Information for applications like ms word

Assignment Help Basic Computer Science
Reference no: EM131102518

Question 1. If you are doing incremental backups and you need to recover data, which backups do you need to do the recovery?

  • The last differential backup and the last incremental backup
  • The last incremental backup
  • The last full backup and all subsequent incremental backups
  • The last full backup and the last incremental backup

Question 2. Configuration information for applications like MS Word or Excel would be stored under the _____ registry subkey.

  • HKEY_CURRENT_USER
  • HKEY_CLASSES_ROOT
  • HKEY_CURRENT_CONFIG
  • HKEY_LOCAL_MACHINE

Question 3. Which of the following Windows commands moves a file from the original location and puts it in another location without altering the original file?

  • Paste
  • Copy
  • Delete
  • Remove

Question 4. _____ use the Windows NT/2000/XP registry

  • Hardware profiles
  • Application programs
  • Device drivers
  • All of the above

Question 5. If you turn on your computer and it accesses the BIOS but hangs at the POST (Power-On Self-Test), which of the following problems is most likely to be responsible?

  • No bootable floppy in
  • Virus in the Boot Sector of Drive "C"
  • A bad BIOS chip
  • RAM (Random Access Memory) fault

Question 6. Which is a reliable method to deploy when trying to repair intermittent problems?

  • Replacing suspect parts
  • Periodic maintenance
  • Keeping a log
  • Waiting for catastrophic failure

Question 7. Windows 2000/XP can have a maximum of _____ IDE devices in a system.

  • two
  • six
  • eight
  • 10

Question 8. _____ is not an expansion slot on a PC.

  • AGP
  • ISA
  • PCI
  • SCI

Question 9. The first sector on a disk is called the boot _____.

  • sector
  • record
  • loader
  • Both A and B

Question 10. Which of the following is NOT a port available on a PC?

  • USB
  • ISB
  • IEEE 1394
  • Parallel

Question 11. Which of the following network device can ONLY regenerate signals and extend network segments?

  • Hub
  • Modem
  • Network printer
  • Router

Question 12. Which type of Ethernet connection allows for transmission and reception at the same time?

  • Simplex
  • Duplex
  • Half-duplex
  • Full-duplex

Question 13. Which of the following is the Ethernet physical topology?

  • Bus
  • Ring
  • Point-to-point
  • Mesh

Question 14. How many collision domains are present in a network with two hosts and two switches?

  • One
  • Two
  • Three
  • Four

Question 15. What is a consideration when migrating from Fast Ethernet to Gigabit Ethernet?

  • Effects on the existing TCP/IP protocol stack
  • Network devices possibly needing to be upgraded or replaced
  • Network frames being different
  • They are identical networks, so no considerations are needed.

Question 16. How many subnets can the address 129.168.1.0/19 support?

  • Two
  • Four
  • Six
  • Eight

Question 17. Which of the following device can break down broadcast domain without using VLANs?

  • Workgroup switch
  • Router
  • Repeater
  • Hub

Question 18. How many subnets can the address 192.168.1.0/27 support?

  • Two
  • Four
  • Six
  • Eight

Question 19. Which is a feature of the Transmission Control Protocol (TCP)?

  • Address assignment
  • Message segmentation
  • Reliable
  • Unreliable

Question 20. How many hosts can the address 129.168.1.0/19 support?

  • 1,022
  • 2,046
  • 4094
  • 8,190

Question 21. What does the S in HTTPS represent

  • Simple
  • SMTP
  • Secure
  • Signature

Question 22. In Internet terminology, HTTP stands for _____.

  • High Terminal Tension Process
  • Hypertext Transfer Protocol
  • History of Text Transfer Procedure
  • None of the above

Question 23. Which of the following is the suffix of a domain name called?

  • Bottom-level domain
  • Top-level domain
  • .edu
  • .org

Question 24. Which suffix is commonly used for nonprofit websites?

  • .com
  • .gov
  • .org
  • .ark

Question 25. Which of the following can be done if a browser appears to run slow?

  • Delete the web page.
  • Delete system files.
  • Delete temporary Internet files.
  • Delete configuration files.

Reference no: EM131102518

Questions Cloud

Determine the increase in velocity of the space shuttle at p : Determine the increase in velocity of the space shuttle at point P so that it travels from a circular orbit to an elliptical orbit that passes through point A. Also, compute the speed of the shuttle at A.
What you know about the psychological factors : Discuss the factors that are contributing to her rising stress levels and note how she might respond to the stress if the traffic doesn't clear up soon.
Seconds to read a page in from the harddrive : Suppose page faults occur 95% of the time (i.e. a page is not in the TLB). What is the average access time to retrieve a page from the harddrive if it takes 100 nano seconds to search the TLB and 10 milli seconds to read a page in from the harddr..
How does this density compare with the density : At room temperature and pressure RbI crystallizes with the NaCl-type structure. Use ionic radii to predict the length of the cubic unit cell edge. How does this density compare with the density you calculated in part (b)?
Information for applications like ms word : Configuration information for applications like MS Word or Excel would be stored under the _____ registry subkey.
Why does a shaded-pole motor run at a constant speed : Why does a shaded-pole motor run at a constant speed? What will happen if you place too many washers on the end of a shaded-pole motor shaft? Which one of the following parts of a universal motor does not move?
How are financial accountants challenged in their work : How are financial accountants challenged in their work to make ethical decisions?
Newspaper ethical dilemma resolution model : Should an employer have an ethical obligation to keep such unproductive, but loyal employees? What if the employee had been a problem his or her entire career?
Vsb filter has the following amplitude and phase responses : In this example we consider the time-domain waveforms corresponding to VSB modulation and consider demodulation using envelope detection or carrier reinsertion. We assume the same message signal as was assumed Example 3.4. In other words,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The role of the system analyst and how it impact goals

Research Paper: the role of the system analyst and how it impact goals and objective of the organization. This paper should a 10 page paper including references and content. It be written in an APA format.

  Develop requirements traceability matrix

The GlobalUBid.Com Case Study will be used to develop a requirements traceability matrix describing and following the life of requirements in both the forward and backward direction.

  Olap and data mining toolsets

Mention some valid criteria that might be used to evaluate "OLAP and Data Mining toolsets" and then summarise at least two major vendors product sets against that criteria.

  Prove the set of all functions from a to b is countable

Let A = {0,1} and B be a countable set. Prove that the set of all functions from A to B is countable

  A network administrator deliberately disable

We know the disadvantage of a "black hole" is that packets do not reach their destination and no error messages are sent back to inform the sender.Why would a network administrator deliberately disable ICMP messaging on their network?

  What is the goal of redundancy

At each branch, there is a Cisco 2600 router to connect the branch to Operations. This is a multiprotocol router capable of handling the many protocols used at the internet and transport layers in branch office communication.

  How would this affect root name server traffic in general

How would this affect root name server traffic in general? How would this affect such traffic for the specific case of resolving a name like cisco into a Web server address?

  Describe the purpose of a risk assessment

Describe the purpose of a risk assessment

  Are they similar across web sites

Are they similar across Web sites?

  What type of error is associated with an adc

The ADC contained within the 9S12G128 can be configured for several different digital output bits. Which is not the correct configuration?Question 3: What type of error is associated with an ADC that does not have a straight-line transfer function?

  Encode audio data in two packets

How might you encode audio (or video) data in two packets so that if one packet is lost, then resolution is simply decreased to what would be expected with half bandwidth?

  Identifying potential risk-response and recovery

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potent..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd