1) How
many password reset disk can be created for a particular user account
a) 1
b) 2
c) 3
d) 4
Ans a
2) The
Logon hours,access to games , blocking specific program can be taken care
by “Parental Control”
a) True
b) False
Ans a
3) ----------
is a replicating program that runs independently and spreads through
vulnerabilities
a) Worm
b) Viruses
c) Spyware
d) All
e) None
Ans a
4) Which
one is responsible for gaining access to user’s computer to make unwanted
changes in the system without user’s permission
a) Worm
b) Viruses
c) Spyware
d) All
e) None
Ans c
5) Spyware
can be removed by
a) Antivirus
b) Antispyware
c) Both
a & b
d) None
Ans a
6) In
Window Vista , UAC feature is enable by default
a) True
b) False
Ans
a
7) A
firewall does not protect the computer from spyware, viruses, pop-up ads
a) True
b) False
Ans a
8) Windows
Firewall & Windows Firewall with
Advanced Security are the two firewall that Window Vista uses
a) True
b) False
Ans a
9) Window
Firewall in Window Vista cheks both Incoming & Outgoing traffic
a) True
b) False
Ans a
10) NLA
( Network Location Awareness) method in Vista categorize the network location
into which type
a) Public
b) Private
c) Domain
d) All
Above
Ans d
11) In
Window Vista NLA Stands for “Network Location Awareness”
a) True
b) False
Ans a
12) In
Window Vista Window Firewall is enabled by default
a) True
b) False
Ans
a
13) States
provided by “Power Option” are
a) Shut
Down
b) Sleeping
c) Hibernating
d) All
Above
Ans d
14) Gadgets
can be used to display information such as time, weather data, RSS feed
summarize
a) True
b) False
Ans a
15) Window
Bitlocker Driver Encryption present in
a) Ultimate
b) Enterprise
c) Home
Basic
d) Home
Premium
e) Business
Ans a,b
16) Password
Reset Disk can be created if our computer is joined to a domain
a) True
b) False
Ans b
17) Password
Reset Disk can be created on a Stand alone computer
a) True
b) False
Ans a
18) UAC
stands for
a) User
Account Control
b) User
Access Control
c) User
Active Control
d) User
Admin Control
Ans a
19) The
Ctrl + Alt + Del and the logon screen can be bypassed if a user is bothered by
it
a) False
b) True
Ans b
20) ------------- is used to protect the system from Spyware
and other similar program
a) Windows
Defender
b) Windows
Firewall
c) Windows
Active Icons
d) Windows
Spyware
Ans a
21) In
Vista ----------- of the disk’s space is allocated to the Recycle Bin for each
drive
a) 50%
b) 20%
c) 10%
d) 40%
Ans c
22) Cipher
command is used to -------------- file
a) Decrypt
b) Encrypt
c) Compress
d) Decompress
Ans b
23) Using
Parental Control we can restrict
a) Access
to website
b) Logon
Hours
c) Access
to games
d) Blocking
specific program
e) All
Above
f)
None
Ans e
24) The
Offline files are a copy of the files located on the -----------
a) Recycle
Bin
b) Network
c) Control
Panel
d) Desktop
Ans b
25) ------------
give a quick access to the folders we use frequently
a) Command
Bar
b) Details
Pane
c) Favourite
Link
d) Network
Folder
Ans c
26) A
----- is a program that copies the document to be printed and converts it into
a set of instructions
a) Print
Spooler
b) Print
Queue
c) Print
Job
d) Print
Document
Ans a
27) The
document that are being printed and waiting to be printed are called---------
a) Print
icons
b) Print
Spoolers
c) Print
Folders
d) Print
Jobs
Ans d
28) One
of the employee of Jetking company finds that his printer has suddenly started
printing garbage. What should br the first step to solve the problem
a) Share
the printer
b) Check
for paper jam
c) Reinstall
Window Vista
d) Set
the printer as the default printer
Ans b
29) A
printer is installed on a local computer can be made available to the network
users by------------ the printer
a) Updating
b) Sharing
c) Testing
d) Uninstalling
Ans b
30) The
------------ option is used to restore the backup from another computer
a) Restore
files
b) Advanced
Restores
c) Restore
Previous Version
d) Files
from and older backup
Ans b
31) A
------------ is a volume, which is
located entirely inside a single physical device
a) Simple
Volume
b) Spanned
Volume
c) Stripped
Volume
d) All
e) None
Ans a
32) The
order in which print jobs are printed by the printer can be arranged by
selecting the ---------- of the print jobs
a) Driver
b) Spooler
c) Permissions
d) Priority
Ans d
33) A
---------- volume is a volume which joins the spaces from different disks and
making it operate as if it is single storage medium
a) Simple
Volume
b) Spanned
Volume
c) Stripped
Volume
d) All
e) None
Ans b
34) A
----------- is a volume created using stripes of free spaces from two or more
dynamic disks
a) Simple
Volume
b) Spanned
Volume
c) Stripped
Volume
d) All
Ans c
35) A
Simple Volume is a volume, which is located entirely inside a single physical
device
a) True
b) False
Ans a
36) The
--------- command is used to reduce the size of a volume by a specified amount
a) Shrink
b) Reduce
c) Remove
d) Delete
Ans a
37) A
spanned volume can exist only on a
a) UDF
b) CDFS
c) Basic
d) Dynamic
Ans d
38) The
manager of Jetking wants to increase the size of one his volume so that he can
accommodate more data in the volume. He also notices that there is some
unallocated space in his hard disk. What shoul he do to increase the size of
the volume
a) Format
the volume
b) Extend
the Voulme
c) Shrink
the Volume
d) Convert
the disk into dynamic disk
Ans b
39) ----------
is a utility provided by Microsoft Windows designed to improve the access speed
of the computer
a) Disk
Cleanup
b) Disk
Defragmenter
c) Check
Disk
d) System
Restore
Ans b
40) In Jetking, some computers are working very slow
and hang sometime. The engineer is unable to detect this problem. Which utility
the engineer should use in this situation
a) Disk
Defragmenter
b) Check
Disk
c) Disk
Clean up
d) System
Restore
Ans a
41) In Jetking company, the management wants to know
whether hardware needs to be updated to run a specific application on the
computer. Which tool should the engineer use to access the ability of the
computer to run the application
a) Network
Diagnostic Tool
b) Ready
Boost
c) Windows
Defender
d) Windows
Experience Index Tool
Ans d
42) How
many Public folder in Windows Vista
a) 1
b) 2
c) 3
d) 4
Ans a
43) To
Access the Advanced Boot options menu press
a) F2
b) F5
c) F8
d) F10
Ans c
44) When
----------- folders sharing is On, people on the network can access files in
the ----------- folder
a) public,
public
b) private,
public
c) public,private
d) private,private
Ans a
45) -------------- features restores our computer back to amore
stable state
a) Startup
Repair
b) System
Restore
c) Windows
Complete PC Restore
d) Windows
Memory Diagnostic Tool
Ans b
46) When
File sharing is ‘On’ files and printers that we have shared from this computer
can be accessed by people on the network
a) True
b) False
Ans a
47) Offlines
files allows us to work with them even when we are not connected or a server is
unavailable
a) True
b) False
Ans a
48) ----------- can help us to prevent unauthorized changes
to our computer
a) User
Account Control
b) User
Access Control
c) User
Admin Control
d) None
Ans
a
49) Power
Plans can help us to maximize our computer’s performance or conserve energy
a) True
b) False
Ans a
50) When
Network Discovery is ‘On’ this computer can see other network computers and
devices and is visible to other network computer
a) True
b) False
Ans
a