Question:
i need answers it's due in 2 week's?
mohammed
2010-11-09 18:09:36 UTC
1. A(n) _______ is a program that reproduces itself when the
computer executes the file to which it’s attached.
A. worm C. Trojan horse
B. virus D. application
2. _______ is the only way to ensure complete data recovery should disaster strike.
A. Data backup C. A firewall
B. Installing antivirus software D. FDISK
3. A recently updated Emergency Repair Disk is part of a(n)
A. security plan. C. operating system.
B. recovery package. D. backup strategy.
4. Which of the following meets the criteria of a strong password?
A. May2754 C. 04/23/86
B. water4U D. w%a@T$2E?r
5. Two technicians are discussing the methods to protect a system from external power failures.
Technician A’s solution is to mirror all operations. Technician B wants to use an uninterruptible
power supply.Which of the following statements is correct?
A. Only Technician A is correct. C. Both technicians are correct.
B. Only Technician B is correct. D. Neither technician is correct.
6. Which of the following best describes a virus’s assimilation?
A. The virus migrates into computer memor.
B. The virus reproduces itself without being detected.
C. The virus is segregated from the rest of the system software.
D. Developers update their software.
7. What is the maximum number of password characters allowed for a Windows XP system
attached to a network that includes Windows 98 operating systems?
A. 11 C. 56
B. 14 D. 127
8. What is the purpose of a firewall?
A. A firewall filters e-mail messages.
B. A firewall prevents unauthorized access to the Internet.
C. A firewall prevents unauthorized access to site systems.
D. A firewall allows the network administrator to control internal computer security.
9. Two technicians are discussing the features of the Windows Recycle Bin. Technician A
says that files deleted from a local drive can be recovered from the Recycle Bin.
Technician B says files deleted from a network drive can’t be recovered using the Recycle
Bin. Which of the following statements is correct?
A. Only Technician A is correct. C. Both technicians are correct.
B. Only Technician B is correct. D. Neither technician is correct.
10. Which of the following devices has the fastest file backup speed?
A. CD-R C. Hard drive
B. DVD+RW D. Jaz drive
11. What backup solution would you recommend to people who use a laptop and work both at
and away from the office?
A. PC Card hard drive C. CompactFlash card
B. Online backup D. CD-R
12. What is the disadvantage of using your ISP Web site for a low-cost backup solution?
A. All your data is exposed to the Web.
B. Data transfer rates can be very slow.
C. Graphic files may not be permitted.
D. It increases the monthly ISP fee.
13. A _______ is the least expensive backup medium per GB.
A. CD C. Jaz disc
B. DVD D. Tape
14. The collective name given to software that’s designed to damage a computer system is
A. a Trojan horse. C. Carnivore.
B. a worm. D. malware.
15. A wireless network is most vulnerable to snooping
A. while on the Internet.
B. at the sender’s computer.
C. at the receiver’s computer.
D. at the antenna of the base station.
16. The capacity of a double-sided DVD-RAM cartridge is
A. 9.4 GB C. 650 MB
B. 2.6–4.7 GB D. 250 MB
17. _______ monitor(s) and record(s) all your online activity.
A. Packet sniffers C. Spyware
B. Sniffers D. Worms
18. In the grandfather, father, and son backup scheme, the grandfather backup is performed
A. yearly. C. weekly.
B. monthly. D. daily.
19. Packets are associated with
A. wireless networks. C. Internet URLs.
B. Trojan horses. D. e-mail messages.
20. _______ the antivirus software on your computer will help to detect new viruses.
A. Removing C. Updating
B. Reinstalling D. Reinitializing
21. What OS was the first to fully support universal serial bus (USB)?
A. MS-DOS C. Windows 95
B. Windows 3.1 D. Windows 98
22. In which version of Windows did preemptive multitasking replace cooperative multitasking?
A. Windows NT C. Windows 98
B. Windows 2000 D. Windows 95
23. The AMD Athlon processor chip is typically found in
A. IBM-based PCs. C. RISC processors.
B. Macintosh computers. D. UNIX computers.
24. Which of the following allows the operating system to handle input/output functions?
A. Application Program Interface (API) C. Resource manager
B. Device driver D. Server
25. Information for Windows 95 concerning the configuration of hardware and software is
stored in
A. an Active Directory. C. a registry database.
B. the file manager. D. the task supervisor.
26. An all graphical user interface (GUI) was first introduced in which of the following
operating systems?
A. Mac OS C. Windows 95
B. Sun OS D. Windows XP
Six answers:
?
2010-11-10 05:51:49 UTC
C'mom guys, lets all help Mohammad. He only needs a few more classes like this one and then he's a Doctor.



.
2010-11-10 02:30:48 UTC
You're lucky I'm bored :)



This is all off of memory, but most of my answers (95+ percent) should be correct.



1 c

2 a

3 b

4 d

5 c

6 b - just a good guess

7 not a clue Linux User Yay :)

8 c

9 b

10 c - again a guess because I don't know what a Jaz drive is it's either c or d

11 c

12 Who ever wrote this is dumb... It could be all of the following... Say A

13 b

14 d

15 b

16 4.7 x2 = 9.4 so a

17 c wtf is a sniffer?

18 -.-... idk I just use Ubuntu so I need not...

19 idk

20 c

21 a since when did windows invent something... they steal all of "their" ideas

22 idk

23 amd is not mac.. idk about c or d I would guess A, though it could be intel

24 c

25 c

26 Not sure... Either A or C, So I will guess A. Windows is always last...



Hope I helped

-Dave
?
2010-11-10 02:17:25 UTC
I'm pretty sure 1 is Chester A Arthur.
DrDave
2010-11-10 02:11:28 UTC
I'd say it's about time to start reading your study materials then!
2010-11-11 01:29:43 UTC
I don't think it is wise to do so. you should finish this by yourself.
Drake B
2010-11-10 02:12:07 UTC
you expect someone to do this for you. that's cheating


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...