1.
Which of the following types of batteries are used by toys and watches?
2.
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows-based network. You do maintenance work on a Windows 2000 Professional computer. You require to perform the following jobs:
Exhaustive disk checking.
Locate bad sectors (if any).
Recover readable information.
Which of the following commands will you use to accomplish the task?
3.
Which of the following standard displays is commonly used on 14 inch or 15 inch laptop LCD screens with a resolution of 1400 x 1050 pixels?
4.
How many devices can be connected to an IEEE 1394 port?
5.
Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?
6.
Under which environmental conditions is the risk of Electrostatic discharge (ESD) the highest?
7.
Which of the following protocols is widely used for setting up and tearing down multimedia communication sessions such as voice and video calls over the Internet (VoIP)?
8.
Rick works as a Network Administrator for Company Inc. He takes a backup of some important compressed files on an NTFS partition, using the Windows 2000 Backup utility. Rick restores these files in a FAT32 partition. He finds that the restored files do not have the compression attribute. What is the most likely cause?
9.
Which of the following is a program initially designed to prevent phosphor burn-in on CRT and plasma computer monitors?
10.
Which of the following protocols provides an encryption by using the Temporal Key Integrity Protocol (TKIP)?