133._________is software that allows your
computer to communicate with the hardware or any other device you want to
install.
a. Device
b. USB
c.
Driver
d. Plug and Play
Answer: C
134.The ________driver is signed by
organizations other then Microsoft.
a. Untrusted publisher
b. Windows Signing Authority
c.
Unsigned
d. Trusted publisher
Answer: D
135.To improve the efficiency and performance
of a driver you need to ___________ the driver.
a. Uninstall
b. Update
c.
Hide
d. Use
Answer: B
136.________enables you to use previous version
of driver when the driver you are using causes system instability.
a. Plug and Play
b. Device Manager
c.
Driver
d. Driver Rollback
Answer: D
155.The Wellizon Textile Company has bought a new printer
and wants to install the appropriate driver, as Windows does not have the
required driver. The engineer needs to install the driver manually. Which
option can be used to install the driver manually?
a. Search automatically for updated driver
software
b. Let me pick from a list of device drivers
on my computer
c.
Browse
my computer for driver software
d. Installation CD
Answer: C
137.The Wellizon Textile Company is facing
problems while using computers as there are certain devices which are removed
from the computer but the device drivers are still present. The engineer wants
to fix the problem so that the computer works properly. What should be done to
fix the problem?
a. Install new Drivers
b. Replace Drivers
c.
Uninstall
Drivers
d. Delete Drivers
Answer: C
138.In Wellizon Textile Company, an employee
finds that one of the volumes in the system is running out of space. But, there
is no unallocated space in either of the hard drives. But there is a volume
that has enough space in it. What should be done?
- Partition the volume
- Extend the volume
- Format the volume
- Create a mounted volume
Answer: D
139.The _______________ acts as an interface
between the user, application programs, hardware and system peripherals.
a.
Desktop
b.
Operating
System
c.
Mouse
d.
Windows
Answer: b
140.DOS provides a text-based interface called
the _____________
a.
Command
Prompt
b.
Windows
c.
Editor
d.
CONFIG.SYS
Answer: C
141.The DOS command CD is used to _______________
a.
Compress
the disk
b.
Copy
the files to the directory
c.
Copy the contents of more than one directory at a time
and retain the directory structure
d.
Change
the Directory
Answer: D
142.Which DOS attribute is used by backup
programs?
a.
Read-only
b.
Archive
c.
Hidden
d.
System
Answer: B
143.The text based ANSWER FILE used to automate
the Installation of Windows XP Professional is
a)
UNATTEND.BAT
b)
UNATTEND.TXT
c)
UNATTEND.UDB
d)
UNATTEND.XLS
Answer : B
144.The file used to automate Windows XP
Professional Installation through Bootable CD – ROM is
e)
WINNT.TXT
f)
WINNT.BAT
g)
WINNT.SIF
h)
WINNT.UDB
Answer: C
145.Remote Installation Service uses _________
file to automate the Installation
i)
REMBOOT.TXT
j)
REMBOOT.BAT
k)
REMBOOT.SIF
l)
REMBOOT.UDB
Answer: C
146.You have several computers that you want to
upgrade to Windows Vista Ultimate. Prior to performing the upgrade, you want to
run the Windows Vista Upgrade Advisor. Which of the following operating systems
can you evaluate using this tool? (Choose all that apply).
m)
Windows
2000 Professional
n)
Windows
XP Professional
o)
Windows
Vista Home Basic
p)
Windows
Me
Answer: B, C
147.Which of the following processors
fall below Windows Vista’s minimum recommended requirements? (Choose all that
apply)
q)
3.0 GHz Pentium IV
r)
500 MHz Pentium III
s)
1 GHz Pentium III
t)
700 MHz Pentium III
Answer:
B, D
148.Which of the following hardware
configurations fall below the minimum recommended for Windows Vista?
u)
A
computer that has a 10 megabit network interface card
v)
A
computer that has a 100 megabit network interface card
w)
A
computer that has a 900 MHz Pentium III processor
x)
A
computer that has 256 MB of RAM
Answer: D
149.Last week you updated your
graphics adapter manually after downloading new device driver software from the
vendor’s website. This is the third time you have done this since you purchased
your Windows Vista computer. Until now, you have never experienced any system
instability. Since the installation of the latest version of the driver, the
computer appears to crash randomly. You suspect the new driver. What should you
do?
y)
Uninstall the driver
z)
Run Windows Update to obtain a new driver
aa)
Roll back the device driver
bb)
Roll back using System Restore
Answer:
A, B
150.You work on the technical support desk at
the local computer superstore. A customer has called complaining that he is
getting a headache from the flickering of monitor. What advice should you give
him?
cc)
Adjust
the number of colours displayed
dd)
Adjust
the monitor’s resolution
ee)
Adjust
the refresh rate
ff)
Adjust
the color management settings
Answer: C
151.After you install Windows Vista, how long
is the grace period before you must activate the product?
gg)
10
Days
hh)
15
Days
ii)
30
Days
jj)
180
Days
Answer: C
152.You using Parental Controls to configure
web restrictions for 6 year old child. You want to block all web except
websites approved for children. What web restriction level should you choose?
kk)
Custom
ll)
None
mm)
Medium
nn)
High
Answer: D
180.The Wellizon Textile Company maintains its
accounts in windows Vista. The engineer wants
to keep more then one copy of their accounts with same version number on
different location. He also wants that when he make any changes to an offline
file, all the files on the different location should be changed respectively.
