MCQ's For Computer/EC/IT -14



1)       The --------------  is a centralized location for providing the tools for managing the printers,drivers,queues and shares.
a)       Print folder
b)       Print Management Console
c)       Windows Security Center
d)       Network folder
              Ans  b

2)       Window Vista allows us to configure the Automatic backup settings using the Back up file wizard.
a)       True
b)       False
              Ans  a



3)       The ------------- is a complete restoration of our system.
a)       System Restore
b)       Window Restore
c)       System Repair
d)       Windows Complete PC backup
              Ans   d
4)       In Windows Vista “AERO” is acronym for
a)       Authentic, Energetic, Reflective & Open
b)       Authenticate, Energetic, Reflective & Outsource
c)       Authenticate, Energy, Relaxive & Open
d)       Authentic, Energy, Related & Operating
            Ans   a

5)       The ---------------- interface in Windows Vista improves the clarity in appearance.
a)       Windows Media Cennter
b)       Window AERO
c)       Windows Defender
d)       Windows Boot Manager

             Ans   b


6)       ----------------  area contains the icons for programs and services running in the background.
a)       Taskbar
b)       Notification
c)       Control Panel
d)       Gadgets
              Ans  b

7)       A Power Plan is a collection of hardware & system settings that manages how our computer uses power.
a)       True
b)       False
              Ans   a

8)       “Power Plan” available in Windows Vista are
a)       Balanced
b)       Power Saver
c)       High Performance
d)       Hibernating
e)       Sleeping

                Ans  a,b,c


9)       The XYZ company wants to choke up certain program which may access by some of the employee that may cause damage to their computer system . Which method should be used to choke up those programs
a)       Bypassing Logon Screen
b)       Restricting access to websites
c)       Monitoring users activities
d)       Blocking specific program
               Ans  d
10)   Two types of Drivers are
a)       Signed
b)       Unsigned
c)       Encrypt
d)       Decrypt
              Ans  a,b

11)   A ------------ driver is a device driver that includes a digital signature.
a)       Unsigned
b)       Encrypt
c)       Decrypt
d)       Signed
               Ans   d

12)   The unsigned drivers are device drivers, which do not have a digital signature and therefore they are potentially harmful for our system
a)       True
b)       False
             Ans  a

13)   When user tries to install a particular driver without administrative privileges. Window Vista automatically installs drivers from trusted publishers and denies installations from other categories.
a)       True
b)       False

             Ans  a


14)   A ------------ signature is an electronic signature that is used to authenticate the identity and reliability of a set of files.
a)       binary
b)       analog
c)       digital
d)       octal

               Ans   c


15)   The -----------------  driver is signed by organizations other than Microsoft.
a)       Windows Signing Authority
b)       Unsigned
c)       Trusted Publisher
d)       Untrusted Publisher
                Ans  c

16)   A ----------- is a collection of computers that are connected within a Local Area Network.
a)       Domain
b)       Host name
c)       Workgroup
d)       Server

            Ans   c 


17)   The Workgroup name can exceed more than 15 characters
a)       True
b)       False
               Ans   b

18)   “NDF” acronym for
a)       Networking Diagnostic Framework
b)       Network Diagnostic Framework
c)       Network Digital Framework
d)       Network Diagnostic Firewall
               Ans   b

19)   Security threats can be categorize into
a)       Viruses
b)       Worms
c)       Spyware
d)       All Above
e)       None
               Ans   d

20)   The -------------------Center is the central location for administrating the various security components present in the system
a)       Windows Firewall
b)       Windows Defender
c)       Windows Security
d)       Windows Updates
                Ans   c

21)   Exeptions are set on a specific program or port address, to allow it from being blocked by the firewall
a)       True
b)       False

             Ans  a


22)   Inbound & Outbound rules allow or block the incoming & outgoing connections respectively.
a)       True
b)       False

               Ans   a


23)   --------------  allows us to configure firewall settings from the Command prompt
a)       Windows Server Update Services
b)       Group Policy Object Editor
c)       Netsh Utility
d)       Windows Firewall with Advanced Settings
                Ans   c



24)   Which key has to be pressed to see the tool bar in IE7 in Vista
a)       Ctrl
b)       Alt
c)       Esc
d)       Shift
             Ans   b

125)             Security zones provided by IE7 in Vista
A        Internet
A        Local Intranet
B        Trusted Sites
C        Restricted Sites
D        All Above
E        None

                Ans     e


126)            Phishing is a trick, used to hack personal or financial information such as security number and credit card number through email messages and website hacker.
A        True
B        False
                Ans   a

127)            Pop-up blocer provides three levels for alertness
A        Low
B        Medium
C        High
D        Above
E        Below
                Ans   a,b,c 

128)            A small text files that stores the user information on the computer are
A        Form data
B        Cookies
C        Passwords
D        Temporary Internet files

             Ans   b


129)            One of the staff of Jetking company is not being able to find an e-mail in their inbox that has been sent by other employee of Jetking . When they contacted sender confirms that the e-mail has been sent . What do you think is the problem here
A        The e-mail has been flagged
B        The e-mail has been moved to Junk E-mail folder
C        The e-mail doen not have the digital signature
D        The e-mail has not yet reached

                 Ans  b


130)            The How often do you want to create a backup? Screen allows you to --------- the backup
A        Schedule
B        Restore
C        Save
D        Delete
                Ans   a

131)            When we create a Complete PC backup , our harddisk should be formatted to use
A        NTFS
B        EFS
C        FAT 32
D        FAT 64
                Ans   a

132)            Advanced Restore does not provide you the ---------- option
A                    Files from the latest backup made on this computer
B                    Files from an older backup made on this computer
C                    Files from a backup made on different computer
D                    Files from a backup from a backup media
                 Ans    d



133.                The pen process against the screen is known as _________________.

e)       Stylus
f)        Tap
g)       Convertible
h)       Applying ink
Answer: D

134.Change the waiting time for the screen saver from _____________.

i)        Wait pop-up menu
j)        Time pop-up menu
k)       Theme pop-up menu
l)        Screen saver pop-up menu
Answer: A

135._____________ shows the information about the graphics adapter installed on the computer.

m)     Adapter tab
n)       Color management tab
o)       Monitor tab
p)       Troubleshooting tab
Answer: A

136.Windows Vista allows you to set the screen refresh rate in __________________.

q)       Adapter tab
r)       Color management tab
s)        Monitor tab
t)        Troubleshooting tab
Answer: C

137.__________________ option enables you to hide the taskbar.

u)       Keep the taskbar on top of other windows
v)       Show Quick Launch
w)      Auto-hide the taskbar
x)       Lock the taskbar
Answer: C

138.The ___________________ power plan provides full performance for the system with saving power.

y)       Power saver plan
z)       Balanced plan
aa)   High performance plan
bb)   Low performance plan
Answer: B

139.The Wellizon Textile Co. has four sections Marketing, accounts, Manufacturing and Export. The company uses Windows Vista Operating system. The system operator wants to change the desktop background. But he is facing problem while applying any image as desktop background from the graphic file. The problem may occur if the graphic file format is:

a.       .jpg or .jpeg
b.       .bmp or .dib
c.        .png
d.       .mfd

Answer: D

140.The three types of user accounts are Standard Account, Administrator Account and ___________ Account.

cc)    Personal
dd)   Guest
ee)    Protected
ff)     Shared
Answer: B

141.___________account is used by temporary users of a computer.

gg)   Shared
hh)   Personal
ii)      Standard
jj)      Guest
Answer: D

142.The ____________tool has to be used for deleting a particular account.

kk)   Administrator Accounts
ll)      User Accounts
mm)           Guests Accounts
nn)   Standard Accounts
Answer: B

143.The maximum length of a password cannot exceed ________characters.

oo)   4
pp)   100
qq)   127
rr)    12
Answer: C

144.The user with _____________rights can set or change a password of other users.

ss)     Guest
tt)      Administrative
uu)   Standard
vv)   Advanced
Answer: B

145.Members of this group can log on to the computer remotely.

ww) Replicator
xx)   Offer Remote Assistance Helpers
yy)   Remote Desktop Users
zz)    Power  Users
Answer: C

146.The _________________policy stores a password as text which provides better security level.

aaa)            Enforce password history
bbb)            Minimum password age
ccc) Password must meet complexity requirements
ddd)            Store password using reversible encryption for all users in the domain
Answer: D

147.The Wellizon Textile Company is facing problem as there are visitors who use the computers for a short while and have to be provided with credentials of employees. The engineer wants to provide an account using which the employee’s data cannot be accessed by the visitors. Which method should he use to restrict visitors from accessing the personal files and folders?

eee) Administrator Account
fff)   Guest Account
ggg)            Standard Account
hhh)            Temporary Account
Answer: A

148.The Wellizon Textile Company wants to choke up certain program which may access by some of the employee that may cause damage to their computer system. Which method should be used to choke up those programs?

iii)    Bypassing Logon Screen
jjj)    Restricting access to websites
kkk)            Monitoring users activities
lll)    Blocking specific program
Answer: D

249.When you install or configure a new device the __________ feature takes care of the installation.

a.       Installation Wizard
b.       Automatic Installation
c.        Plug and Play
d.       Normal Installation
Answer: C

149.When you install a signed or unsigned driver you have to give your consent in the ___________ dialog box.

a.       Warning
b.       Credentials
c.        Administrator
d.       UAC
Answer: D

150.The __________ Manager is a control which allows users to view the information about all the installed and connected Plug and Play devices.

a.       Driver
b.       General
c.        Device
d.       Control
Answer: C