0% found this document useful (0 votes)
45 views18 pages

CSS Knowledge

The document consists of multiple-choice questions related to computer networking, hardware, and software concepts. It covers topics such as network cables, BIOS setup, Windows features, and various hardware components. The questions are divided into three sets (SET-A, SET-B, SET-C) and test knowledge on technical specifications and functionalities.

Uploaded by

villasanlovely78
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views18 pages

CSS Knowledge

The document consists of multiple-choice questions related to computer networking, hardware, and software concepts. It covers topics such as network cables, BIOS setup, Windows features, and various hardware components. The questions are divided into three sets (SET-A, SET-B, SET-C) and test knowledge on technical specifications and functionalities.

Uploaded by

villasanlovely78
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

CSS Knowledge-Based SET-A

1. ___________ is a network cable where one end is T568-A while the other is T568-B
Configuration.
a. Straight-thru
b. Roll-over
c. Cross-over cable
d. Extreme Feedback

2. It is a networking device that forward data packets between computer networks.


a. Wireless Access Point (WAP)
b. Hub
c. Router
d. Patch panel

3. Which of the following is not appropriate to enter BIOS setup


a.F2
b.F1
c.F10
d.F5

4. What enables users of Windows that correct any problems preventing from booting up
normally?
a.Safe mode
b.IPConfig
c.Task Manager
d.Disk cleanup

5. A utility tool that test whether a particular host is reachable across an IP Network.
a. Netstat
b. Dxdiag
c. Ping
d. Tracer

6. It is originally, Where the BIOS stored in a standard PC?


a. Solid State Drive (SSD)
b. Read Only Memory (ROM)
c. Random Access Memory (RAM)
d. Hard disk Drive (HDD)

7. A single physical hard drive can divide into multiple _______ Hard drives.
a.Single
b.Boot
c.Logical
d.Local

8. ______ Is a complete copy of everything store on a physical optical disc.


a. Stored file
b. Backup file
c. Memory map
d. ISO Image

9. _______ is a collection of devices connected together in one physical location.


a.Wide Area Network (WAN)
b.Local Area Network (LAN)
c.Metropolitan Area Network (MAN)
d.Campus Area Network (CAN)

10. What is the common color for the USB 3.0 connector Standard A receptacles and
plugs?
a.Black
b.Red
c.Blue
d.White

11. Wi-Fi is a trademarked phase, which means ________.


a.IEEE.803.11
b.IEEE.801.11
c.IEEE.804.11
d.IEEE.802.11

12. Where do Windows device drivers store?


a.Drivers and Settings
b.Computer
c.Hardware
d.Registry

13. What is the volt rating of the RED wire in a power supply?
a.-5V
b.-12V
c.+5V
d.+12V

14. What is the minimum requirement for hard disk drive capacity in Windows 10?
a.20 GB for 32-bit OS or 30 GB for 64-bit OS
b.30 GB for 32-bit OS or 40 GB for 64-bit OS
c.20 GB for 32-bit OS or 40 GB for 64-bit OS
d.16 GB for 32-bit OS or 20 GB for 64-bit OS

15. In windows 7, when LAN connection has a cross and red indicator signifies that there
is _______.
a.Emergency that needs attention
b.LAN update
c.Problem with the LAN driver
d.Virus in the LAN

16. What are the two types of interface use to communicate between the hard drive and
the computer motherboard?
a.Parallel Advance Technology Attachment (PATA) and Industry Standard Architecture
(ISA)
b.Advanced Technology Attachment (ATA) and Serial Advanced Technology
c.Advanced Technology Attachment (ATA) and Parallel Advanced Technology
d.Industry Standard Attachment (PATA) and Industry Standard Architecture (ISA)

17. _______ is a two or more PCs are connected and share resources without going
through a separate server computer.
a.Peer to Peer network
b.Client Server
c.Local Area Network
d.Personal Area Network

18. Which of the following hardware components can connect over a computer network?
a.Network Module Card
b.Network Driver
c.Network Hardware Card
d.Network Interface Card

19. What Starts up recovery options in a computer that essentially RECOVERY partition
of the main hard drive?
a.Safe Mode
b.System Restore
c.Command prompt
d.Repair Computer

20. What services in Windows Server that enables administrator to migrate data to a
lower-cost and tape media on file servers?
a.Remote Storage Service
b.File Screening Service
c.Data Compression Service
d.Volume Shadow Copy Service

21. What Application group that contains a Client Access Point and with at least one
application specific resource?
a.Virtual Cluster Server
b.Cluster resource
c.Active node
d.Cluster

22. What type of memory used in the Solid State Drive (SSD) as a storage?
a.Read Only Memory (ROM)
b.Static Random Access Memory (SRAM)
c.Flash Memory

23. A type of network that interconnects multiple local area network.


a.Local Area Network
b.Campus Area Network
c.Metropolitan Area Network
d.Wide Area Network

24. What IP address used by the virtual machine to communicate over the physical
network?
a.Provider Address
b.Private Address
c.Customer address
d.Internet Address

25. It occurs when an attacker or trusted insider steaks data from a computer system and
demands compensation for its return.
a.Malicious code
b.Information extortion
c.Threat
d.Theft

26. __Consist of the user matrices, and capability tables that govern the rights and
privileges of users.
a.Systems Management
b.Statement of Policy
c.Systems-Specific Policy
d.Access control list
27. It monitors the initial security accreditation of an information system for tracking of
changes.
a.Configuration Management
b.Network Monitoring
c.Measurement and Metrics
d.Continuous Assessment

28. What type of version that protects unauthorized network access by utilizing a set-up
password?
a.Wi-Fi Protected Setup (WPS)
b.WPA2-Enterprise
c.Temporal Key Integrity Protocol (TKIP)
d.WPA2-Personal

29. A computer program use to prevent, detect, and remove possible threats to the
system.
a. Scandisk Software
b. Anti-Virus Software
c.Defragment software
d.Direct Software

30. What is the spider-like interconnection in millions of pieces of information located on


computers around the cyber space?
a. Internet of Things (IOT)
b. Browser
c.World Wide Web
d.E-commerce

CSS Knowledge-Based SET-B

1. What IP address used by the virtual machine to communicate over the physical
network?
a.Internet Address
b.Provider address
c.Private Address
d.Customer address

2. _____ is used to store the user documents with a large amount of memory and storage
space.
a.Mail Server
b.Print Server
c.File server
d.Application Server

3. What software program stores into a Read Only Memory (ROM)?


a.Firmware
b.Driver
c.Flash IC
d.Power On Self Test (POST)

4. An Automated Software Program that executes certain commands when it receives a


specific input is ________.
a.Threat
b.Malicious code
c.Spyware
d.Bot

5. A compound used to prevent overheating of CPU.


a.Central Processing Unit (CPU) separator
b.Heat sink insulator
c.Interface sink
d.Thermal paste

6. _________ is a way to identify a specific process to which an Internet or other network


message forwarded when it arrives at a server.
a.IP address
b.Proxy Server
c.Port number
d.PING

7. What is the minimum hardware requirements of the computer RAM, for Windows 10?
a.1 gigabyte (GB for 32-bit or 2 GB for 64-bit
b.1 gigabyte (GB for 32-bit or 4 GB for 64-bit
c.4 gigabyte (GB for 32-bit or 4 GB for 64-bit
d.2 gigabyte (GB for 32-bit or 2 GB for 64-bit

8. Disc image also known as __________.


a.WIM Image
b.Installer image
c.ISO Image
d.Hard disk drive (HDD) Image

9. What Recovery Console Commands that writes a new master boot record on the hard
disk drive?
a.Bootrec
b.fixmbr
c.Bmrui
d.Chkdsk

10. ________ is a computer network made up of an interconnection of local area


networks (LANs) within a limited geographical area, e.g corporate buildings.
a.Wide Area Network
b.Campus Area Network
c.System Area Network
d.Metropolitan Area Network

11. An extension of Microsoft management console use to manage hardware devices


including device drivers.
a.Device Manager
b.Peripheral Manager
c.Console Manager
d.Hardware Manager

12. What is the volt rating of the YELLOW wire in a power supply?
a.-5V
b.-12V
c.+5V
d.+12V

13. Port _________is an application of network address translation (NAT) that redirects a
communication request from one address and port number combination to another.
a.Request
b.Forwarding
c.Evaluation
d.Standard

14. The Recovery Console Command that examines the volume for errors and repairs it.
a.Bootrec
b.Bootcfg
c.Chkdsk
d.Mbr

15. Light Emitting Diode (LED) in Network Interface Card (NIC) has ______ Lights.
a.3
b.4
c.2
d.1

16. What is the physically damage cluster of storage on the hard drive?
a.GUID Partition Table
b.Bad sector
c.Master Boot Record (MBR)
d.Volume

17. Who is assign to monitor the network security, operation and network users?
a.Encoder
b.End-User
c.Network Administrator
d.Network Technician

18. What storage device should replace if frequent error messages appear while moving
files and booting up operating system?
a.Hard Disk
b.Random Access Memory
c.Flash drive
d.Optical Drive

19. The computer system is functional if it is in ______.


a.Normal booting
b.Change option
c.Auto shut off
d.Good option

20. It occurs when two or more devices connected with the same IP address in a
computer network.
a.Static IP Address error
b.Dynamic IP Address conflict
c.Private IP Address error
d.IP Address conflict

21. What feature in Windows Server provides the ability to migrate workloads between a
source and target cluster?
a.Live Migration
b.Failback
c.Failover
d.Shared storage

22. What log files that record performance statistics based on the various performance
object and instances available in Performance Monitor?
a.Counter Logs
b.View Log File Data
c.Circular Logging
d.Linear Logging

23. What is the alternative for wired connection that uses radio frequencies to send
signals between devices and a router?
a.Wireless Fix
b.Wireless Firmware
c.Wireless Fidelity
d.Wireless Router

24. What term applies to the interconnection of LAN in a city into 5 to 50 kilometers?
Question 24Answer
a.Metropolitan Area Network
b.Campus Area Network
c.Wide Area Network
d.System Area Network

25. What is the maximum cable length for USB 2.0?


a.5 ft.
b.5 meters
c.1.2 yards
d.1.5 meters

26. In Server 2008, Local Area Network (LAN) connection icon in a yellow color
indicator it is signifies______?
a.Update
b.Virus
c.Driver problem
d.No Connectivity

27. ____________enables administrators to configure storage thresholds on particular


sets of data store on server NTFS volumes
a.File System Quota
b.Data Compression
c.FAT-formatted partition
d.Extensible File Allocation Table (xFAT))

28. What type of version that verifies network users through a server and requires a more
complicated setup, but provides additional security?
a.Wi-FI Protected Setup (WPS)
b.WPA2-Personal
c.Temporal Key Integrity Protocol (TKIP)
d.WPA2-Enterprise

29. What windows update that downloads and install latest version?
a.Fully automatic
b.Semiautomatic
c.Full updates
d.Check update

30. A Yost cable, Cisco cable, and a Console cable also known as __________.
a.Cross-over
b.Straight-Thru
c.Roll-over
d.Extreme
CSS Knowledge-Based SET-C

1. What Ethernet cable used to connect computers to hubs and switches?


a.Roll-over
b.Extreme
c.Cross-over
d.Straight-Thru

2. An ideal voltage range on the hotwires of a Molex connector?


a.Red=5V, yellow=12V
b.Red=12V, yellow=5V
c.Red=5V, yellow=3.3V
d.Red=3.3V, yellow=5V

3. A router that is design to operate in the internet backbone.


a.Bridge
b.Network
c.Edge
d.Core

4. Which of the following is the most efficient in transferring larger files?


a.Network Time Protocol (NTP)
b.Control Protocol
c.File Transfer Protocol
d.Hypertext Transfer Protocol

5. What kind of chip stores the settings in the BIOS?


a.Basic Input Output System Random Access Memory (BIOS RAM) Chip
b.Advanced Technology eXtended (ATX) Chip
c.Complementary Metal Oxide Semiconductor Read Only Memory (CMOS ROM)
d.Real Time Clock/Non Volatile Random Access Memory (RTC/NVRAM) Chip

6. What log files that conserves disk space by ensuring that the performance log file will
not continue growing over certain limits?
a.Circular Logging
b.Counter Logs
c.Linear Logging
d.View Log File Data

7. A network interface controller also known as ______.


a.WAP
b.Switch
c.Hub
d.LAN Card

8. ______ allows to define a list of devices and only allow those devices on WI-FI
network.
a.Service Set Identifier
b.Wireless Security
c.MAC Address Filtering
d.Wired Equivalent Privacy

9. The network security standard that tries to make connections between a router and
wireless devices faster and easier.
a.WPA2-Enterprise
b.WPS
c.TKIP
d.WPA2-Personal

10. A progress of scanning, identifying, diagnosing and resolving problems, errors and
bugs in software.
a.Software diagnostic
b.Software Troubleshooting
c.Testing
d.Debugging

11. What second clustering technology provides by corresponding client requests across
several servers with replicated configurations?
a.Quick Migration
b.Cluster quorum
c.Network Load Balancing
d.Hyper-V Virtualization

12. A task to do after planning to fix the network is __________?


a.Implementing the solution
b.Implementing the idea
c.Implementing the agreement
d.Implementing the result

13. What class of IP address is 192.168.0.1?


a.Class C
b.Class A
c.Class D
d.Class B

14. What technique use to gain unauthorized access to computers, wherein the intruder
sends messages with a source IP address?
a.Spam
b.Spyware
c.Sniffers
d.Spoofing

15. ___________ is an enterprise-level heterogeneous backup and recovery suite.


a.NetCopy
b.NetSave
c.NetBackup
d.NetFile

16. ____ Allows users to move around the coverage area in a line of sight while
maintaining a network connection.
a.Campus Area Network
b.Local Area Network
c.Wireless Local Area Network
d.Wide Area Network

17. What windows edition as a program capable of restricting other users to access
certain programs in a computer?
a.Windows basic
b.Windows Extreme
c.Windows Ultimate
d.Windows Professional
18. A ___________ should be upgraded to received and transmit strong signals to and
from other computers.
a.Video Card
b.Network Card
c.Sim Card
d.Memory Card

19. What is the problem of a computer if the time and date keeps on resetting even after
fixing in the BIOS?
a.Flash Memory failure
b.System cashing
c.CPU Overheating
d.CMOS battery failure

20. It is used as a substitute for actual disc, allowing users to run software without having
to loa a CD or DVD.
a.CMD File
b.Hyberfil File
c.Bootsys File
d.ISO file

21. It enables administrators to define the types of file that can save within a Windows
volume and folder.
a.File Screening
b.File Compression
c.File Classification Infrastructure
d.File Encryption

22. What type of network that connects through signals, e.g. infrared?
a.Wired Equivalent Privacy
b.Campus Area Network
c.Local Area Network
d.Wireless Security

23. M.2 is a form factor for _________.


a.Storage Drive
b.Motherboard
c.Memory
d.Power Supply

24. _____ is an information asset suffering damage, unintended modification or


disclosure.
a.Loss
b.Attack
c.Exploit
d.Exposure

25. In what folder that the device driver can be found?


a.Program file
b.System32
c.Registry
d.Drv

26. What command-line tool used to find IP addresses that corresponds to a host or
domain name?
a.Tracert
b.NSlookup
c.Ping
d.Ms DOS

27. A protocol that provides quick, automatic, and central management for the
distribution of IP addresses within a network.
a.Dynamic Host Control Protocol (DHCP)
b.Simple Mail Transfer Protocol (SMTP)
c.Transmission Control Protocol (TCP)
d.Domain Name System (DNS)

28. What is the maximum cable length for USB 3.0 using a non-twisted pair wire?
a.5 meters
b.4 meters
c.10 meters
d.3 meters

29. A tool used for checking the condition of the hard drive with signs like “Good”.
“Caution” or “Bad”.
a.Scandisk
b.Defragmented
c.Disk Management
d.Crystal Disk Info

30. A type of server that allows the central administration and management of network
users and network resources.
a.Database Server
b.Directory Server
c.Application Server
d.File Server

CSS Knowledge-Based SET-D

1. In networking, _______ refers to pieces of related information that are transferred


through a network.
a.Access
b.Connection
c.Wi-FI
d.Packet

2. Which of the following is a term for the main patch panel that links to every
telecommunication room inside the building?
a.Vertical cross-connect
b.Multiplexer
c.Lead extension
d.Major distribution line

3. _________ is a way to identify a specific process to which an Internet or other network


message forwarded when it arrives at a server.
a.Proxy Server
b.PING
c.IP address
d.Port number
4. What media types of 10-megabit Ethernet that compose of broadband coaxial cable
carrying multiple base band channels for a maximum length of 3,600 meters?
a.10BASE-5
b.10BASE-2
c.10BASE-36
d.10BASE-T

5. What active directory protocol used to access data from a database?


a.Dynamic Host Control Protocol (DHCP)
b.Lightweight Directory Access Protocol (LDAP)
c.Simple Mail Transfer Protocol (SMTP)
d.File Transfer Protocol (FTP)

6. In Windows 7, Windows update and security is located in _____.


a.Settings
b.System Performance
c.Programs
d.Device Manager

7. Which of the following displays the measures and various real-time statistics on the
system’s performance?
a.Counter Monitoring
b.View Current Activity
c.Counter Logs
d.View Log File Data

8. Minimum byte capacity of a bootable flash drive for Windows 10 is ____.


a.32GB
b.4GB
c.8GB
d.16GB
Feedback

9. What type of peripheral card having media access control address?


a.Tuner card
b.Network interface card
c.Firmware Card
d.Peripheral component interconnect card

10. ______ defined as a structured network cabling system standards for commercial
buildings, and between buildings in campus environments.
a.ANSI/TIA-567
b.ANSI/TIA-587
c.ANSI/TIA-568
d.ANSI/TIA-566

11. An enclosed or semi-enclosed channel that protects, routes and hides cables and
wires.
a.Panel
b.Holder
c.Rack
d.Raceway

12. A material that slid before crimping both ends of a patch cable and acts to reduce
strain in a cable.
a.Protector
b.Ring
c.Boot
d.Shield

13. Which of the following commands used to certify the peer name resolution in Active
Directory?
a.DCPROMO
b.DNSCMD
c.FORMAT
d.NSLOOKUP

14. ______enables administrators to configure storage thresholds on particular sets of


data store on server NTFS volumes
a.File System Quota
b.Data Compression
c.FAT-formatted partition
d.Extensible File Allocation Table (xFAT))
Feedback

15. What test verifies the operation of communication device by sending and receiving
data from the same port?
a.Data link test
b.Loopback test
c.Routing test
d.Signal test

16. ________ is a computer network made up of an interconnection of local area


networks (LANs) within a limited geographical area, e.g corporate buildings.
a.Wide Area Network
b.Campus Area Network
c.Metropolitan Area Network
d.System Area Network

17. It acts like a border router to connect corporate sites to wired access lines.
a.Product Terminal Equipment (PTE)
b.Virtual Control Equipment (VCE)
c.Customer Premises Equipment (CPE)
d.Network Transfer Equipment (NTE)

18. _________ is a process of recognizing a user’s identity.


a.Encryption
b.Identification
c.Authentication
d.Authorization

19. A network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
a.Media Access Control (MAC)
b.Firewall
c.Gateway
d.Group Policy

20. What term used to refer when a system is unavailable?


a.Recovery
b.Reliability
c.Unavailability
d.Downtime
21. What networking tool that monitor and intercepts traffic over the computer network?
a.Data link analyzer
b.Frequency analyzer
c.Packet analyzer
d.Protocol analyzer

22. _________ is a 24 pin USB connector system with a rotationally symmetrical


connector.
a.Universal Serial Bus (USB) C Thunderbolt
b.Extreme Universal Serial Bus (USB)
c.Super Universal Serial Bus (USB)
d.Ultra Extreme

23. What Class of IP addressing Is 172.168.10.1?


a.Class A
b.Class B
c.Class C
d.Class D

24. What type of a high-speed network/subnetwork that composed of hosts and


interconnects using a variety of technology/topology?
a.Campus Area Network
b.Local Area Network
c.Storage Area Network
d.Personl Area Network

25. Resistance reading of an open wire is _______.


a.10 Mega ohms
b.Zero ohm
c.Almost zero ohm
d.Infinite ohms

26. It facilitates communication between the CPU and other devices in the system.
a.Random Access Memory (RAM)
b.Bus
c.Chipset
d.Basic Input Output System (BIOS)

27. ___________ is used to store the user documents with a large amount of memory and
storage space.
a.Mail Server
b.Application Server
c.File server
d.Print Server

28. In the context of security, _______ is a privilege or assigned permission for the use of
computer data or resources.
a.Exploit
b.Attack
c.Asset
d.Access

29. What type of router that enables an internal network to connect to external network?
a.Edge
b.Forwarding
c.Core
d.Broadband

30. A type of server that occupies a large portion of computing territory between the
database server and end user.
a.Client server
b.File server
c.Application server
d.Directory server

CSS Knowledge-Based SET-E

1. _____Is the process of joining two cables ends together.


a.Cable splicing
b.Cable passing
c.Cable pressing
d.Cable conduiting

2. What is the traditional method used to access server data and using the server message
block protocol over TCP/IP?
a.System Management Tools
b.File System Monitoring
c.File Resource Manager Tools
d.Windows Folder Sharing

3. What two command-line utilities used to export and import Active Directory Object
Information?
a.Ping.exe and ping /all
b.Csvde and Set-ADComputer
c.AllUsers.ldf and objectclass=user
d.Ldifde.exe and csvde.exe

4. What command-line network utility that displays network connections for TCP and
routing tables?
a.Ping
b.Ipconfig
c.Netstat
d.Connections.txt

5. _______which means pushing component to its limits and extremes.


a.Logic Test
b.Interface Test
c.Stress Test
d.Technical Test

6. What is the minimum Random Access Memory (RAM) requirement of Server 2008
R2?
a.1GB
b.4GB
c.2GB
d.512MB
Feedback

7. A setup option in Unified Extensible Firmware Interface (UEFI)/Basic Input Output


System (BIOS) that allows security settings to perform such task as locating the device.
a.Remote PC On
b.LoJack
c.Tracker on
d.Wake on LAN

8. In Windows 7, an indicator tells that a video driver has not installed.


a.Displays bios setup only
b.Three short beeps
c.Only Standard video is displayed
d.NO video display

9. It ensures that information and programs are changing only in a specified and
authorized manner
a.Security
b.Integrity
c.Availability
d.Confidentiality

10. What type of backup used in hard drive, disc, flash drive and external drive that are
housed on site?
a.Local Backup
b.Full Backup
c.Incremental Backup
d.Differential Backup

11. It is the time lapse between data sent and when received, it can have a big impact on
performance.
a.Cycle
b.Gap
c.Latency
d.Delay

12. set of rules that describe how software and hardware should interact within a
network?
a.Communications protocol
b.Expanding The Network
c.Group Policy
d.Multihomed host

13. Set of rules for transferring files such as text, graphic images, sound, video and other
multimedia files, on the World Wide Web (WWW)
a.Accelerated File Transfer Protocol (AFTP)
b.Simple Mail Transfer Protocol (SMTP)
c.File Transfer Protocol
d.Hypertext Transfer Protocol(HTTP)

14. What class of IP addressing is 10.10.10.1?


a.Class B
b.Class C
c.Class A
d.Class D

15. What is a hardware device that enables to connect serial devices across a network?
a.Register Jack
b.Coaxial Cable
c.Terminal Server
d.Com Port
16. The most current wireless networking standard and can communicate with the older
network standards.
a.802.11g
b.802.11b
c.802.11n
d.802.11a

17. Which of the following electronic components need to discharge electrically before
the replacement of parts?
a.Capacitor
b.Resistor
c.Diode
d.Transistor

18. What attack includes the execution of viruses, worms, Trojan horses, and active Web
scripts with the intent to destroy or steal information?
a.Information Extortion
b.Malicious Code
c.Polymorphic
d.Bot

19. A node in a computer network that allows data to flow from one discrete network to
another.
a.Gateway
b.Router
c.Hub
d.Network Interface Card (NIC)

20. A device that acts as a bridge between wireless clients and wired network is___.
a.Broadband
b.Access Point
c.Router
d.Hub

21. ___is an interface standard for a serial bus for high-speed communications also
referred as Institute of Electrical and Electronics Engineers (IEEE) 1394 interface.
a.Firewire
b.Serial Advanced Technology Attachment (SATA)
c.Universal Serial Bus (USB)
d.Thunderbolt

22. A text based on command used for creating bootable flash drive.
a.Chkdsk
b.Boot
c.Format
d.Diskpart

23. _____used to run commands for troubleshooting unbootable operation system.


a.Windows Recovery Environment
b.Power On Self-Test
c.Windows Update
d.Master Boot Record

24. How many device can connect to a wireless router?


a.100
b.200
c.250
d.150

25. What recovery tool in Windows fixes and scans computer problem that prevents
computer from booting repeatedly?
a.Repair and update
b.Startup Repair
c.Boot sequence
d.Restore Point

26. A Volt meter reading of a shorted diode.


a.Zero volt
b.Almost zero volt
c.Half of the source voltage
d.Equal to its source voltage

27. A logical subnetwork that groups collection of devices from the same network switch.
a.System Area Network
b.Personal Area
c.Virtual Local Area Network
d.Enterprise Private Network

28. What electrical quantities measured when performing continuity testing of twisted
pair cable?
a.Inductance
b.Conductance
c.Resistance
d.Capacitance

29. What type of server that enables large numbers users to exchange information near
instantaneously and formerly known as Internet Relay Chat (IRC) Servers?
a.Directory Server
b.Server Platforms
c.Real-Time Communication Server
d.Proxy Servers

30. A microchip to manage data communication between a CPU and a motherboard.


a.Internal Controller Hub
b.Inclusive Controller Hub
c.Intersystem Controller Hub
d.Input/Output Controller Hub

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy