Information for applications like ms word

Assignment Help Basic Computer Science
Reference no: EM131102518

Question 1. If you are doing incremental backups and you need to recover data, which backups do you need to do the recovery?

  • The last differential backup and the last incremental backup
  • The last incremental backup
  • The last full backup and all subsequent incremental backups
  • The last full backup and the last incremental backup

Question 2. Configuration information for applications like MS Word or Excel would be stored under the _____ registry subkey.

  • HKEY_CURRENT_USER
  • HKEY_CLASSES_ROOT
  • HKEY_CURRENT_CONFIG
  • HKEY_LOCAL_MACHINE

Question 3. Which of the following Windows commands moves a file from the original location and puts it in another location without altering the original file?

  • Paste
  • Copy
  • Delete
  • Remove

Question 4. _____ use the Windows NT/2000/XP registry

  • Hardware profiles
  • Application programs
  • Device drivers
  • All of the above

Question 5. If you turn on your computer and it accesses the BIOS but hangs at the POST (Power-On Self-Test), which of the following problems is most likely to be responsible?

  • No bootable floppy in
  • Virus in the Boot Sector of Drive "C"
  • A bad BIOS chip
  • RAM (Random Access Memory) fault

Question 6. Which is a reliable method to deploy when trying to repair intermittent problems?

  • Replacing suspect parts
  • Periodic maintenance
  • Keeping a log
  • Waiting for catastrophic failure

Question 7. Windows 2000/XP can have a maximum of _____ IDE devices in a system.

  • two
  • six
  • eight
  • 10

Question 8. _____ is not an expansion slot on a PC.

  • AGP
  • ISA
  • PCI
  • SCI

Question 9. The first sector on a disk is called the boot _____.

  • sector
  • record
  • loader
  • Both A and B

Question 10. Which of the following is NOT a port available on a PC?

  • USB
  • ISB
  • IEEE 1394
  • Parallel

Question 11. Which of the following network device can ONLY regenerate signals and extend network segments?

  • Hub
  • Modem
  • Network printer
  • Router

Question 12. Which type of Ethernet connection allows for transmission and reception at the same time?

  • Simplex
  • Duplex
  • Half-duplex
  • Full-duplex

Question 13. Which of the following is the Ethernet physical topology?

  • Bus
  • Ring
  • Point-to-point
  • Mesh

Question 14. How many collision domains are present in a network with two hosts and two switches?

  • One
  • Two
  • Three
  • Four

Question 15. What is a consideration when migrating from Fast Ethernet to Gigabit Ethernet?

  • Effects on the existing TCP/IP protocol stack
  • Network devices possibly needing to be upgraded or replaced
  • Network frames being different
  • They are identical networks, so no considerations are needed.

Question 16. How many subnets can the address 129.168.1.0/19 support?

  • Two
  • Four
  • Six
  • Eight

Question 17. Which of the following device can break down broadcast domain without using VLANs?

  • Workgroup switch
  • Router
  • Repeater
  • Hub

Question 18. How many subnets can the address 192.168.1.0/27 support?

  • Two
  • Four
  • Six
  • Eight

Question 19. Which is a feature of the Transmission Control Protocol (TCP)?

  • Address assignment
  • Message segmentation
  • Reliable
  • Unreliable

Question 20. How many hosts can the address 129.168.1.0/19 support?

  • 1,022
  • 2,046
  • 4094
  • 8,190

Question 21. What does the S in HTTPS represent

  • Simple
  • SMTP
  • Secure
  • Signature

Question 22. In Internet terminology, HTTP stands for _____.

  • High Terminal Tension Process
  • Hypertext Transfer Protocol
  • History of Text Transfer Procedure
  • None of the above

Question 23. Which of the following is the suffix of a domain name called?

  • Bottom-level domain
  • Top-level domain
  • .edu
  • .org

Question 24. Which suffix is commonly used for nonprofit websites?

  • .com
  • .gov
  • .org
  • .ark

Question 25. Which of the following can be done if a browser appears to run slow?

  • Delete the web page.
  • Delete system files.
  • Delete temporary Internet files.
  • Delete configuration files.

Reference no: EM131102518

Questions Cloud

Determine the increase in velocity of the space shuttle at p : Determine the increase in velocity of the space shuttle at point P so that it travels from a circular orbit to an elliptical orbit that passes through point A. Also, compute the speed of the shuttle at A.
What you know about the psychological factors : Discuss the factors that are contributing to her rising stress levels and note how she might respond to the stress if the traffic doesn't clear up soon.
Seconds to read a page in from the harddrive : Suppose page faults occur 95% of the time (i.e. a page is not in the TLB). What is the average access time to retrieve a page from the harddrive if it takes 100 nano seconds to search the TLB and 10 milli seconds to read a page in from the harddr..
How does this density compare with the density : At room temperature and pressure RbI crystallizes with the NaCl-type structure. Use ionic radii to predict the length of the cubic unit cell edge. How does this density compare with the density you calculated in part (b)?
Information for applications like ms word : Configuration information for applications like MS Word or Excel would be stored under the _____ registry subkey.
Why does a shaded-pole motor run at a constant speed : Why does a shaded-pole motor run at a constant speed? What will happen if you place too many washers on the end of a shaded-pole motor shaft? Which one of the following parts of a universal motor does not move?
How are financial accountants challenged in their work : How are financial accountants challenged in their work to make ethical decisions?
Newspaper ethical dilemma resolution model : Should an employer have an ethical obligation to keep such unproductive, but loyal employees? What if the employee had been a problem his or her entire career?
Vsb filter has the following amplitude and phase responses : In this example we consider the time-domain waveforms corresponding to VSB modulation and consider demodulation using envelope detection or carrier reinsertion. We assume the same message signal as was assumed Example 3.4. In other words,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd