Information for applications like ms word

Assignment Help Basic Computer Science
Reference no: EM131102518

Question 1. If you are doing incremental backups and you need to recover data, which backups do you need to do the recovery?

  • The last differential backup and the last incremental backup
  • The last incremental backup
  • The last full backup and all subsequent incremental backups
  • The last full backup and the last incremental backup

Question 2. Configuration information for applications like MS Word or Excel would be stored under the _____ registry subkey.

  • HKEY_CURRENT_USER
  • HKEY_CLASSES_ROOT
  • HKEY_CURRENT_CONFIG
  • HKEY_LOCAL_MACHINE

Question 3. Which of the following Windows commands moves a file from the original location and puts it in another location without altering the original file?

  • Paste
  • Copy
  • Delete
  • Remove

Question 4. _____ use the Windows NT/2000/XP registry

  • Hardware profiles
  • Application programs
  • Device drivers
  • All of the above

Question 5. If you turn on your computer and it accesses the BIOS but hangs at the POST (Power-On Self-Test), which of the following problems is most likely to be responsible?

  • No bootable floppy in
  • Virus in the Boot Sector of Drive "C"
  • A bad BIOS chip
  • RAM (Random Access Memory) fault

Question 6. Which is a reliable method to deploy when trying to repair intermittent problems?

  • Replacing suspect parts
  • Periodic maintenance
  • Keeping a log
  • Waiting for catastrophic failure

Question 7. Windows 2000/XP can have a maximum of _____ IDE devices in a system.

  • two
  • six
  • eight
  • 10

Question 8. _____ is not an expansion slot on a PC.

  • AGP
  • ISA
  • PCI
  • SCI

Question 9. The first sector on a disk is called the boot _____.

  • sector
  • record
  • loader
  • Both A and B

Question 10. Which of the following is NOT a port available on a PC?

  • USB
  • ISB
  • IEEE 1394
  • Parallel

Question 11. Which of the following network device can ONLY regenerate signals and extend network segments?

  • Hub
  • Modem
  • Network printer
  • Router

Question 12. Which type of Ethernet connection allows for transmission and reception at the same time?

  • Simplex
  • Duplex
  • Half-duplex
  • Full-duplex

Question 13. Which of the following is the Ethernet physical topology?

  • Bus
  • Ring
  • Point-to-point
  • Mesh

Question 14. How many collision domains are present in a network with two hosts and two switches?

  • One
  • Two
  • Three
  • Four

Question 15. What is a consideration when migrating from Fast Ethernet to Gigabit Ethernet?

  • Effects on the existing TCP/IP protocol stack
  • Network devices possibly needing to be upgraded or replaced
  • Network frames being different
  • They are identical networks, so no considerations are needed.

Question 16. How many subnets can the address 129.168.1.0/19 support?

  • Two
  • Four
  • Six
  • Eight

Question 17. Which of the following device can break down broadcast domain without using VLANs?

  • Workgroup switch
  • Router
  • Repeater
  • Hub

Question 18. How many subnets can the address 192.168.1.0/27 support?

  • Two
  • Four
  • Six
  • Eight

Question 19. Which is a feature of the Transmission Control Protocol (TCP)?

  • Address assignment
  • Message segmentation
  • Reliable
  • Unreliable

Question 20. How many hosts can the address 129.168.1.0/19 support?

  • 1,022
  • 2,046
  • 4094
  • 8,190

Question 21. What does the S in HTTPS represent

  • Simple
  • SMTP
  • Secure
  • Signature

Question 22. In Internet terminology, HTTP stands for _____.

  • High Terminal Tension Process
  • Hypertext Transfer Protocol
  • History of Text Transfer Procedure
  • None of the above

Question 23. Which of the following is the suffix of a domain name called?

  • Bottom-level domain
  • Top-level domain
  • .edu
  • .org

Question 24. Which suffix is commonly used for nonprofit websites?

  • .com
  • .gov
  • .org
  • .ark

Question 25. Which of the following can be done if a browser appears to run slow?

  • Delete the web page.
  • Delete system files.
  • Delete temporary Internet files.
  • Delete configuration files.

Reference no: EM131102518

Questions Cloud

Determine the increase in velocity of the space shuttle at p : Determine the increase in velocity of the space shuttle at point P so that it travels from a circular orbit to an elliptical orbit that passes through point A. Also, compute the speed of the shuttle at A.
What you know about the psychological factors : Discuss the factors that are contributing to her rising stress levels and note how she might respond to the stress if the traffic doesn't clear up soon.
Seconds to read a page in from the harddrive : Suppose page faults occur 95% of the time (i.e. a page is not in the TLB). What is the average access time to retrieve a page from the harddrive if it takes 100 nano seconds to search the TLB and 10 milli seconds to read a page in from the harddr..
How does this density compare with the density : At room temperature and pressure RbI crystallizes with the NaCl-type structure. Use ionic radii to predict the length of the cubic unit cell edge. How does this density compare with the density you calculated in part (b)?
Information for applications like ms word : Configuration information for applications like MS Word or Excel would be stored under the _____ registry subkey.
Why does a shaded-pole motor run at a constant speed : Why does a shaded-pole motor run at a constant speed? What will happen if you place too many washers on the end of a shaded-pole motor shaft? Which one of the following parts of a universal motor does not move?
How are financial accountants challenged in their work : How are financial accountants challenged in their work to make ethical decisions?
Newspaper ethical dilemma resolution model : Should an employer have an ethical obligation to keep such unproductive, but loyal employees? What if the employee had been a problem his or her entire career?
Vsb filter has the following amplitude and phase responses : In this example we consider the time-domain waveforms corresponding to VSB modulation and consider demodulation using envelope detection or carrier reinsertion. We assume the same message signal as was assumed Example 3.4. In other words,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Add subtraction and division operators with the customary

Start with the grammar G6, repeated here G6: ::= + | Start with the grammar G6, repeated here G6: ::= + | ::= * | ::= ( ) | a | b | c Modify it in the following ways: a. Add subtraction and division operators (- and /) with the customary precedence a..

  Compute trajectories for a satellite launcher

Compute trajectories for a satellite launcher

  Draw an erd to model this situation

The local city youth league needs a database system to help track children that sign up to play soccer. Data needs to be kept on each team and the children that will be playing on each team and their parents.

  How are adc used in medical devices

How are ADC's used in medical devices? Please give examples

  Repeat programming problem 9, but allocate the hash table

Implement the symbol table described in Exercise 5 by reusing the class Tree Dictionary, as described in Section 18.2.2 of this chapter.

  A table contains the following fields

You have a table contains the following fields: MemberLastName,MemberFirstName, Street, City, State, PostCode, and MembershipFee. What indexes would you create for the table, and why would you create these indexes?

  Determine how many bit strings of length six are present

How many bit strings of length 6 are there? Describe completely. How many bit strings of length 6 are there which begin with 0 and end with a 0?

  How does it differ from proof theoretic interpretation

how does it differ from proof theoretic interpretation?

  Create a hierarchy of no more or no less than five

Create a hierarchy of no more or no less than five (5) of the most important topics that you believe that a one-day course entitled "Introduction to Networking: The Essentials Presented in One Day" should address. Provide a detailed rationale for eac..

  Writesql statement produce single column called itemlocation

Write an SQL statement to produce a single column called ItemLocation

  Why information technology is a business pressure

Explain in detail why Information Technology (IT) is a business pressure and also an enabler of response activities.

  Draw a timing diagram for the handshaking transfer

Obtain a sequence-of-events flowchart for the transfer from the device to the interface and from the interface to the CPU.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd