Professional Documents
Culture Documents
UGRD CS6206 Principles of Operating Systems and Its Applications Overall Final Quizess
UGRD CS6206 Principles of Operating Systems and Its Applications Overall Final Quizess
By: DARKX
ANSWER: WiMax
ANSWER: 802.11 h
It is a group of services hosted on a network which is a private structure and has the internet-
like service provision.
ANSWER: Intranet
It is a device that provides wiring concentrator functionality like a hub but it also enables
network traffic management, performs firewall functions and makes routing decisions based
upon traffic priority.
ANSWER: Switch
It is a device that converts instructions from the network protocol stack into electric signals.
ANSWER: Crown
It enables you to manage network traffic, group physically dispersed nodes into logical area
networks and isolate network traffic.
It is the foundation of the Internet naming scheme and it supports accessing resources by using
alphanumeric names.
It reduces the complexity and amount of administrative work by using automatic TCP/IP
configuration.
Which of the following is not a Server Role of Windows Server 2008 R2?
It provides storage for the users' files and share folders that contain users' files.
It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new
partition and replace an existing operating system on a partition.
It is a downloadable application that helps windows user identify which edition of Windows
7 meets their needs.
It is a tool used to remove system-specific data from the Windows operating system,
configure windows to start in audit mode, configure the windows operating system to start
the Windows Welcome phase and reset Windows Product activation.
ANSWER: Sysprep
This are point-to-point connection across a private or public network. It uses special
protocols, called tunneling protocol to make a virtual call to a virtual port.
It is a method of turning a computer on or off wherein the system state is saved to memory.
It provides transparent access to internal network resources whenever they are connected to
the Internet. It also enables the IT Professionals to manage remote computers outside of the
office and does not require a VPN connection.
ANSWER: DirectAccess
It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search
for, and view information.
ANSWER: Usability
It is one of the Key Features of Windows 7 that takes advantage of modern computing
hardware, running more reliably and providing more consistent performance than previous
versions of Windows.
It caches content from remote and web servers in the branch location so users can quickly
access the content. This cache can be hosted centrally in the branch location or distributed
across user PCs.
ANSWER: BranchCache
This Power plan saves power on a mobile computer by reducing system performance. Its
primary purpose is to maximize the battery life.
It is a windows 7 feature that enables user to connect to their desktop computer from
another device.
You are the network manager for a small company. You have a junior IT administrator who
did some installations last week on a Windows 7 machine. How can you see what
applications were installed last week on the Windows 7 machine?
You are a desktop administrator for an enterprise organization. A user applies a device
update from the manufacturer, and now the computer is displaying error messages. The
user has critical documents on the computer that need to be preserved. You need to restore
the computer to an operating state and preserve applications and data. What should you
do?
ANSWER: Restore Windows by using the most recent System Restore point
Alexandria is the payroll manager and stores critical file on her local drive for added security
on her Windows 7 computer. She wants to ensure that she is using the disk configuration
with the most fault tolerance and the highest level of consistent availability. Which of the
following provisions should she use?
ANSWER: Recovery
You are the network administrator for Stellacon Corporation. User in the sales department
have been complaining that the Sales application is slow to load. Using Performance
Monitor, you create a baseline report for one of the computers, monitoring memory, the
processor, the disk subsystem, and the network subsystem. You notice that the disk
subsystem has a high load of activity. What other subsystem should you monitor before you
can know for sure whether you have a disk subsystem bottleneck?
ANSWER: Memory
It enables users to log on to the domain to gain access to the network resources and it is
reside in Active Directory.
It is a dynamic volume that encompasses available free-space from single, dynamic, hard
disk drive.
It contains the partition table for the disk and a small amount of executable code called as
the master boot code.
It is a collection of user accounts, computer accounts, contacts and other groups that you
can manage as a single unit.
ANSWER: Groups
It enables IT Administrator to automate one-to-many management of users and computers.
It is a graphical user interface that is used to manage disks and volumes both basic and
dynamic, locally or on remote computers.
ANSWER: Forest
It is an object that contains all of the information that defines a user in Windows Server
2008 R2.
ANSWER: Distribution
It is a dynamic volume that encompasses available free-space from single, dynamic, hard
disk drive.
It contains an array of partition entries describing the start and end LBA of each partition on
disk.
ANSWER: Diskpart
It is a dynamic volume that joins areas of unallocated space disks into a single logical disk
It enables the user to log on and access resources on a specific computer and usually reside
in SAM.
ANSWER: Authentication
ANSWER: Authorization
It is a Windows Authentication Method that is used by windows 7 clients and server running
Microsoft Windows Server 2000 or later
ANSWER: Kerberos v5
It defines the type of access granted to a user, group, or computer for a file or folder.
The operating system maintains a ______ table that keeps track of how many frames have
been allocated, how many are there, and how many are available.
ANSWER: frame
It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new
partition and replace an existing operating system on a partition.
It is a downloadable application that helps windows user identify which edition of Windows
7 meets their needs.
It is one of the Options for Installing Windows 7 where in you replace an existing version of
Windows with Windows 7 but all user applications, files and settings are retained.
It specifies which part of an IPv4 address is the network ID and which part of the IPv4
address is the Host ID.
ANSWER: the time to stop one process and start running another one
It is a device that converts instructions from the network protocol stack into electric signals.
ANSWER: the total time taken from the submission time till the first response is
produced
The _____ table contains the base address of each page in physical memory.
ANSWER: page
It is a type of IPv4 Address that is required by the devices and host that connect directly to
the Internet. This address must be unique, routable on the internet and must be assigned by
IANA.
It enables you to manage network traffic, group physically dispersed nodes into logical area
networks and isolate network traffic.
It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.
ANSWER: WiMax
ANSWER: 32 bits
ANSWER: Hexadecimal
Which module gives control of the CPU to the process selected by the short-term
scheduler?
ANSWER: dispatcher
ANSWER: Crown
ANSWER: power of 2
It is a device that provides wiring concentrator functionality like a hub but it also enables
network traffic management, performs firewall functions and makes routing decisions based
upon traffic priority.
ANSWER: Switch
ANSWER: external
The switching of the CPU from one process or thread to another is called ____________
If the size of logical address space is 2 to the power of m, and a page size is 2 to the power
of n addressing units, then the high order _____ bits of a logical address designate the page
number, and the ____ low order bits designate the page offset.
ANSWER: m – n, n
ANSWER: the total time from the completion till the submission of a process
ANSWER: Broadcast
CPU fetches the instruction from memory according to the value of ____________
A process is selected from the ______ queue by the ________ scheduler, to be executed.
ANSWER: 11111111.11111111.11111111.00000000
What is Waiting time?
ANSWER: When a process goes from the running state to the waiting state
It is one of the Key Features of Windows 7 that takes advantage of modern computing
hardware, running more reliably and providing more consistent performance than previous
versions of Windows.
ANSWER: Drivers
ANSWER: Performance
It is the measurement of how a system conforms to expected behavior
ANSWER: Reliability
It is a new Windows 7 security feature that enables IT professionals to specify exactly what is
allowed to run on user desktops.
ANSWER: Applocker
It is a security feature that simplifies the ability of users to run as standard users and
perform all neccessary daily tasks
It allows the administrators to identify which software is allowed to run and was initially
added to Windows XP and Windows Server 2003.
ANSWER: Firewall
You are the system administrator for a large organization that uses Windows Server R2 and
Windows 7. You have a Windows 7 machine and have enabled System Protection. You want
the machine to retain only the last System Protection snapshot that was taken. What should
you do?
ANSWER: Run Disk Cleanup for System Restore and then run Shadow Copies
You are the network administrator for a large organization that uses both Windows Server
2008 R2 and Windows 7. One of the Windows 7 machines needs to be backed up daily. You
perform an image backup on the Windows 7 machine. The Windows 7 machine then gets
struck by a virus and will not start up properly. What can you do to get the Windows 7
machine up and running the fastest possible way?
ANSWER: Start the computer from the Windows 7 DVD and then use the System
Image Recovery tool
You are the administrator for a large organization with multiple Windows Server 2008
domain controllers and multiple domains. You have a Windows 7 machine that is set up for
all users to access. You have an application called StellApp.exe that everyone on this
Windows 7 computer can use except for the sales group. How do you stop the sales group
from accessing this one application?
Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset
the keyboard speed and the mouse pointer rate. Which utility should she use to configure
the keyboard and mouse properties?
1024-MB RAM
You need to ensure that you can install Windows 7 Enterprise on the netbook computer.
Which hardware component should you change or add?
Your company network includes desktop computers that have Windows 7 installed.
Microsoft updates are applied automatically at a scheduled time. A use1- reports that a
proprietary application has stopped working. You need to uninstall the most recent update
from Microsoft. What should you do first?
ANSWER: From the Action Center, open the Windows Update window.
You manage a network device by using a web interface. You perform all critical Windows
updates so that the computer now runs Internet Explorer 10. After performing these
updates, the layout of the network device web page displays incorrectly. Other web pages
display correctly. You need to resolve this issue. What should you do?
ANSWER: Add the network device web page to the trusted sites zone
You have a computer that runs Windows 7. The computer is a member of a workgroup. You
use Encrypting File System (EFS) to protect your local files. You need to ensure that you can
decrypt EFS files on the computer if you forget your password. What should you do?
ANSWER: From User Accounts, Select Manage your file encryption certificates.
You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer
that runs Windows 7. You want to deploy a Windows image (WIM) file to other computers
in the domain. You need to capture the operating system, computer configuration, and
applications installed on the computer to a WIM file. What should you do before you
capture the image?