Term
| What maintains a record of the resolution of user problem |
|
Definition
|
|
Term
| Who is responsible for the management of teams of employees that provide the interface between the user community and the IT organization |
|
Definition
| The manager of user support |
|
|
Term
| When the user calls the help desk a_____ contains information provided by the user about the problem is created |
|
Definition
|
|
Term
| The Status Bar submenu option is available from what menu in Windows Explorer |
|
Definition
|
|
Term
| Which of the following options appear when you highlight a document file or folder in Windows Explorer and then select Edit Menu |
|
Definition
Undo : cancels the previous file operation, Cut: Removes the selected item(s) and copies them to the clipboard Copy : copies the selected item(s) to the clipboard Paste: Places the items that were cut or copied |
|
|
Term
| By default the taskbar is displayed at the ______________ of the screen |
|
Definition
|
|
Term
| What menu offers information to assist you with the completion of a task |
|
Definition
|
|
Term
| The Regional and Language Option dialog box is available from what option |
|
Definition
|
|
Term
| When the _________ option is turned on, your computer will provide sound cues when the locking keys are pressed |
|
Definition
|
|
Term
| Read about changing a workgroup computer to a domain computer and the computer Name Tab in system Properties |
|
Definition
| Click Start, RT click My Computers, click Properties and click computer name tab.2) click change button,under the Member of, click the workgroup option button type Workgroup in the workgroup text box click ok button.3)Type admin01 in the user name textbox type password 01in the password text box and click ok. 4)Wait for the WELCOME TO THE WORKGROUP workgroup message to be displayed .On three consecutive screens click the ok button, and then click Yes button 5)Wait for the computer to restart |
|
|
Term
| What term is defined as the settings that control how the desk top appears |
|
Definition
|
|
Term
| The interactive logon process differs depending on the location of what |
|
Definition
|
|
Term
What section for the Boot.ini lists the available operating system |
|
Definition
|
|
Term
What switch in Boot.ini loads the kernal debugger but it remains inactive until a STOP error occurs |
|
Definition
|
|
Term
| What switch in the BOOT.ini file boots without showing the splash screen |
|
Definition
|
|
Term
| Security Bulletrins are in what format |
|
Definition
|
|
Term
| What vulnerability in a security bulletin can allow the propagation of an internet worm without user action |
|
Definition
|
|
Term
| What icon in the Security Update Scan Results section of the MSBA report confirms that a security update is missing on the scanned machine |
|
Definition
|
|
Term
A ________ privacy policy is a condensed computer readable P3P privacy statement |
|
Definition
|
|
Term
| What is considered a thrid party that issues,certificates,authenticates and manged certifcates |
|
Definition
|
|
Term
| The Personnel Information area in the ________ tab of the Internet OPtions dialog box can be used to clear out part of the Internet Explorer history |
|
Definition
|
|
Term
| What is the name for the Netware datastore introduced in version 1 |
|
Definition
|
|
Term
| What is a connectionless protocol that provides quick network transport for most communications on a Netware network |
|
Definition
| IPX (Internetwork Packet Exchange) |
|
|
Term
| When connecting a Windows XP machine to a Netware network, what version of Netware must NWLINK use |
|
Definition
| Any version before version 5 |
|
|
Term
| In the environment created in a VDM, each DOS application has access to _______ of virtual memory |
|
Definition
|
|
Term
| What is used to handle multimedia and video effects for graphical WOW application |
|
Definition
|
|
Term
| You can start 16-bit applications in their own address spaces using what command switch |
|
Definition
| / seperate command-line switch |
|
|
Term
| What value entry type contains a variable that is replaced by an application when used |
|
Definition
|
|
Term
| The Windows XP Professional Resource Kit includes what help file which lists all possible registry entries and valid values |
|
Definition
|
|
Term
| What key is used to establish the configuration of the hardware and operating system environment |
|
Definition
|
|
Term
| What is the default primary protocol for most network operating system |
|
Definition
|
|
Term
| Which of the following is a secondary transport protocol on TCP/IP networks that is lightweight cousin of TCP |
|
Definition
| UDP(User Datagram Protocol) |
|
|
Term
| What is the name of the most popular wireless networking standard |
|
Definition
|
|
Term
| What protocol uses UDP transport header |
|
Definition
| TFTP(Trivial File Transfer Protocol) |
|
|
Term
| What file is a static file placed on members of a network to provide a resolution mechanism between NETBIOS names and IP addresses |
|
Definition
|
|
Term
| Through what remote session would you have the same access to your files and applications as you do when you are physically sitting at the system |
|
Definition
|
|
Term
| You can use what dialog to fine tune your connection to improve performance or add capabilities |
|
Definition
|
|
Term
| The Default security settings for a connections of___________ allows unsecured passwords |
|
Definition
|
|
Term
| What protocol sends data using unencrypted clear text |
|
Definition
|
|
Term
| What is used to share a single internet connection with other computers on your network |
|
Definition
| ICS(Internet Connection Sharing) |
|
|
Term
| ICS transforms your Windows XP system into a limited_______________ server |
|
Definition
| Limited DHCP Proxy Server |
|
|
Term
| Dial up connection authentication setup is configured on what tab of the properties dialog box |
|
Definition
|
|
Term
| What is a network that is used within an office building called |
|
Definition
|
|
Term
| Which of the following manages access to network resources |
|
Definition
|
|
Term
| An IP address consists of how many binary digits |
|
Definition
|
|
Term
| What is the name that uniquely defines a host on the IP network |
|
Definition
| FQDN (Fully Qualified Domain Name) |
|
|
Term
| What is an application-programming interface(API),which is used by programmers to access services on a LAN |
|
Definition
|
|
Term
| What is Microsoft implementations of a stateful packet firewall |
|
Definition
| ICF (Internet Connection Firewall) |
|
|
Term
| What permits computers to self-assign IP address configurations |
|
Definition
| Automatic Private IP Addressing (APIPA) |
|
|
Term
| How many characters are in a NetBIOS name |
|
Definition
|
|