Documente Academic
Documente Profesional
Documente Cultură
1. Question ID #1
You are installing a SCSI CD-ROM drive. You must set the CD-ROM SCSI adapter to:
A . SCSI ID=1
B . SCSI ID=0
C . The same address as the SCSI device before the CD-ROM
D*. An unused SCSI address
E . SCSI ID=7
Explanation:
When you install a SCSI Device, you should always opt for an unused address.
2. Question ID #2
Which of the following would you have to upgrade to install an EIDE drive if you are still running an old 286
computer?
A . Serial board
B*. Controller board
C . RAM BIOS
D . A 286 CPU
E . ISA motherboard
Explanation:
In this case you will need an EIDE controller that supports EIDE drive.
3. Question ID #3
You have a system with one EIDE hard drive. To install a second IDE drive into a computer, you must:
Explanation:
The first EIDE drive should have the jumper in the master position. The second drive should act as the slave.
4. Question ID #4
Which interrupt is cascaded to provide interrupts 9 through 15?
A*. interrupt 2
B . interrupt 5
C . interrupt 16
D . interrupt 7
E . interrupt 0
Explanation:
Interrupt 2 will link the two banks together. It is cascaded though interrupt 9 to run interrupts in the 2nd bank (8-15)
5. Question ID #5
You are building a PC with one internal SCSI hard drive and one external SCSI CD-ROM drive. How should you
terminate this SCSI bus?
Explanation:
You have to terminate both ends of the SCSI chain in order for it to work properly.
6. Question ID #6
You want to add three new USB devices to your laptop. You are concerned that you do not have enough IRQ available.
How many IRQs will your new USB modem, mouse and keyboard require?
A . 4 IRQs
B*. 1 IRQ
C . 2 IRQs
D . 3 IRQs
E . 6 IRQs
Explanation:
The USB bus is capable of handling 127 devices per USB port, while only taking up 1 IRQ total, allowing for up to
254 devices sharing 1 IRQ.
7. Question ID #7
What must you do after replacing the CMOS battery.
Explanation:
The CMOS will keep the computer's date and time even while the machine is off and unplugged by using a small batter
pack. When this is replaced, the computer loses its date and time settings.
8. Question ID #8
Where can you find the BIOS version ID?
A . Diagnostics.
B . Motherboard manual.
C . System Properties.
D*. BIOS setup screens.
E . On the computer case.
Explanation:
This ID can be found in the BIOS setup on most computers. It can also be found at the bottom or top of the screen during
the POST on most motherboards.
9. Question ID #9
What must you do to attach a new IDE hard drive?
Explanation:
When installing a new IDE hard driver, configure master/slave jumper, then install drive hardware properly. Finally, ensure
proper cable orientation.
See the second web link for more in depth instructions.
Explanation:
Make use you do not get confused with the 1 and 0.
Explanation:
4 is the multiplier. 25 x 4 = 100. Even in nowadays, the processors still have to rely on the multiplier to achieve high clock
speed.
Explanation:
The access time and the transfer rate are the keys to the drive performance. In general, the more cache the drive has / the
higher the RPM the drive has, the faster the drive will be.
A . Interlacing
B . Dot pitch
C . Resolution
D*. Refresh rate
E . Video RAM
Explanation:
The refresh rate of a monitor is the rate at which the CRT's electron beam to paint the screen from top to bottom.
A . External CD-Rom
B*. Monitor
C . Mouse
D . Printer
E . Hard Drive
Explanation:
The 3-door db-15 male connector plug is a plug used on computer monitors.
Explanation:
You should check the AC outlet first instead of tearing into a system. Since it worked beforehand, the odds of it being an
external factor is greater than an internal.
Explanation:
It is always best to look at external causes before internal causes.
Explanation:
The processor fan is VERY important for the cooling of a CPU. Without the fan, the CPU will overheat and possibly melt
-- causing CPU damage and system damage.
What are the first two questions should you ask the employee?
Explanation:
In this case, the employee disrupted the normal operation of the computer by installing a program that may contain viruses
or may just be incompatible with the current system.
Explanation:
Read the ESD precautions before working on the PC.
ESD will be tested heavily, as this is a very important issue in the PC installation and preventative maintenance process. At
the same time, do not take ESD precautions with high voltage equipment - service personnel should be fully insulated.
Explanation:
Read the ESD precautions before working on the PC.
ESD will be tested heavily, as this is a very important issue in the PC installation and preventative maintenance process. At
the same time, do not take ESD precautions with high voltage equipment - service personnel should be fully insulated.
Explanation:
Read the ESD precautions before working on the PC.
ESD will be tested heavily, as this is a very important issue in the PC installation and preventative maintenance process. At
the same time, do not take ESD precautions with high voltage equipment - service personnel should be fully insulated.
A . RAM
B . CPU
C . System board
D . Chassis
E*. Battery
Explanation:
Improper disposal of Battery can be environmentally damaging. If battery is exposed to fire, explosion may occur.
Hazardous materials inside your PC include Batteries, toner kits, and cartridges.
During power up you did noticed that the floppy drive light functioned properly.
Explanation:
Since the floppy light functioned normally, the drive's hardware itself should be ok. the drive may just be dirty or it may be
a bad floppy disk.
Explanation:
Viruses can be obtained from almost any location, the most common being from another computer via floppy, or over a
infected file on the internet.
Explanation:
We hope that this question has obvious answers. The fans will act as any other fan would involving air.
Explanation:
An OPC needs to be stored in a place that is cool and dark.
Explanation:
In the event of a brown out, you can only be offered protection while using special devices on your electronic equipment.
These include battery backup devices (UPS) and line conditioners. More information can be found in the web links.
A . ZIF Socket 8
B . ZIF Socket 36
C . ZIF Socket 4
D . ZIF Socket 370
E*. ZIF Socket 7
Explanation:
Socket 4 is for Pentium 60 and 66 CPUs. Socket 8 is for Pentium Pro. Socket 370 is for socket Celeron.
A . No Answer is Correct
B*. The motherboard is the main circuit board inside the PC which holds the processor, memory and expansion slots and
connects directly or indirectly to every part of the PC.
C . The motherboard is chassis of the PC which holds the processor, memory and expansion slots and connects directly or
indirectly to every part of the PC.
D . The motherboard is the main circuit board inside the PC which holds the power supply and connects indirectly to every
part of the PC.
E . All Answers are Correct
Explanation:
The motherboard is the core piece of a PC. There are many different kinds of form factors available.
A*. ATX
C*. NLX
D*. LPX
E . TCP/IP
Explanation:
NLX and LPX are considered to be of much smaller size than the other form factors.
A . AMD Athlon
B*. PIII 600
C*. PII 233
D*. PIII 800
E . Pentium 233 MMX
Explanation:
Pentium Classics are Socket 7 compatible, AMD Athlons are either Slot A or Socket A compatible, depending on what kind
is purchased. The Pentium II and Pentium III series is either Slot 1 or Socket 370 compatible, depending on what kind is
purchased.
Explanation:
AT and ATX are the only ones out of the 5 listed above that can support a 5 pin DIN keyboard connector.
A . DIMM slot N
B . DIMM slot K
C . DIMM slot L
D*. DIMM slot M
E . DIMM slot O
Explanation:
The pictured is a DIMM slot M.
A . port D
B*. port K
C . port G
D . port N
E . port I
Explanation:
In the picture, port K is the floppy port.
Explanation:
Slot O shows the AGP slot.
Explanation:
An ATX motherboard has both a PS/2 port and a Soft power switch.
A . SCSI
B*. IEEE 1394
C . Parallel
D . USB
E . IDE
Explanation:
SCSI is not used for printing. IEEE 1394 is a new, very fast external bus standard that supports data transfer rates of up to
400 Mbps.
A . LPT1
B*. LPT2
C*. COM2
D*. COM1
E*. USB
Explanation:
Depends on the printer type you have, COM ports and USB ports may be supported. You can add a printer adaptor in order
to have a second LPT port.
Explanation:
This actually applies to every component you buy. Always check for the physical damage FIRST before conducting any
other testing.
Explanation:
When the power went out, it disturbed the current print jobs in the printers memory. Deleting the current jobs in the buffer
will free the printer up for use again.
Explanation:
The three correct answers are all ways to better manage the memory on your printer.
A . Trip Hammers
B*. Pins
C . Gnomes
D . Character Wheel
E . Electromagnets
Explanation:
Pins are what strikes the paper in a Dot Matrix Pinter.
A . Platen folder
B . Tractors
C . Print head
D*. Paper-Feed Sensors
E . Toner Cartridge
Explanation:
If there is no paper in the printer, but it still reads a paper jam, the next logical place to look is the paper-feed sensors
A . Misaligned transponder.
B . Worn ribbon.
C . Toner Cartridge misaligned
D*. Misaligned platen.
E . Worn print head.
Explanation:
The most likely cause of a dot matrix printing dull images is misaligned platen.
A*. 24 pins
B . 4 pins
C . 14 pins
D . 9 pins
E . 8 pins
Explanation:
A Dot Matrix Printer contains 24 pins
A . BNC
B . AUI
C . RJ-45
D*. RJ-11
E . RS232
Explanation:
RJ-11 is standard phone wire, it is closely related to RJ-45 (cat-5) which is a has 8 wires instead of 4.
A*. ATZ
C . ATD
D . ATH
E . ATM
Explanation:
ATZ is the correct command to reset the modem.
This is a vocabulary question.
From your administrator workstation you successfully log in as the user using their username / password with out
experience the problems.
You go to the users computer and you cannot log in from this workstation with any account including the Administrators
account.
What is the most likely cause of this problem?
A . Computer has a virus which effect network login.
B*. Bad station patch cables.
C . Printer has the computer locked out of the network.
D . Computer has insufficient server access rights.
E . Server malfunction.
Explanation:
Once again, looking for solutions that are outside of the computer chassis are best, and usually most probable in a majority
of situations.
A . Category 7
B . Category 3
C . Category 6
D . Category 4
E*. Category 5
Explanation:
Category 5 cable (a wire having 8 wires) is the bare minimum for running a 100BaseTX network.
A . Adapter
B . Drivers
C*. Protocol
D . Service
E . Network operating system
Explanation:
This is a vocabulary question.
See the web link for a definition.
A*. IRQ
B*. I/O Address
C . Protocol
D . IP Address
E*. MAC address
Explanation:
IRQ, I/O Address, and MAC address are set in the EEPROMS of a network card.
A*. 10Base2
B . IDE
C*. Serial
D . SCSI
E*. Parallel
Explanation:
Serial, Parallel, and 10Base2 cables are communications cables. IDE and SCSI are storage device cables.
A*. 15 devices
B . 10 devices
C . 6 devices
D . 4 devices
E . 32 devices
Explanation:
A fast/wide SCSI-2 bus will support up to 15 devices.
Explanation:
A crossover cable can be used to connect two computers together using Cat5 cable. Doing this bypasses the need for a hub,
but this will often result in increased packet loss. It is usually better to purchase a hub or switch when networking
computers using Ethernet.
1. Question ID #55
You have been working with a file located on a hard drive formatted as a FAT16 partition. You then decide that you no
longer need the file and you want to delete it. What happens when you delete a file from the Recycle Bin?
Explanation:
The Recycle Bin uses a portion of the hard drive so that when a file is deleted it is actually just hidden. By emptying
the recycle bin, the index system inside the File Allocation Table, which associates program name with magnetic
recordings on the disk, are removed.
Note that the recycle bin does not contain entries for drives that are network based, or for removable media.
2. Question ID #56
You discover that some settings on a computer need to be altered. The two files you need to change are WIN.INI and
AUTOEXEC.BAT. Which programs can be used to edit these files? (Choose all that apply)
A . REGEDIT
B . SYSPAD
C*. SYSEDIT
D . REGEDT32
E*. NOTEPAD
Explanation:
Both the win.ini and the autoexec.bat files are text-based files. This makes the choice of notepad correct. The
executable program, sysedit will auto magically open: autoexec.bat, win.ini, system.ini and config.sys with a notepad
interface. There is no syspad built into Windows. Regedit and regedt32 are for searching or editing the registry.
SysEdit is not included in Windows ME.
3. Question ID #57
You discover while working with a computer that storage components are failing. You decide to try and repair these
devices using ScanDisk rather than replacing them. Which types of drives will ScanDisk scan and repair? (Choose all
that apply)
Explanation:
The Scandisk utility was created for FAT based file structures. Tape drives do not use FAT to store data making this an
incorrect choice. CD-ROM drives use the CDFS format (and typically read-only); therefore scanning a CD is not possible.
The ROM is an acronym for Read Only Memory, and therefore DVD-ROMs could not be repaired with scandisk.
4. Question ID #58
In order to repair certain boot problems, you have booted from a floppy disk containing MS-DOS. You need to see a
directory listing on the hard drive and so you use the DIR command. Where will your computer look for the DIR
command?
A . C:\WINDOWS\COMMAND
B . C:\WINDOWS\SYSTEM
C . C:\WINDOWS
D . C:\Program Files\Common Files
E*. COMMAND.COM
Explanation:
Command.com is the user interface that "talks" to MSDOS.SYS and MSIO.SYS. Utilizing a Command Driven Interface
(CDI) command.com has built into it the most commonly used requests such as DIR and Copy.
5. Question ID #59
A manager calls you and complains that an employee has been accessing inapposite content on his company computer. The
manager would like to remove all temporary Internet content from that computer. Which tools in Windows 2000 can you
use to remove temporary Internet files? (Choose all that apply)
Explanation:
Temporary File Manager does not exist, therefore is incorrect. The Internet Connection Wizard is used to simplify creating
a connection via a LAN or a modem and does nothing to clean up old temporary Internet files so this answer is not correct.
Windows 2000 does provide three options which are: Disk Cleanup Wizard, Control Panel -> Internet Options, and finally
Internet Explorer, ->Tools -> Internet Options. Please check the Web link for a Movie that displays these three options in
Windows 2000.
6. Question ID #60
You discover that configuration files on a computer need to be edited. Which program allows you to view and edit such
files?
A*. SYSEDIT
B . REGEDIT
C . AUTOEDIT
D . CFGEDIT
E*. NOTEPAD
Explanation:
Sysedit.exe opens Config.sys, Autoexec.bat, System.ini, Win.ini and Protocol.ini with a notepad type editor. REGEDIT is
used to edit the registry which holds (among other things, application program information, so is not a correct choice here.
CFGEDIT, BYPASS and AUTOEDIT are nonsense works, and incorrect.
7. Question ID #61
You are setting up a backup procedure for a client that does not have much storage space, and they do not want to wait
long for the backup to complete. Which type of backup would be the best for this situation
A . Differential
B . Normal
C*. Incremental
D . Daily
E . Hybrid
Explanation:
In incremental backup mode, on the first day after the last full backup, only those files that have changed since the last full
backup are backed up. With subsequent incremental backups, only those files that have changed since the previous
incremental backup are backed up.
In differential backup mode, every file that has changed since the last full backup is backed up during every differential
backup.
Thus incremental backups are, on average, much faster than differential backups because fewer files need to be backed up.
However, restoring data backed up with a rotation scheme using incremental backups is much slower, since data from the
last full backup plus data from all the incremental backups must be restored. Restoring data backed up in differential mode
only requires the last full backup plus the last differential backup.
8. Question ID #62
A client complains that when she starts up her computer, it takes a long time to fully load. You determine that many other
programs start which she does not want to load. You disable these processes and background applications in which of the
following locations? (Choose all that apply)
A . BOOT.ini
B . IO.SYS
C . Command.com
D*. Registry
E*. WIN.INI
Explanation:
IO.sys is used by DOS to control the In and Out to and from devices such as the keyboard, serial ports, and video card.
This makes the choice IO.sys incorrect. The BOOT.ini file is used by NT/Windows 2000/XP to identify the boot drive and
partition. This makes the choice BOOT.ini incorrect. Command.com is the interpreter between the operator and the PC,
making this an incorrect choice. The Registry and the WIN.INI file load system files and background applications making
these choices correct.
9. Question ID #63
The mouse on your computer has suddenly stopped working. You need to switch between applications running in
Windows so that you can safely close them. Which key combination would you use to switch between this applications?
A.+
B*. +
C.+
D.+
E.+
Explanation:
This is a standard windows keyboard operation. The web link offers a method to disable this feature.
A . DEVICE=HIMEM.SYS
B*. PATH=C:\
C . FILES=40
D . DOS=HIGH,UMB
E*. MSCDEX /D:OAKCD.SYS
Explanation:
Device is typically a clue that belongs in the config.sys file because device files typically are extensions to MS-DOS.SYS,
and end in the extension .SYS A few exceptions exist, such as a FILES= or BUFFERS= statement. The PATH command is
an internal DOS command found in COMMAND.COM and is used for navigating folders or subdirectories. MSCDEX is
an .EXE file that is used to support CD-ROM Devices. It is short for Microsoft CD Extensions. This EXE needs the name
of the device driver installed when the config.sys file loaded. In this case, OAKCD.SYS
Explanation:
An incremental backup performs the operation only on the files that have the archive bit changed. A full backup creates a
copy of all files, regardless of the attribute bit settings. A differential backup clones all files changed since the last full back
up. Xcopy and file size changes have no direct correlation to backing up and therefore are not valid choices.
12. Question ID #66
If an application in Windows 9x on your computer requests memory that the memory manager can't provide, a
____________ occurs.
Explanation:
"A page fault occurs when an access is made to memory that is not currently mapped, (not currently available). [Also, an
application can] make the memory unavailable by using the paging features of the CPU so that any [other] application that
tries to read or write to this memory will be stopped by an invalid page fault." - Microsoft Corporation.
In other words, page faults are a normal operation when data is not in physical ram. An invalid page fault is an issue.
A*. INF
B . BIN
C*. DLL
D*. INI
E . COM
Explanation:
To preventing the novice user from accidentally creating issues, file extensions ending with .INI, .INF and .DLL are not
displayed by default. The .inf extension is an Information text file (ASCII)
A . Edit
B*. Regedt32
C . Control Panel applets
D*. Regedit
E . Device Manager
Explanation:
Regedit is correct for Windows 95. Edit is a text editor, and not suitable for the database known as the registry. Regedt32
appears in all Operating Systems including and after Windows 95, so this answer is also correct. Device Manager
configures hardware resources so is incorrect. Control Panel applets are small applications, such as Networking, Mail or
Display controls, therefore incorrect as well.
Explanation:
This is a navigation question.
A . COMMAND.COM
B . Dos95.win
C . CONFIG.SYS
D . AUTOEXEC.BAT
E*. DOSSTART.BAT
Explanation:
When MS-DOS mode is set to use the Use Current Configuration option, Windows 95 uses a file called Dosstart.bat to
load real-mode device drivers. This file is also used when you restart Windows 95 in MS-DOS mode.
You can edit the Dosstart.bat file to add device drivers or programs. However, you cannot run SET statements in the
Dosstart.bat file because of the way in which the Command.com file is run.
A . Parity
B*. Spanned
C*. Raid-5
D . Switched
E*. Mirrored
Explanation:
Raid 5 requires a minimum of three drives. Mirroring, or RAID 1 uses two disks to have an identical copy of the data.
Spanning or Just a Bunch Of Disks (JBOD) uses multiple drives to create one volume, IE. Drive C. If 3 40GB drives are
combined in a RAID 5 array, you get 80GB of storage. Mirroring 2 40GB drives gives 40GB of storage. Spanning 3 40GB
drives gives 120GB of storage.
Explanation:
FAT 16 and FAT 32 only have 16 bits to work with. Eight characters with the. making ninth character followed by the three
characters for the extension makes twelve characters. This leaves four characters, for the attributes Read-only, Archive,
Hidden and System. This makes four more attributes, totaling sixteen bits, the maximum for FAT. This leaves no room for
additional bits to indicate encryption, permissions, or compression. Only the four previously mentioned attributes and long
filenames would be retained.
A . SYSTEM.INI
B . CONFIG.SYS
C*. MSDOS.SYS
D . IO.SYS
E . WIN.SYS
Explanation:
MSDOS.SYS is a text file that directs the location of system files. It is a text file that must be greater than 1024 bytes long
for compatibility with some MS-DOS programs. Both the multi-boot and bootGUI are located in this text file. A 0 means
no, and 1 means yes.
A . E:\i386\WIN2000.EXE /RECOVERY
B . E:\i386\CONSOLE.EXE /INSTALL
C . E:\i386\SETUP.EXE /CONSOLE
D*. E:\i386\WINNT32.EXE /CMDCONS
E . E:\i386\2000.EXE /Drivers
Explanation:
The recovery console has a new feature beginning with Windows 2000. The correct choice is displayed and the web links
offer several descriptions of the recovery console as well as a knowledge base article on how to install the recovery
console from removable media.
Explanation:
The. . INI contains configuration information for the operating system and many programs. This makes backing these files
up a very good idea. Not all programs operate with all operating systems. Therefore confirming compatibility is a very
good idea. Different operating systems have varying requirements, making this the correct choice as well. Some operating
systems don't even have an IO.SYS or a BOOTSEC.DOS making these invalid choices.
Explanation:
Smaller numbers in screen resolution translates to less information on the screen.
Explanation:
This is a navigation/feature question. All other options are bogus. Please see the G2 movie if you are unfamiliar with this
option.
A*. FDISK
B . MOVE
C . REMOVE
D . FORMAT
E . DELTREE
Explanation:
FDISK can be used to remove both DOS and NON-DOS partitions. Simply select Delete a NON-DOS partition.
Format prepares a partition for use. Deltree removes a folder (subdirectory) and all nested folders (subdirectories) even if
they have data or programs in them. Move is a Command line program that moves selections from on folder to another.
A . MS-DOS.SYS
B . BOOT.INI
C*. CONFIG.SYS
D*. SYSTEM.INI
E*. WIN.INI
Explanation:
The Win.ini and System.ini are the most critical files to Windows 9.x
Beginning with Windows 95, these files were incorporating the registry. However, to maintain backwards compatibility
with other programs the Win.ini and system.ini generated and updated by the registry. If a change is made to either of these
files, the registry is updated. The config.sys file is where device drivers are located and has opened by sysedit.exe
The BOOT.INI file is specific to Windows NT/2000.For this is not a valid choice. The MSDOS.SYS file became a text file
beginning with Windows 95. Because this file has the file attributes mark as system, hidden, and read-only, it cannot be
opened by the system configuration editor, making this an invalid selection.
Explanation:
The Hardware Conflict Trouble shooter was introduced with Windows 95. The Device Manager will report conflicts with
resource settings. As the speakers are outside of sound card settings, speakers cannot create incompatibility. CODEC are
algorithms, an incorrect algorithm would prevent sound from emanating from the speaker, however would not cause a
resource conflict. The default for older sound cards is IRQ 5. IRQ 14 is typically used by the IDE hard drive.
A . MSDOS.SYS.
B*. NTLDR.
C*. NTDETECT.COM.
D . OSLOADER.EXE.
E*. BOOT.INI.
Explanation:
NTDETECT.com is required for basic system detection, and the NTLDR (NT Loader) is also required. The Boot.Ini points
to the particular partition locations, and tell the O/S of drive controller types. This will solve challenges if the directory
containing NT is not damaged.
A . ERD.EXE /S
B . EBD.BAT
C*. RDISK.EXE
D . FDISK /MBR
E . Add/Remove Programs
Explanation:
RDISK.exe is the correct answer. Adding a /s will backup all user accounts. By adding /s- sending the data to floppy is
skipped. This leaves the backup data in the system folder, to back up on medium from the data if it is too large for a single
floppy.
FDISK /MBR re-creates the master boot record
Explanation:
The process begins with NTLDR, which switches the CPU to a linear (flat) memory model. The boot.ini file is called
which tells the system about the hard drive controller, and if it needs a SCSI BIOS driver to be loaded. The boot.ini file
also uses this file to find out where NT is located. This is known as the boot partition. The file containing the boot.ini file
is known as the system partition, which may or may not be the same as the boot partition. NTDETECT.com is the final file
that is called.
Explanation:
Windows uses a Blue circle with a white ! inside it as a graphic for informational data. A Black ! on a yellow field
indicates is aware of the device, however does not function. A red background with a white X generally means
disconnected.
A . Run REGEDT32.
B*. Run the application in a protected memory space.
C . Run MS Config.
D . Reinstall the application.
E . Run the application in shared memory space
Explanation:
NT offers the ability to run 16-bit applications in its own memory space. The advantage of this is if the application crashes,
it cannot corrupt other programs, as would be possible when the application is run in shared memory.
Explanation:
The prompt that encourages the use of large hard drives support after typing FDISK is a non-threatening way of
encouraging the use of FAT32. Saying 'N' makes FDISK revert to FAT16. The hardware BIOS must be current enough to
support Logical Block Addressing
Explanation:
This question is typical in that it is testing for navigational understanding. We will not attempt to find cute reasons why the
other answers are incorrect. If you are not familiar with this navigational procedure, please watch the enclosed movie.
Explanation:
Client/server network models are pessimistic in nature. That is to say, without verification of credentials, access is not
granted. For security purposes, typically passwords are set to expire. Administrators are encouraged to disable or in
activate accounts for employees experiencing a leave of absence, for example vacation.
Both protocol choices are not correct answers because the user is being prompted for their login name and password. This
cannot happen if the request is not being transmitted via a transport protocol.
A . Press F8
B . Press F5 to enter safe mode and delete the last device installed.
C . Run ScanDisk and Disk Defragmenter.
D . Reload NT.
E*. Press the spacebar when the Load Last Known Good Configuration message appears.
Explanation:
The last known good configuration is created when a user successfully supplies a name and password that is accepted. If a
driver change causes NT to not boot, pressing the spacebar when prompted by the message will bring up a screen offering
to dump the changes. It is not necessary to reload NT. ScanDisk and disk defragmentation tools (even 3rd party) cannot be
run within the operating system if the operating system could not come up. In Windows NT4, the equivalent of safe mode
is selected via the boot.ini file. F8 is used in Windows 2000
A . DOS.
B*. NT 4
C*. Windows 2000.
D . Windows 95.
E . Windows 98.
Explanation:
Before its release Windows 2000 was actually known as NT 5. This is because Windows 2000 builds on the development
work done in NT. Windows 2000 has an NTLDR and a boot.ini, just like NT 4.
A . NETSTAT
B . NBTSTAT
C . TRACERT
D*. IPCONFIG
E . WinIPcfg
Explanation:
Windows NT and W2K use a CDI (Command Driven Interface) called IPCONFIG for IP statistics. Contrast this to the
GUI (Graphical User Interface) for IP statistics found in Windows 9.x utilizing WinIPcfg.
A . Interrupt settings.
B . Hardware compatibility protocol.
C*. Network clients and server information.
D . Anti-virus applications.
E*. Virtual memory.
Explanation:
With System Monitor, you can monitor all sorts of statistics related to the performance of your PC, ranging from CPU
utilization to the throughput of the file system. Interrupt setting are found in Device Manager.
Explanation:
Dial Up Networking needs to know what modem to use. This makes selecting the new modem from the dial up network
connection properties correct choice. ATZ is a modem command that resets the modem, an incorrect selection. The line
isn't dead; some call on the phone company isn't a Cracker Jack selection.
Explanation:
File and print sharing enables NetBIOS (Network BIOS). There is no button to press for Enabling NetBIOS support, even
though that is what you are doing. This does not actually share anything. You must select printer(s), directories or file(s) to
actually share. Verifying the IP address or pinging the server would be appropriate steps if you have completed the
installation of Windows 98 by enabling File and printer sharing.
Explanation:
The Device Manager (found by going to Control Pane - System has a graphical display that will display a ! or a X if a
device is unhappy for some reason. This is the place to go to check hardware devices.
A . IPX/SPX
B . TELNET
C . NetBEUI
D*. TCP/IP
E . AppleTalk
Explanation:
TCP/IP is the protocol suite that was created by DARPA, the original creators of the Internet.
Explanation:
This navigation question reveals the difference between Windows 2000 and NT4
A*. POP.
B . FTP.
C . FTTP.
D . SMTP.
E . HTTPS.
Explanation:
Post Office Protocol (POP) is currently the most popular implementation of incoming electronic mail.
HTTPS is short for Hyper Text Transport Protocol Secure (Secure Web)
FTP is an acronym for File Transfer Protocol - used for transferring files
SMTP is an acronym for Simple Mail Transport Protocol - used for outgoing electronic mail.
A*. Windows 98 SE
B . Windows 95 OSR2
C . Windows98
D . Windows 95
E*. Windows 2000
Explanation:
Internet Connection Sharing was first introduced in Windows 98 SE, and is also available in Windows 2000.
Explanation:
47. Question ID #101
You are connected to the Internet and now want to access newsgroups hosted by your ISP. What do you need to know in
order to access this service?
A . Obtain the DNS name of the HTTP server from the ISP.
B . Open the Control Panel and select the newsgroups option.
C . Connect the ISP and get the IP address of the FTP server.
D . Connect to the INTERNIC for connection information.
E*. Obtain the IP address for the NNTP server from the ISP.
Explanation:
The Network News Transport Protocol uses USENET for messages. This is the Internet equivalent of Bulletin Board
Systems. There are 10's of thousands of Special Interest Groups (SIGs) using NNTP.
A . FTP
B . POP3
C*. X400
D . HTML
E . NNTP
Explanation:
The closest term that is not Internet related is X.400, which is a mail standard.
HTML is an acronym for Hyper Text Markup Language
FTP is an acronym for File Transfer Protocol
POP3 is an acronym for Post Office Protocol version 3
NNTP is an acronym for Network News Transport Protocol