Which of the following feature is provided by Windows Vista to fulfill the
requirement?
a. Synchronizing data using the Network and
Sharing center
b. Synchronizing data using the Sync center
c.
Synchronizing
data using Network connections
d. Synchronizing data using Windows Task
Manager
Answer: B
181.The Wellizon Textile Company having two
different network connections. The engineer wants to that all the computers
that are connected to different networks, should communicate and share their
resources with each other. Which of the following method can be used to resolve
the problem?
e.
By
viewing the network performance
f.
By
creating a bridge between the network connections
g.
By
repairing TCP/IP configuration
h. By adding wireless computer to the network
Answer: B
182.______ is a virus.
a. Melissa
b. Word Concept
c.
Bonzi
Buddy
d. Kazaa
Answer:C
153.A spyware can be stopped using _______.
a. Antivirus program
b. Windows Update
c.
User
Account Control
d. Windows Defender
Answer: D
154.An administrator is provided _______
tokens.
a. One
b. Two
c.
Three
d. Four
Answer: B
155.The ______ prompt is the common UAC prompt
displayed for a standard user.
a. Warning
b. Consent
c.
Credential
d. Notification
Answer: C
156.The Windows Security
Center is notified by a
______ icon in the notification area.
a. Shield
b. Rod
c.
Arrow
d. CD
Answer: A
157.______ allows you to configure firewall
settings from the Command prompt.
a. Windows Firewall with Advanced Settings
b. Netsh Utility
c.
Group
Policy Object Editor
d. Windows Server Update Services
Answer: C
158.______ rules are followed by Windows Vista
computers for authentication before connecting to other computers.
a. Security Connection
b. Security
c.
Connection
Security
d. Connection
Answer: A
159.Windows Defender definitions contain the
______ of signatures of spywares.
a. Database
b. Folder
c.
Updates
d. Code
Answer: B
226.In the Wellizon Textile Company, some of the programs
and system files are found to be corrupted, due to which error messages pop-up
each time the system starts. The engineer thinks that the system has been
infected. Which tool should be used to detect and repair the infected programs
in the system?
a.
Windows
Defender
- Group Policy Object Editor
c.
Antivirus
program
- Netsh Utility
Answer: C
160.The Wellizon Textile Company wants to
install a program that has been downloaded from the Internet, but Windows Vista
is not allowing to do so. The engineer wants to fix this problem by choosing
the appropriate tool. Which tool should be selected by the engineer?
- Windows Firewall with Advanced Security
- Windows Server Update Services
- User Account Control
- Windows Defender
Answer: A
227.___________________ display selective information
about security, blocked pop-up window and other activities to prevent a page
from opening..
- Command bar
- Address bar
- Information bar
- Status bar
Answer: c
228._____________ security level is used for trustworthy
sites such as secure internal sites.
- High
- Medium-high
- Medium-low
- Low
Answer:d
229.A small text files that store the user information on
the computer are ____________.
- Form data
- Cookies
- Passwords
- Temporary Internet files
Answer: b
230.Press _________________to open a special page of
thumbnails for all open tabs.
A. Ctrl + W
B. Ctrl + T
C. Ctrl + Tab
D. Ctrl + Q
Answer: d
E.
Press the __________ key to view the menu bar in IE7.
- Shift
- Ctrl
- Alt
- tab
Answer: c
F.
The
Remote Assistance Invitation is saved ____________ default name.
- Invitation.doc
- Invitation.msrcincident
- Invitation.exe
- Invitation.mdf
Answer: b
G.
The
manager of Wellizon Textile Company needs some help with his system which is
not showing some important files. He wants help from the software engineer as
soon as possible as he does not want the production plan to be put in a halt.
But the software engineer is out of town. Which tool will come in aid for the
manager at this situation?
- Secure Connection tool
- RSS Feed tool
- Custom Filter tool
- Remote Assistance tool
Answer: d
H.
One of
the staff of the Wellizon Textile Company is not being able find an e-mail in
the inbox that has been sent by the client containing important details. When
contacted, the client confirms that the e-mail has already been sent. What do
you think is the problem here?
- The e-mail has been flagged
- The e-mail has been moved to Junk E-mail folder
- The e-mail does not have the digital signature
- The e-mail has not yet reached
Answer: b
I.
A file
deleted from the ________ will be deleted permanently without having it moved
to the Recycle Bin.
- Desktop
- Local drive
- Network drive
- Public folder
Answer: c
J.
The
________ can be used to store the contents you want to share with other users
on the computer.
- Desktop
- Public folder
- Recycle Bin
- Computer folder
Answer: b
K.
Computers
using various operating systems on a network should have the same ________ to
enable sharing over the network.
- File system
- Workgroup name
- Shared folder
- Computer name
Answer: b
______________ interface in Windows Vista improves the clarity in
appearance.
oo)
Windows
Easy Transfer
pp)
Windows
Instant Search
qq)
Widows
Aero
rr)
Windows
Media Centre
Answer: C
161.The Windows Meeting Place feature in Windows
Vista enables sharing of desktop of up to ______________ users.
ss)
Five
tt)
Ten
uu)
Fifteen
vv)
Seven
Answer:
B
162.The ______________ edition of
Windows Vista supports BitLocker Drive Encryption.
ww)
Windows Vista Ultimate
xx)
Windows Vista Home Basic
yy)
Windows Vista Premium
zz)
Windows Vista Business
Answer:
A
163.The ______________ dialog box
enables you to select the default operating system when dual-boot is
configured.
aaa)
System Properties
bbb)
Startup and Recovery
ccc)
Performance Options
ddd)
User Profiles
Answer:
B
164.Before upgrading to Windows
Vista, at least ______________ free space must be available in the Windows XP
volume.
a.
15 GB
b.
256 MB
c.
10 GB
d.
11 GB
Answer:
D
165.The ______________ recovery
option in Windows Vista enables automatic rebuilding of the installation.
a.
Startup Repair
b.
System Restore
c.
Windows Complete PC Restore
d.
Windows Memory Diagnostic Tool
Answer:
C
166.The ______________ recovery option is best
for manually replacing files.
a.
Startup
Repair
b.
Command
Prompt
c.
Windows
Complete PC Restore
d.
Windows
Memory Diagnostic Tool
Answer: b
227.The Wellizon Textile Company is facing problems while
working on a computer. The network engineer thinks there is some problem in the
computer hardware. Which system recovery tool should be used to diagnose the
problem related to the hardware?
a.
Startup
Repair
b.
System
Restore
c.
Windows
Memory Diagnostic tool
d.
Command
Prompt
Answer: a
228.The Wellizon Textile Company is using an operating
system with Windows Vista and another operating system with Windows XP
installed. The engineer wants to select an operating system during the booting
process. Which of the following process should be used to select an operating
system during the booting process?
a.
Dual Booting
b.
System
Restore
c.
Windows
Complete PC Restore
d.
Startup
repair
Answer: A
229.The special screen of Tablet PC hardware is known
as___________.
eee) Stylus
fff)
Tap
ggg) Applying Ink
hhh)
Slate
Answer: A
156.The ______________ option is used to merge the
registry.
- Export
- Import
- Load hive
- Unload hive
Answer: D
157.You can rename the value in the left pane by pressing
the ___________ key
- F1
- F2
- F3
- F4
Answer: A
158.The _____________ operation is used to copy a value or
key from one location to another in the registry.
- Add
- Compare
- Copy
- Delete
Answer: D
159.The ______________ operation is used to create a hive
file.
- Query
- Restore
- Save
- Unload
Answer: A
160.The Wellizon Textile Company is using Windows Vista
operating system. The engineer took a backup of the registry editor and than
make some changes to the registry editor. Unfortunately, the system encounters
with problem. Which of the following option can be used to recover the previous
changes?
- Export
- Import
- Load hive
- Unload hive
Answer: B
161.In Wellizon Textile Company, the manager wants to
prevent access to the registry editing tools for certain users. Which feature
should be used for this purpose?
- Group Policy Object Editor
- Task Manager
- System Protection utility
- Registry Editor
Answer: D
162.A spanned volume can exist
only on a __________ disk.
- UDF
- CDFS
- Basic
- Dynamic
Answer: D
163.The __________ file system does not allow a partition
to be created if its size exceeds 4 GB.
- FAT
- FAT32
- NTFS
- DiskPart
Answer: A
164.The __________ utility allows you to manage disks,
volumes and partitions of your system from the command prompt.
- Disk Management
- DiskPart
- Device Manager
- Disk Defragmenter
Answer: B
165.A volume that is mapped to an empty folder in another
drive is known as a _________.
- Mounted volume
- Spanned volume
- Striped volume
- Basic volume
Answer: A
166.Data in a __________ volume is allocated by dividing
them into chunks of 64 KB by the operating system.
- Simple
- Spanned
- Striped
- FAT
Answer: C
167.A drive path can be assigned to a volume using an
empty folder in a volume formatted in the __________ file system.
- FAT
- FAT32
- NTFS
- UDF
Answer: C
168.The __________ command is used to reduce the size of a
volume by a specified amount.
- Shrink
- Reduce
- Remove
- Delete
Answer: A
169.The manager of the Wellizon textile company wants to
increase the size of one his volume so that he can accommodate more data in
that volume. He also notices that there is some unallocated space in his hard
disk. What should he do to increase the size of this volume?
- Format the volume
- Extend the volume
- Shrink the volume
- Convert the disk into dynamic disk
Answer: B