Monday 27 February 2012

true or fales paper 3

1. Dll is the implementation of shared library in Windows.
2. Operating system displays the startup screen.
3. Ntfs file system can be used on windows xp operating system.
4. Image files can not be compressed on windows.
5. defragmentation of hard disk erases data.
6. In the osi model, mail service is application layer service.
7. A port address i tcp/ip is 16 bits long.
8. The number of ip address in class c block is 256.
9. Net bios network service is not part of windows nt operating system.
10. File and printer sharing in microsoft windows allows user to share the contents of selected folders and locally attached printers with others computers.

Answer :
1. true
2. true
3. true
4. false
5. false
6. true
7. true
8. false 
9. false
10. true


   

true or fales paper 2

1. The network monitor tool is used to analyze protocol problems in Windows nt.
2. It is not possible to turn-off simple file sharing in windows .
3. Baseband is a transmission technique.
4. Format utility is a destructive process.
5. Windows nt server can be configured as a domain controller.
6. MS office can be installedin windows system folder.
7. Registry backup is not possible in Windows server.
8. Windows xp defragmenter can fragment only one volume at a time.
9. Printer can be shared in a lan by many users.
10. PKZIP utility is used to encrypt of decrypt files.

Answer :
1.true
2. false
3. true
4. true
5. true
6. false
7. false
8. true
9. true
10. false

ture or false paper 1

1. Bios is a type of hardware.
2. Winzip utility encrypts the contents of file.
3. To execute the Windows media player at the Start \run dialog box you would type 'mplayer2.exe'.
4. Defrag utility is non-destructive process.
5. A router is a specialized computer that is programmed to interface between different networks.
6. Ethernet uses the carrier sense multiple access with collision detection access method.
7. To connect two computers directly, a straight through cable is used.
8. Total number of possible tcp ports is 65536.
9. Wins server is used for name resolution in Windows nt.
10. Mesh topologies are the least expensive and are easier to maintain.

Answer :
1. true
2. false
3. true
4. true
5. true
6. true
7. false
8. true
9. true
10. false

Objective paper M 3

1. Which of the following is a special database that holds key information about your system including  the device drivers?
(a) boot.ini                 (b)config.sys                (c) registery               (d) system.ini
2. Where is post located?
(a) dram                     (b) hard-drive                  (c) ram                        (d) rom
3. Upgrading bios is also known as
(a) uroming                  (b) smoothing                   (c) flashing                   (d) writing
4. Several lines at the end of past are used to find the operating system. What is this called?
(a) cmos                     (b) flash rom                    (c) bootstrap loader                (d) boot.ini
5. What action is equally or more important than running antivirus software when it comes to protecting your system?
(a) Run a firewall           (b) Apply patches            (c) change password           (d) install ips
6. Which of the following platforms does chkdsk run on?
(a) Windows, mac os x and linux
(b) Windows 2000, windows xp, windows vista, windows 7 and linux
(c) microsoft windows, linux, mac os x
(d) ms-dos and nt-based versions of windows
7. Packet switching normally uses
(a) permanent links for dial for on demand end to end connections
(b) switched virtual circuits for on demand end to end connections
(c) open circuits for dce for on demand end to end connections
(d) open circuits for dte for on demand end to end connections
8. You have been asked to create a subnet that supports 16 hots. what subnet mask should you use?
(a) 255.255.255.240         (b) 255.255.255.248           (c) 255.255.255.216         (d) 255.255.255.252
9. The agency that develops standards for physical connection interfaces and electronic signaling specifications is
(a) eia                     (b) itu-t                   (c) ansi                    (d) iso
10. the model that file sharing normally used is
(a) peer to peer                                (b) peer between peers
(c) 2-way sharing                              (d) none of the above

Answer :
1.(c)
2.(d)
3.(c)
4.(c)
5.(c)
6.(d)
7.(b)
8.(a
9.(b)
10.(a)
 
 

Objective paper M 2

1. The device which allows you to enter data into the computer
(a) mouse          (b) keyboard           (c) floppy disk             (d)scanner
2. The name given to a device that is attached to a computer
(a) program               (b) cpu                 (c) peripheral            (d) registry
3. The .wma file extension stands for
(a)Windows media access                            (b) windows media audio
(c) windows media authentication                  (d) windows memory access
4. Nero software is used to write on
(a) Floppy             (b) ram                  (c) CD- Rom            (d) disk
5. The command used to erase all the data on a disk
(a) format               (b) erase                (c) remove                (d) delete
6. Anti-virus software is used to 
(a) remove bad programs                            (b) delete corrupted files
(c) clean infected files                                  (d) fragment a disk
7.Which network topologies are affected by the loss of one computer ?
(a) bus            (b) star                (c) hub                (d) square
8.Which type of cable has glass center core ?
(a) UTP                    (b) fiber-Optic                   (c) stp                       (d) Coaxial
9. Which one of the following is built-in user group in Windows nt ?
(a) guest                  (b) someone                (c) everyone                 (d) all of the above
10.Which of the following permission is not required to list a folder in Windows ?
(a) fullcontrol               (b) modify                 (c) read & execute            (d) write


Answer:
1.(b)
2.(c)
3.(b)
4.(c)
5.(a)
6.(c)
7.(a)
8.(b)
9.(a)
10.(b)
               

Objective paper M 1

1. The device which allows you to enter data into the computer 
(A)mouse (b)keybord  (c) floppy disk (d) scabber
1. What is the most important role of BLOS?
(A) loading the operating system                                       (b) initializing input /output devices
(C) initiating the microprcessor                                        (d) running applications MIDI means
2 Which of the following is a special database that holds key information about your system including the device drivers?
(A) BOOT.INI (B)CONFIG.SYS     (C) Registry     (D) SYSTEM.INI
3 The DLL extension stands for Dynamic..........Library file.
(a)Lever     (B)  Link   (C)  Lower   (D) License
4 Which standard body created the cables and connector specification used to support Ethernet implementation?
(A) ISO (b) NSI    (c) EIA/TIA   (D)  UETF
5 On a windows NT system, where would you go to mange shares to work with other computers?
(A) windows explorer                                                      (b) user manger 


(C) primary domain controller                                               (D)  network
6 one important benefit a hub brings to the home network is 
(A) protection against virus                             (B) shared storage
(c) ability to share files among connected computers
 (D)to protect computer from power problems
7Number of hosts possible with address 192.168.1.4/32
(A)one   (B) thirty two     (C) four     (D) none of the above
8 How can you easily clear the CMOS,including clearing the password? 
(A) unplug the PC   (B) unplug the PC and remove the CMOS battery.
(C) lssue a clear CMOS command from the command line.
(D) This can not be done
9 where does the motherboard store the keyboard controller support program?
(A) DRAM     (B) harddrive    (C) RAM   (d) ROM
10  Which of the follwing handles the interconnection between most of the devices and the CPU?
 (A)northbridge   (B) RAM  (C) ROM (D) southbridge              

Answer: 
1.(B)
2.(C)
3.(B)
4.(C)
5.(D)
6.(C)
7.(D)
8.(B)
9.(D)
10.(D)
 





















Saturday 18 February 2012

Objective section L

1. PCI is an interface that allows hard disk to communicate with system at very fast ?
A. True
B. False
Answer :

2. 130.111.1.12 is a class A address ?
A. True
B. False
Answer :

3. The fragmentation offset is a pointer that shows the offset of the data in the original datagram ?
A. True
B. False
Answer :

4. Subnetting is the procedure of creating subnetwork by borrowing bits from the Network Address press part of the IP address ?
A. True
B. False
Answer :

5. Subnet mask of Class C address 255.255.255.0 ?
A. True
B. False
Answer :

6. Cache memory is used to increase processing speed by holding the data on which CPU is working currently ?
A. True
B. False
Answer :

7. Spoofing is illegal impersonation of a system by using its IP address ?
A. True
B. False
Answer :

8. Router operates on Layer 2 of OSI reference model ?
A. True
B. False
Answer :

9. Ping command is ICMP echo message and its reply. It is used in networks to test the reachability of a device ?
A. True
B. False
Answer :

10. Session layer is the 6th layer in OSI reference model which specifies the sessions of users ?
A. True
B. False
Answer :