Information for applications like ms word

Assignment Help Basic Computer Science
Reference no: EM131102518

Question 1. If you are doing incremental backups and you need to recover data, which backups do you need to do the recovery?

  • The last differential backup and the last incremental backup
  • The last incremental backup
  • The last full backup and all subsequent incremental backups
  • The last full backup and the last incremental backup

Question 2. Configuration information for applications like MS Word or Excel would be stored under the _____ registry subkey.

  • HKEY_CURRENT_USER
  • HKEY_CLASSES_ROOT
  • HKEY_CURRENT_CONFIG
  • HKEY_LOCAL_MACHINE

Question 3. Which of the following Windows commands moves a file from the original location and puts it in another location without altering the original file?

  • Paste
  • Copy
  • Delete
  • Remove

Question 4. _____ use the Windows NT/2000/XP registry

  • Hardware profiles
  • Application programs
  • Device drivers
  • All of the above

Question 5. If you turn on your computer and it accesses the BIOS but hangs at the POST (Power-On Self-Test), which of the following problems is most likely to be responsible?

  • No bootable floppy in
  • Virus in the Boot Sector of Drive "C"
  • A bad BIOS chip
  • RAM (Random Access Memory) fault

Question 6. Which is a reliable method to deploy when trying to repair intermittent problems?

  • Replacing suspect parts
  • Periodic maintenance
  • Keeping a log
  • Waiting for catastrophic failure

Question 7. Windows 2000/XP can have a maximum of _____ IDE devices in a system.

  • two
  • six
  • eight
  • 10

Question 8. _____ is not an expansion slot on a PC.

  • AGP
  • ISA
  • PCI
  • SCI

Question 9. The first sector on a disk is called the boot _____.

  • sector
  • record
  • loader
  • Both A and B

Question 10. Which of the following is NOT a port available on a PC?

  • USB
  • ISB
  • IEEE 1394
  • Parallel

Question 11. Which of the following network device can ONLY regenerate signals and extend network segments?

  • Hub
  • Modem
  • Network printer
  • Router

Question 12. Which type of Ethernet connection allows for transmission and reception at the same time?

  • Simplex
  • Duplex
  • Half-duplex
  • Full-duplex

Question 13. Which of the following is the Ethernet physical topology?

  • Bus
  • Ring
  • Point-to-point
  • Mesh

Question 14. How many collision domains are present in a network with two hosts and two switches?

  • One
  • Two
  • Three
  • Four

Question 15. What is a consideration when migrating from Fast Ethernet to Gigabit Ethernet?

  • Effects on the existing TCP/IP protocol stack
  • Network devices possibly needing to be upgraded or replaced
  • Network frames being different
  • They are identical networks, so no considerations are needed.

Question 16. How many subnets can the address 129.168.1.0/19 support?

  • Two
  • Four
  • Six
  • Eight

Question 17. Which of the following device can break down broadcast domain without using VLANs?

  • Workgroup switch
  • Router
  • Repeater
  • Hub

Question 18. How many subnets can the address 192.168.1.0/27 support?

  • Two
  • Four
  • Six
  • Eight

Question 19. Which is a feature of the Transmission Control Protocol (TCP)?

  • Address assignment
  • Message segmentation
  • Reliable
  • Unreliable

Question 20. How many hosts can the address 129.168.1.0/19 support?

  • 1,022
  • 2,046
  • 4094
  • 8,190

Question 21. What does the S in HTTPS represent

  • Simple
  • SMTP
  • Secure
  • Signature

Question 22. In Internet terminology, HTTP stands for _____.

  • High Terminal Tension Process
  • Hypertext Transfer Protocol
  • History of Text Transfer Procedure
  • None of the above

Question 23. Which of the following is the suffix of a domain name called?

  • Bottom-level domain
  • Top-level domain
  • .edu
  • .org

Question 24. Which suffix is commonly used for nonprofit websites?

  • .com
  • .gov
  • .org
  • .ark

Question 25. Which of the following can be done if a browser appears to run slow?

  • Delete the web page.
  • Delete system files.
  • Delete temporary Internet files.
  • Delete configuration files.

Reference no: EM131102518

Questions Cloud

Determine the increase in velocity of the space shuttle at p : Determine the increase in velocity of the space shuttle at point P so that it travels from a circular orbit to an elliptical orbit that passes through point A. Also, compute the speed of the shuttle at A.
What you know about the psychological factors : Discuss the factors that are contributing to her rising stress levels and note how she might respond to the stress if the traffic doesn't clear up soon.
Seconds to read a page in from the harddrive : Suppose page faults occur 95% of the time (i.e. a page is not in the TLB). What is the average access time to retrieve a page from the harddrive if it takes 100 nano seconds to search the TLB and 10 milli seconds to read a page in from the harddr..
How does this density compare with the density : At room temperature and pressure RbI crystallizes with the NaCl-type structure. Use ionic radii to predict the length of the cubic unit cell edge. How does this density compare with the density you calculated in part (b)?
Information for applications like ms word : Configuration information for applications like MS Word or Excel would be stored under the _____ registry subkey.
Why does a shaded-pole motor run at a constant speed : Why does a shaded-pole motor run at a constant speed? What will happen if you place too many washers on the end of a shaded-pole motor shaft? Which one of the following parts of a universal motor does not move?
How are financial accountants challenged in their work : How are financial accountants challenged in their work to make ethical decisions?
Newspaper ethical dilemma resolution model : Should an employer have an ethical obligation to keep such unproductive, but loyal employees? What if the employee had been a problem his or her entire career?
Vsb filter has the following amplitude and phase responses : In this example we consider the time-domain waveforms corresponding to VSB modulation and consider demodulation using envelope detection or carrier reinsertion. We assume the same message signal as was assumed Example 3.4. In other words,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Lid technology approach to stormwater management

LID technology is the alternative comprehensive approach to stormwater management. It can be utilized to address wide range of Wet Weather Flow (WWF) issues.

  Which size is optimal

Suppose that a certain communications protocol involves a per-packet overhead of 100 bytes for headers and framing

  Ieee 754 32-bit floating points numbers to decimal values

Convert the following IEEE 754 32-bit floating points numbers to decimal values

  Explain why a company would choose to monitor its network

Explain why a company would choose to monitor its network.

  Design a 3-bit counter, which can count either up or down

Design a 3-bit counter, which can count either up or down. The input has a clock, and a signal U. When U = 1, the counter counts up; when U = 0, the counter counts down. For example, assume the current counter Q(t) = 011. If U(t) = 0, then Q(t+1) = 0..

  Statistical analysis approaches

The Portfolio Project, due at the end of Week 8, is a statistical analysis using one or more of the statistical analysis approaches presented in Modules 4 and 5. These various approaches are designed to produce business intelligence to resolve pro..

  Did have any difficulties in following this coding process

Did you have any difficulties in following this coding process?

  Dss projects

DSS projects succeed more often than they fail or are challenged.

  Discuss the vulnerabilities associated with four

Discuss the vulnerabilities associated with four of the ten networks described in your readings. Make sure you identify the network, potential vulnerabilities, and what the result could be from an attack against it.

  The cloud service to become operational again

Over the past 3 years, a cloud service has been unavailable for a total of 36 hours, primarily due to a denial of service attacks. Additionally, the physical server hosting the cloud service crashed once. It took the cloud provider 4 days to replace ..

  How recognizable is the result, as text

With the quality setting at 100, would this be a plausible way of compressing text?

  Design a step by step algorithm

Design a step by step algorithm, keeping in mind the limitations of assembly language, to determine the physical address of the 3rd byte of the data segment variable LIST in the following code example.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd