryption
b)       Decryption
c)       Coding
d)       All
e)       None
              Ans  a    

23)   The right side of the taskbar is known as ______________.
a)       Quick Launch bar
b)       Start Menu
c)       Notification Area
d)       Tool Bar

              Ans    c


24)   The ____________ consists of logon information, such as password and user name.
a)       Local Group
b)       Local user account
c)       User profile
d)       User Account
              Ans    d

25)   An administrator is provided ----------- tokens
a)       One
b)       Two
c)       Three
d)       Four
            Ans   b

26)   The Window Security Center is notified by a icon known as
a)       Shield
b)       Rod
c)       Arrow
d)        CD
           Ans    a


27)   ------------ is a Software that is installed on the user’s computer without the user’s consent

a)       Viruses
b)       Worm
c)       Spy ware
d)       Antivirus

              Ans    c


28)   Window Vista contains tools for managing the Window Firewall
a)       Windows Firewall
b)       Windows Firewall with Advanced Security
c)       Group Policy Object Editor
d)       Netsh Utility
e)       All Above
               Ans    e

29)   If the firewall is turned On ,all outside sources will be prevented from connecting to the computer, except the programs that are included in the Exceptions Tab.
a)       True
b)       False
            Ans   a

30)   Window Firewall can be used to configure only Inbound Exceptions
a)       True
b)       False
              Ans    a

31)   Windows Firewall with Advanced Security can be used to configure Inbound & Outbound Exceptions 
a)       True
b)       False

             Ans    a


32)   Using ------------  the administrator has to enter a password for a particular operation that requires elevation of privileges.
a)       Prompt For Consent
b)       Prompt For Credentials
c)       Elevate without Prompting
d)       None

              Ans  b


33)   The ----------------policy  can be used to directly modify Account an local policies, Public key policies & IP Security policy for our local computer
a)       Group Secrity
b)       Local Security
c)       Genearal Security
d)       Editor Security

               Ans    b




34)   ----------------  are required to establish a relation ship between a user and a computer.
a)       Temporary Account
b)       Local Account
c)       User Account
d)       Both a &  b
             Ans    c

35)   The maximum length of a password can’t exceed -------------- characters
a)       10
b)       100
c)       150
d)       127
              Ans   d

36)   A ---------- signature is an electronic signature that is used to authenticate the identity and reliability of a set of files
a)       Analog
b)       Digital
c)       Both a & b
d)       None
            Ans   b

37)   -----------  drivers involves replacing the old drivers with the recent versions of drivers
a)       Upgrading
b)       Updating
c)       Roll Back
d)       None
             Ans   b  

38)   Enables us to use the previous version of a hardware driver when the driver we are using causes system inability.
a)       Device Rollback
b)       Driver Rollback
c)       Driver Installation
d)       All of Above
              Ans   b

39)   If the signature is altered , Windows Vista prompts with a ------------ that suggests the user to stop the installation
a)       Warning
b)       Credentials
c)       Administrator
d)       UAC
              Ans   d

40)   When you install or configure a new device the ------------- feature care of the installation
a)       Installation Wizard
b)       Automatic Installation
c)       Plug and Play
d)       Normal Installation
              Ans   c

41)   The XYZ company is facing problems while using computers, as there are certain devices which are removed from the computer but the device drivers are still present. The engineer wants to fix the problem so that the computer works properly. What should be done to fix the problem
a)       Install new Drivers
b)       Replace Drivers
c)       Uninstall Drivers
d)       Delete Drivers
             Ans    c

42)   The ------------ allows us to map the IP network addresses are used by the data link protocol
a)       TCP
b)       ARP
c)       ICMP
d)       IGMP

            Ans   b

43)   Ipv6 uses -----------  bit IP addresses.
a)       32
b)       64
c)       128
d)       256
              Ans   c

44)   DOS stands for:
a)       Disk operating system
b)       Dos operating system
c)       Display operating system
d)       None of these

Ans: a

45)   FORMAT command is used to:
a)       Create disk partition
b)       Delete a disk partition
c)       Update a disk partition
d)       Format the disk partition
e)       All of the above
Ans: d




46)   DOS is an example of Graphical user operating system
a)       True
b)       False
Ans: b

47)   Autoexec.bat is a system file of Windows XP operating system
a)       True
b)       False

Ans: a


48)   Which DOS attributes is used by backup programs:
a)       Read-only
b)       Archive
c)       Hidden
d)       System
Ans: b
               
49)   XCOPY command is used to:
a)       Compress the disk
b)       Copy the files to the different directory
c)       Copy the contents of more than one directory at a time.
d)       Change the directory
e)       All of the above
Ans: c

50)   Fast user switching  is available in________operating system
a)       Windows Vista
b)       Windows XP
c)       Windows NT
d)       Windows Me
Ans: b