Sie sind auf Seite 1von 6

What does an IO.SYS file do? The IO.

SYS file moves the system’s basic I/O functions


into memory and then implements the operating system’s default control programs,
referred to as device drivers, for various hardware components

Primary Bootstrap Loader moves master boot record into memory.


a. True
b. False a

Physical hard disk drives can be divided into multiple logical drives and this
operation is referred to as _________________. (Partitioning the drive)

What does a FORMAT Command do? This command is used to prepare a new disk for
use with an operating system. Actual data locations are marked off on the disk for the
tracks and sectors, and bad sectors are marked. In addition, the directory is established on
the disk

Windows 95 must be installed in an existing ____________ partition (FAT 16)

To successfully install Windows 98, the system’s hard drive should have between
_______ and ________ MB of free space available. to successfully install Windows
98. 120 MB and 355 MB

Physical hard disk drives can be divided into multiple logical drives and this
operation is referred to as ____________________________. Partitioning the drive

The Control panel in Windows 9x is accessed by:


a. Start◊ Control panel
b. Start◊ Programs ◊Accessories ◊ Control panel
c. Start◊ Settings ◊ Control panel
d. Start◊ Programs ◊ Control panel
c

Windows 98 replaced the ________________ Operating system Windows 95

What does the Shift+Tab and Alt+Esc key combination do? SHIFT+TAB key
combination is used to move backward through available options. ALT+ESC key
combination enables the user to toggle between open application windows.

What is My Computer? Where is it located? My Computer icon is the major user


interface for Windows 9x. It enables the user to see the local system’s contents and
manage its files. It is available on the desktop

The __________________icon provides quick information about the world around


the system when it’s used in a networked environment Network Neighborhood
What does an Add/Remove program do? The Add/Remove Programs icon is used to
install new programs from floppies or CDs by simply clicking the Install button.
Conversely, programs listed in the programs window can be removed from the system by
highlighting their title and clicking the Add/Remove button

Taskbar is also known as _____________. Systray

Which of the following structures recognize, configure, and allocate system


resources under Windows 9x?
a. The Registry
b. Plug-and-Play
c. The Windows Explorer
d. The Control Panel
A

Which of the following best describes the boot sequence for Windows 9x systems?
a. IO.SYS, MSDOS.SYS, COMMAND.COM, SYSTEM.DAT,
USER.DAT, WIN.COM
b. IO.SYS, SYSTEM.DAT, USER.DAT, MSDOS.SYS, COMMAND.COM,
CONFIG.SYS, AUTOEXEC.BAT
c. IO.SYS, MSDOS.SYS, COMMAND.COM, SYSTEM.DAT, USER.DAT,
CONFIG.SYS, WIN.COM
d. IO.SYS, MSDOS.SYS, COMMAND.COM, WIN.COM
d

The content of the Registry are located in two files in the \Windows directory. These
files are ______ and ______. USER.DAT and SYSTEM.DAT

During the startup process, which key should you press to prevent the items in the
Windows 9x Startup folder from running? left-SHIFT key

Which wizard helps in installing printers in the Windows 9x environment? Add


Printer Wizard

Give an example of one Network protocol that is supported by Windows NetBEUI

Which network protocol is most widely accepted TCP/IP

Which file type is associated with the Internet HTML


Define the term DHCP The Dynamic Host Configuration Protocol (DHCP) is an
Internet protocol that can be used to automatically assign IP addresses to devices on a
network using TCP/IP .

In order to connect to the Internet, a computer must be able to use the


______________protocol. TCP/IP

Is there any way to access an encrypted file or folder Yes, to access an encrypted file
or folder, it must first be decrypted. The encryption protection disappears when the file or
folder is moved to a non-NTFS partition

In Mass Storage Systems,______________ is a technique of storing separate copies


of data on two different drives. Mirroring

In NTFS Organization Master File Table (MFT) replaces the _________ in a MS-
DOS compatible system and contains information about each file being stored on
the disk FAT

Mention any two factors that must be taken care before upgrading a system Take
backup of all the important files and data , scan for viruses and remove them from the
system
What are Enterprise networks Enterprise networks are those networks, which are
designed to facilitate business-to-business, or business-to-customer operations. These
networks consist of multiple domains (called trusted domains) that are linked together,
but managed independently

The list used by system administrators to view the files a user can have access to is
called the ___________. Access Control List (ACL)

RAID stands for ___________. Redundant Array of Inexpensive Disks

Which of the following is a technique of storing separate copies of data on two


different drives?
a. Mirroring
b. Duplexing
c. Striping
d. RAID
A

Which of the following is the core component of the NTFS system?


a. Partition Boot Sector
b. BIOS Parameter Block
c. NTLDR
d. MFT
d
What is disk partitioning When the physical hard disk is divided into multiple logical
drives, the operation is said to be partitioning a disk

MBR stands for __________? Master Boot Record

Which text file is used to generate the Boot Loader Menu that is displayed on the
screen BOOT.INI

What is Plug-and-Play process Adding new devices to Windows 2000 or Windows XP


is typically performed automatically through the system’s Plug-and-Play process

What is a group policy Group Policies are the Windows 2000/XP tools for
implementing changes for computers and users throughout an enterprise.

Administrative templates pertain to ________ registry? HKEY_LOCAL_MACHINE

Which file stores the failed steps during an installation The failed steps are recorded
in the Setuplog text file

The Windows 9x installation files are stored on the installation disk in a compressed
________ format The Windows 9x installation files are stored on the installation disk in
a compressed Cabinet (CAB) file format

Which MS-DOS command can be used to verify whether the hidden system files
have been successfully copied to the disk The MS-DOS Attribute command can be
used to verify whether the hidden system files have been successfully copied to the disk

How we can restore the files and folders deleted from a floppy disk or network drive
Files and folders deleted from a floppy disk or network drive are permanently deleted and
cannot be recovered

Which text editor can be used to correct the “Error in CONFIG.SYS Line XX”
message SYSEDIT

^^^^^^^^^^^^^^^^
What is basic concept behind IT The basic concept behind information technology is
application of technology in improving transaction, routine job, and communication

List five areas where IT can be implemented. IT finds its application in many fields:
• Hospitals
• Institutes
• Banks,
• Reservation systems
• Payment of bills
Why is computer preferred over traditional methods of conducting transactions
Computer is preferred over traditional methods of conducting transactions due to:
• Speed
• Accuracy
• Reliability
• Fast data processing
• Accurate information analysis
• Easier sharing of information
• Ability to process large data

What are the basic elements of a computer system The basic elements of a computer
system are:
• Hardware
• Software
• People

What is the home usage of computer 5:With the emerging trends in IT and growing
applications of Internet, computer is finding heavy usage even at homes. It is being used
at home for shopping, reservations, education and electronic learning, and entertainment

What is the difference between hardware and software Hardware refers to those parts
of computer that one can see and touch where as software refers to the set of instructions.
Keyboard, mouse, monitor are a few examples of hardware and word processor,
spreadsheets, graphic packages, operating systems are a few examples of software. Thus,
if hardware forms the body, software forms the brain

Why do we need to maintain security while working on a computer When working


on computer, one needs to store data and while sharing resources, the chances of loosing
the data due to security threats increases. Thus, one needs to maintain security while
working on a computer, especially in case of sensitive information

List five input devices of a computer The five input devices of a computer are
keyboard, mouse, light pen, touch screen, and scanner

What is a portable computer? Give an example Portable computers are those that can
be easily taken anywhere and worked on because of reduced size. They have integrated
display, keyboard, a pointing device or trackball, processor, memory and hard drive all in
a battery-operated package slightly larger than an average hardcover book. Examples of
portable computer are Palmtop and laptop.

What is networking, and what role does it play in communication? Networking refers
to the connection of computers and terminals over a distance through connecting lines
(cables or other media). This connectivity between geographically apart terminals helps
each system communicate to other and share data. Thus, computer network is a
communication system where a group of computers and other devices, such as printers,
are connected by cables and other communication media.
What are the different stages of the system development processThe different stages
of the system development process are:
• Initiation
• Development
• Post-implementation

Write the full form of CADThe full form of CAD is Computer-Aided Design

Arrange the following in order of their occurrence.


a. Testing
b. Construction
c. Analysis
d. Design
e. Implementation
1. Analysis
2. Design
3. Construction
4. Testing
5. Implementation

What is SDLC SDLC encompasses all the activities required to define, develop, test,
deliver, operate, and maintain a software system. It is important to define a life-cycle
model for each software project because this model provides a basis for categorizing and
controlling the various activities required to develop and maintain a software system.

What is the goal of the construction phase The goal of the construction phase is to
translate the design of the system into code in a given programming language. This is the
famous “programming” or “coding” phase in which the team of programmers develops
the software version of the design.

Das könnte Ihnen auch gefallen