Beruflich Dokumente
Kultur Dokumente
Physical hard disk drives can be divided into multiple logical drives and this
operation is referred to as _________________. (Partitioning the drive)
What does a FORMAT Command do? This command is used to prepare a new disk for
use with an operating system. Actual data locations are marked off on the disk for the
tracks and sectors, and bad sectors are marked. In addition, the directory is established on
the disk
To successfully install Windows 98, the system’s hard drive should have between
_______ and ________ MB of free space available. to successfully install Windows
98. 120 MB and 355 MB
Physical hard disk drives can be divided into multiple logical drives and this
operation is referred to as ____________________________. Partitioning the drive
What does the Shift+Tab and Alt+Esc key combination do? SHIFT+TAB key
combination is used to move backward through available options. ALT+ESC key
combination enables the user to toggle between open application windows.
Which of the following best describes the boot sequence for Windows 9x systems?
a. IO.SYS, MSDOS.SYS, COMMAND.COM, SYSTEM.DAT,
USER.DAT, WIN.COM
b. IO.SYS, SYSTEM.DAT, USER.DAT, MSDOS.SYS, COMMAND.COM,
CONFIG.SYS, AUTOEXEC.BAT
c. IO.SYS, MSDOS.SYS, COMMAND.COM, SYSTEM.DAT, USER.DAT,
CONFIG.SYS, WIN.COM
d. IO.SYS, MSDOS.SYS, COMMAND.COM, WIN.COM
d
The content of the Registry are located in two files in the \Windows directory. These
files are ______ and ______. USER.DAT and SYSTEM.DAT
During the startup process, which key should you press to prevent the items in the
Windows 9x Startup folder from running? left-SHIFT key
Is there any way to access an encrypted file or folder Yes, to access an encrypted file
or folder, it must first be decrypted. The encryption protection disappears when the file or
folder is moved to a non-NTFS partition
In NTFS Organization Master File Table (MFT) replaces the _________ in a MS-
DOS compatible system and contains information about each file being stored on
the disk FAT
Mention any two factors that must be taken care before upgrading a system Take
backup of all the important files and data , scan for viruses and remove them from the
system
What are Enterprise networks Enterprise networks are those networks, which are
designed to facilitate business-to-business, or business-to-customer operations. These
networks consist of multiple domains (called trusted domains) that are linked together,
but managed independently
The list used by system administrators to view the files a user can have access to is
called the ___________. Access Control List (ACL)
Which text file is used to generate the Boot Loader Menu that is displayed on the
screen BOOT.INI
What is a group policy Group Policies are the Windows 2000/XP tools for
implementing changes for computers and users throughout an enterprise.
Which file stores the failed steps during an installation The failed steps are recorded
in the Setuplog text file
The Windows 9x installation files are stored on the installation disk in a compressed
________ format The Windows 9x installation files are stored on the installation disk in
a compressed Cabinet (CAB) file format
Which MS-DOS command can be used to verify whether the hidden system files
have been successfully copied to the disk The MS-DOS Attribute command can be
used to verify whether the hidden system files have been successfully copied to the disk
How we can restore the files and folders deleted from a floppy disk or network drive
Files and folders deleted from a floppy disk or network drive are permanently deleted and
cannot be recovered
Which text editor can be used to correct the “Error in CONFIG.SYS Line XX”
message SYSEDIT
^^^^^^^^^^^^^^^^
What is basic concept behind IT The basic concept behind information technology is
application of technology in improving transaction, routine job, and communication
List five areas where IT can be implemented. IT finds its application in many fields:
• Hospitals
• Institutes
• Banks,
• Reservation systems
• Payment of bills
Why is computer preferred over traditional methods of conducting transactions
Computer is preferred over traditional methods of conducting transactions due to:
• Speed
• Accuracy
• Reliability
• Fast data processing
• Accurate information analysis
• Easier sharing of information
• Ability to process large data
What are the basic elements of a computer system The basic elements of a computer
system are:
• Hardware
• Software
• People
What is the home usage of computer 5:With the emerging trends in IT and growing
applications of Internet, computer is finding heavy usage even at homes. It is being used
at home for shopping, reservations, education and electronic learning, and entertainment
What is the difference between hardware and software Hardware refers to those parts
of computer that one can see and touch where as software refers to the set of instructions.
Keyboard, mouse, monitor are a few examples of hardware and word processor,
spreadsheets, graphic packages, operating systems are a few examples of software. Thus,
if hardware forms the body, software forms the brain
List five input devices of a computer The five input devices of a computer are
keyboard, mouse, light pen, touch screen, and scanner
What is a portable computer? Give an example Portable computers are those that can
be easily taken anywhere and worked on because of reduced size. They have integrated
display, keyboard, a pointing device or trackball, processor, memory and hard drive all in
a battery-operated package slightly larger than an average hardcover book. Examples of
portable computer are Palmtop and laptop.
What is networking, and what role does it play in communication? Networking refers
to the connection of computers and terminals over a distance through connecting lines
(cables or other media). This connectivity between geographically apart terminals helps
each system communicate to other and share data. Thus, computer network is a
communication system where a group of computers and other devices, such as printers,
are connected by cables and other communication media.
What are the different stages of the system development processThe different stages
of the system development process are:
• Initiation
• Development
• Post-implementation
Write the full form of CADThe full form of CAD is Computer-Aided Design
What is SDLC SDLC encompasses all the activities required to define, develop, test,
deliver, operate, and maintain a software system. It is important to define a life-cycle
model for each software project because this model provides a basis for categorizing and
controlling the various activities required to develop and maintain a software system.
What is the goal of the construction phase The goal of the construction phase is to
translate the design of the system into code in a given programming language. This is the
famous “programming” or “coding” phase in which the team of programmers develops
the software version of the design.