Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
In Windows 7, you can open the command prompt console by clicking Start, pointing to All Programs, clicking Accessories, and clicking ____.a. Command Prompt c. Consoleb. Cmd d. Command
Q:
Windows 7 requires quotation marks to enclose filenames that contain spaces.
Q:
The RENAME andREN commands do not allow you to specify a new drive or path for your destination file.
Q:
Directories cannot be removed using the Windows 7 CLI.
Q:
As a Fedora 13 superuser, you can arrange information anywhere in the directory structure.
Q:
In the Windows 7 CLI, if you omit the path in the TREE command, the command displays an error message.
Q:
Q:
How is the Windows 7 Disk Defragmenter used to determine whether your PC can benefit from defragmentation?
Q:
How is the /mnt directory used in Fedora 13?
Q:
How are mounted drives defined and used in Windows 7?
Q:
Describe the drive partition naming convention in Fedora 13.
Q:
Provide a high-level description of how to implement a file system in Fedora 13.
Q:
What security procedures are followed by Windows 7 when you request access to a file?
Q:
Explain how the master file table in NTFS structures file information.
Q:
How is the size of a cluster defined in FAT16 file systems?
Q:
Identify and describe the two basic disk storage types available with Windows 7.
Q:
The Fedora 13 buffer ____________________ is a special memory region used for quick access to stored data items.
Q:
In Windows 7, the ____________________ tool locates fragmented files and folders and arranges them in order to improve disk performance.
Q:
In Fedora 13, the ____________________ file is a hidden file on the hard drive used to hold parts of programs and data files that do not fit in memory.
Q:
Windows 7 deploys ____________________ to keep track of previous attempts to access data in NTFS.
Q:
In Windows 7, you can initialize a hard drive as a dynamic disk, where storage is divided into ____________________rather than partitions.
Q:
The fsck command is syntactically similar to the ____ command.a. mkdir c. mountb. mkfs d. fdisk
Q:
The ____ option in the Quota tab of the Windows 7 Local Disk Properties dialog box may create a log entry when a user exceeds the limits, but it does not limit usage.a. Deny disk space to users exceeding quota limitb. Limit disk space toc. Do not limit disk usaged. Set warning level to
Q:
From the ____ tab of the Windows 7 Local Disk Properties dialog box, you can set the NTFS permissions that control access to data on the hard drive.a. Security c. Toolsb. General d. Sharing
Q:
In Windows 7, if you have ____ privileges, you can create additional shares for the entire contents of the local disk (C).a. superuser c. groupb. administrative d. regular user
Q:
In Windows 7, by default, the hidden share ____ is displayed in the Sharing tab of the Local Disk Properties dialog box.a. A$ c. C$b. B$ d. D$
Q:
After ____, each file and folder on your computer's hard drive will occupy a single, contiguous space on the volume.a. performing a backup c. defragmentingb. error-checking d. disk compression
Q:
Which tab in the Local Disk Properties dialog box would you select to perform disk cleanup?a. General c. Hardwareb. Tools d. Sharing
Q:
In Fedora 13, you can use the ____ command and manage swap space.a. pathchk c. catb. fdisk d. fsck
Q:
Using the ____ option in the mount command prints a help message.a. -h c. -vb. -l d. -w
Q:
In Fedora 13, ____ is the process by which a file system becomes available for use.a. scanning c. mountingb. structuring d. partitioning
Q:
In Fedora 13, if you need to create a mount point on the current file system, you first create a directory in the file system using the ____ command.a. mkdir c. fdiskb. mkfs d. mount
Q:
____ creates the root of the directory structure and the file system for use.a. Partitioning c. Formattingb. Allocating d. Defining
Q:
For copyright reasons, Fedora 13 does not automatically recognize ____, and sometimes it requires kernel updates for the driver.a. NTFS c. ISO 9660b. FAT d. UDF
Q:
The Fedora 13 Extended 2 file system provides ____ to keep files safe from intruders who might gain unauthorized physical access to sensitive, stored data.a. compression c. quotasb. auditing d. encryption
Q:
Fedora 13 assigns logical storage areas called ____ on a hard drive.a. tracks c. sectionsb. partitions d. cylinders
Q:
A(n) ____ disc is a computer storage medium that operates using digitized beams of light.a. celluloid c. opticalb. magnetic d. floppy
Q:
The Windows 7 OS supports ____, a means of reducing the amount of space needed to store a block of data.a. compaction c. condensationb. compression d. contraction
Q:
The ____ option in NTFS provides a fail-safe mechanism by using transactions to ensure that data is written to the hard drive.a. compression c. securityb. encryption d. journalizing
Q:
NTFS uses a ____ for managing access to files.a. virtual file allocation table (VFAT) c. master file table (MFT)b. vnode d. file allocation table (FAT)
Q:
The smallest unit of space on a FAT disk that any OS can access is a ____, which usually consists of 512 bytes.a. sector c. groupb. track d. cluster
Q:
In Windows 7, a(n) ____ partition contains an OS.a. extended c. activeb. logical d. system reserved
Q:
Unlike Windows 7, Fedora 13 does not automatically check the file systems at boot time.
Q:
Windows 7 and Fedora 13 have the same approaches to mounting a file system.
Q:
In the context of creating storage on a disk, an unallocated area is one that does not contain a primary or extended partition.
Q:
In Windows 7, a file can be both encrypted and compressed on a hard disk.
Q:
In Windows 7, a drive letter must be assigned to each hard drive and optical drive installed in a PC.
Q:
When installing ActiveState Perl in Fedora 13 you use the same installation options as Windows 7.
Q:
Third-party cookies are stored by a Web server from the same Internet domain.
Q:
A valid digital signature guarantees that the software is without problems.
Q:
The Firefox browser in Fedora 13 is very similar to Internet Explorer.
Q:
Fedora 13 provides a System Information tool that resembles the one in Windows 7.
Q:
Match each item with a statement below.a. Web browser f. cookiesb. Certification Authority (CA) g. Perlc. JavaScript h. Platform for Privacy Preferences (P3P)d. proxy server i. search enginee. hyperlink1) Takes you to a different URL that indicates a different location on the Web.2) Uses automated software programs to survey the Web and find the information you want.3) Small files that collect and store personal information about you and your Web-surfing preferences.4) Acts as intermediaries between computers and the Internet, and filter access to Web sites.5) Controls how personal information is used by the Web sites you visit.6) Investigates the identity of organizations and people who obtain certificates.7) A scripting language that enables interactive functionality in Web pages.8) A highly capable, feature-rich programming language.9) A software program that you use to access and navigate the Web.
Q:
Why is it important to periodically clear caches used by Firefox to protect your computer?
Q:
How is the Programs tab of the Internet Options dialog box used?
Q:
Describe a three-step process for encrypting messages with a public key and decrypted them with a private key.
Q:
How does the Internet Content Rating Association (ICRA) system for labeling Web content work?
Q:
Describe at least three ways that Internet Explorer can handle cookies after you configure privacy settings.
Q:
Why is preserving the security of your computer when you browse the Web like a balancing act?
Q:
How do search engines work?
Q:
Compare the activity of reading a book to viewing Web pages in a browser.
Q:
How is the Help and Support Center used in Windows 7?
Q:
____________________ is a Web feed technology introduced in Internet Explorer 8 that allows you to subscribe to certain portions of a Web page.
Q:
To verify identities on the Web, Internet Explorer uses industry-standard digital ____________________.
Q:
A(n) ____________________ acts as a protective boundary between the internal networks and the outside world.
Q:
Each page on a Web is designated by an Internet address known as a(n) ____________________.
Q:
A(n) ____________________ is any program designed to perform a specific function directly for the user or, in some cases, for another program.
Q:
Scripts used in ActiveState Perl have a file extension of ____.a. perl c. plb. prl d. asp
Q:
Most applications are ____ to reduce the size of the setup file.a. compiled c. compressedb. compacted d. condensed
Q:
The ____ options in Firefox refer to navigation and security features.a. Advanced c. Generalb. Web Features d. Privacy
Q:
In Firefox, cookies usually expire in ____ days if you keep them.a. seven c. 30b. 10 d. 45
Q:
You can use the ____ menu in Firefox to customize toolbars, the status bar, sidebars, text size, and other particulars.a. Bookmarks c. Gob. View d. Tools
Q:
Use the ____ tab of the Internet Options dialog box to set up an Internet connection and configure LAN settings.a. Programs c. Connectionsb. General d. Content
Q:
You exchange certificates with servers using a secure transmission protocol, which provides ____ and unaltered information.a. decrypted c. decipheredb. encrypted d. plain text
Q:
By default, all ratings in the Internet Explorer Content Advisor are set to Level ____.a. 0 c. 2b. 1 d. 3
Q:
____ cookies are deleted when you close your browser.a. Persistent c. Remoteb. Local d. Session
Q:
____ are software components that interact with each other in a networked environment.a. ActiveX controls c. Crawlersb. Cookies d. Bots
Q:
You define the location of the security zones relative to the ____.a. firewall c. local serverb. proxy server d. remote Web server
Q:
When you first install Internet Explorer 8, it corrals all Web sites into the Internet zone and stands guard with a ____ level of security.a. Low c. Medium-highb. Medium d. High
Q:
You can set up security ____ from the Security tab of the Internet Options dialog box.a. regions c. protocolsb. zones d. environments