A+ OS Technologies Examination


1. Tech Man has a utility belt with boomerangs, grappling hooks, some handy commands, and a few snacks for later. What is the utility that allows him to see a path from source to destination by testing every router connection in between?

A. PING -t
B. PING -R
C. ROUTE PRINT
D. ROUTE TRACE
E. TRACERT
F. TRACEROUTE

>> !
Answer: E

Don't fall into the trap and say, "Ping". Ping will only verify the ability to communicate with another computer. TRACERT is what you need if you want to see the route a packet is taking.


2. Which is a valid file name for a text file on a DOS based machine?

A. COM1.txt
B. LPT1.txt
C. MYTESTFILE.txt
D. test.txt

>> !
Answer: D

Operating Systems File names can be made of eight characters long and can include an extension up to three characters. But cannot use device names.


3. What is a key troubleshooting process you must use as a service technician?

A. Questioning the user.
B. Ensuring power is applied to the computer.
C. Execute a plan.
D. Ensure you have a known good operating system.

>> !
Answer: A

The service technician's key component in the troubleshooting process is questioning the user regarding the problems the user is experiencing.


4. Upper memory is considered to be between?

A. 0 - 640K
B. 640K - 1024K
C. 1024K - 4Megs
D. 1024K - 2Megs

>> !
Answer: B


5. MSDOS links computer hardware and software.

A. True
B. False

>> !
Answer: A


6. One of the good things about Microsoft products since Windows 95 is that they all pretty much look and work the same. And, because they're the big dog in the kennel, all of the software manufactures follow their lead. You have just installed Microsoft Windows95/98/ME. When you open Explorer, which of the following files will be visible for you to click on? (Choose all that apply)

A. DAT
B. HTM
C. EXE
D. LNK
E. BAT
F. SYS
G. LOG

>> !
Answer: B, C, D, E & G

By default DAT and SYS are considered "Hidden Files". You can see them by opening Windows Explorer then Tools => Folder Options => View and clicking the "Show Hidden Files and Folders" button. Here's a handy little tip: If you have a file or folder you don't want anyone to find on your machine, right click it and set it as a Hidden File.


7. When formatting a bootable hard disk what is the correct syntax?

A. Format c: /s
B. Format c: /bootable
C. Format c:
D. Format c: /start

>> !
Answer: A


8. This MS DOS driver allows access to the CD-ROM.

A. HIMEM.SYS
B. MSCDEX.EXE
C. SYS.COM
D. SUBST.EXE
E. SHARE.EXE

>> !
Answer: B

MSCDEX.EXE loads the Microsoft CD driver in memory, so that the CD-Rom can be accessed using a drive letter.


9. You've just received a new notebook computer and hate the way the mouse touchpad functions. From your vast experience with Microsoft products you know there isn't much that you can do with a mouse that you can't also do with the keyboard using hot keys. Which of the following lets the user know when a hot key can be used?

A. An underscore
B. A bold letter
C. A flashing arrow that says "Hot Key"
D. A bold and italicized letter
E. An underscore in conjunction with a bold letter
F. An underscore in conjunction with an italicized letter
G. Mouse over pop up text

>> !
Answer: A

For laptop or notebook users, hot keys are the greatest invention since sliced bread. If you see a letter underscored or underlined you've found one. To use it, hold down the "Alt" or sometimes the "Ctrl" key and press the letter, you will get the same response as if you clicked on it with your mouse. Example: File is in the upper right hand of almost every Microsoft program. If you hit Alt+F, File will open.


10. In order to load DOS into the HMA what must be loaded when config.sys is run?

A. HIMEM.SYS
B. SYS.COM
C. LOAD.COM
D. HIGH.COM

>> !
Answer: A

In order to use the High Memory Area, HIMEM.SYS must be included in the config.sys during bootup.


11. You're amazed that your new company has never done a full inventory of their computer hardware. If that's an indicator of their management skills, maybe those stock options weren't such a sweet deal after all. You decide to get the spec on every machine in the building. You want to print the system configuration of one of your Windows 98 computers. Which of the following will allow you to do this?

A. Clicking on Print from within System Manager
B. Clicking on Print from within Device Manager
C. Clicking on Print from within the SysMgr.exe utility
D. Clicking on Print System Configuration from Program => Accessories in the Start menu

>> !
Answer: B

Device Manager contains a wealth of information about a system. To get there Start > Settings > Control Panel > System. If you want to print a range of or all configuration information for the system, select the Device Manager tab and hit the Print button.


12. What DOS clean boot option should be used in order to prevent unwanted components from being loaded when developing a list of possible causes of a computer problem?

A. F5
B. F8
C. F2
D. F9

>> !
Answer: A

Pressing F5 when you see "Starting MS-DOS..." will allow you to bypass all the commands in the computers config.sys and autoexec.bat files.


13. What is the largest partition you can create under FAT 16?

A. 1 Gig
B. 2 Gig
C. 3 Gig
D. 528 Meg

>> !
Answer: B

Under FAT 16 2 Gig is the largest partition you can create. FAT 32 allows up to 2 TB.


14. What will you want to do when troubleshooting a problem? (Choose all that apply)

A. Collect the basic information
B. Determine the cause
C. Isolate the problem
D. Execute a plan

>> !
Answer: A, B, C & D

When you have been called out to service a problem the primary purpose is the timely restoration. The ability to tear down a problem into parts and knowing the relationship of those parts is a key to troubleshooting development. Collecting the basic information, determining the cause, isolating the problem and executing a plan will increasingly allow you to accomplish your service calls in a timely fashion.


15. The key to being a successful computer technician is what?

A. Communication.
B. Knowing how to fix the problem.
C. Being available 24 hours a day.
D. All the above.

>> !
Answer: A


16. You swear, some days you feel like you have to wipe the drool off of the chin of your end users. Yet again your favorite complainer, Cristina in the Marketing Department, can't log into the secure section of a web page or even her computer system. Since no one else is having this issue, you think you've isolated the problem. What are the likely causes? (Choose all that apply)

A. The account has been disabled
B. The account has been locked out
C. The user is entering an incorrect spelling of her username
D. The user is entering an incorrect spelling of her password
E. The user has the Caps Lock key enabled
F. A protocol mismatch

>> !
Answer: A, B, C, D & E

This could be an incorrect spelling or incorrect passworD.- possibly caused by the Caps Lock key being engaged. Passwords are often "case sensitive." The network may also have security protocols in place that disable or lock out the account after a certain number of attempts to enter the password. You could also hope that the account has been disabled because they're about to fire her.


17. The PC is experiencing problems which you suspect are related to a specific CONFIG.SYS command. Which key or key combination would you press to step through the CONFIG.SYS?

A. F5
B. Shift+F5
C. F8
D. Shift+F8
E. CTRL+Break

>> !
Answer: C


18. The Master Boot Record exists where on the active primary partition of a Hard Drive?

A. Sector 1 Track 1 Head 1 Cylinder 1
B. Sector 0 Track 1 Head 0 Cylinder 0
C. Sector 0 Track 0 Head 0 Cylinder 0
D. Sector 0 Track 0 Head 1 Cylinder 0

>> !
Answer: C

The Master Boot Record contains the information about how the hard drive is to be used, it is in the first possible location of the active partition. Sector 0 Track 0 Head 0 Cylinder 0.


19. Which of the following is not part of memory management?

A. Physical addresses
B. Page faults
C. Swap files
D. Multitasking

>> !
Answer: A


20. Which file does Setup read to verify the installed components in Windows 95?

A. VMM32.VXD
B. PRTUPD.INF
C. BOOTLOG.TXT
D. SETUPLOG.TXT

>> !
Answer: D


21. A Custom setup performs these actions:

A. Offers several options that are limited for use by only experienced users who want to control certain elements of the Windows 95 setup.
B. This is the default option.
C. This option is only for portable computers or laptops.
D. This type of setup is used only by computers with limited disk space.

>> !
Answer: A


22. The ancient Chief Financial Officer of your company sent you a note saying he was working on next year's budget and wanted an estimate on the amount each department would spend on email postage. We're all hoping he'll retire soon. Which of the following protocols can be used to access mail from a dial up account?

A. POP3
B. PAP3
C. SMTP
D. SMTPv3

>> !
Answer: A

Be careful here. The correct answer is POP3 or, Post Office Protocol 3. SMTP or, Simple Mail Transfer Protocol is used to send mail from your computer, not receive it. The up and coming protocol for receiving mail is IMAP or, Internet Messaging Access Protocol. It is much more feature rich, allowing you to do things such as scan your messages without actually downloading the full text each one contains.


23. How many subtrees of keys are contained in the Registry structure?

A. 6
B. 4
C. 10
D. 27

>> !
Answer A


24. Your boss has been reading the technical trade magazines again and is gravely concerned about network security. You try to explain that the company sells aluminum siding and is not the CIA. Still he want all "sensitive" files and folders to be encrypted. What is required for this to be accomplished in your Windows 2000 environment?

A. FAT
B. FAT16
C. VFAT
D. FAT32
E. NTFS
F. HPFS

>> !
Answer: E

A big plus of NTFS is the added local security capability. If you get a question with the words Windows, security and encryption, starting looking for a place to check the NTFS box.


25. Which remote administration tool would you use to manage computers remotely in the local workgroup?

A. Network Neighborhood
B. Net Watch
C. Performance Monitor
D. File and Printer Sharing Manager

>> !
Answer: A


26. Granted, you don't type command lines as often as you used to back in the good old days of DOS and MS-Basic, but this is ridiculous. You are trying to copy a file from the command prompt in Windows 98. Each time you do, you get a message stating that you have a Bad command or file name. Which of the following might be causing it?

A. You might be spelling the command wrong
B. The command you are trying to use might not be in the PATH statement
C. The command you are trying to use might not be in the working directory
D. The command you are trying to use might be marked hidden
E. The command you are trying to use might be marked system
F. You might not have the proper login rights

>> !
Answer: A

Since the copy command is an internal part of the command.com > command interpreter, it should run independent of the working directory or PATH statement. Chances are you've made a typing error. When typing command lines, they have to be perfect or you get nothing. If you work on multi-platforms remember they often use a different syntax in their command lines.


27. If you are running Windows 95, can you use AUTOEXEC.BAT and CONFIG.SYS files?

A. Yes
B. No
C. Maybe
D. Depends on the software you are using and on which type of computer you are running it.

>> !
Answer: A


28. Which of the following key names contains dynamic status information for devices such as Plug and Play?

A. HKEY_CURRENT_CONFIG
B. HKEY_CLASSES_ROOT
C. HKEY_USERS
D. KEY-DYN_DATA

>> !
Answer: A


29. What is the file name found on the Microsoft Windows 95 installation disks or on a default shared network resource for installing Microsoft Windows 95?

A. SETUP.EXE
B. NETSETUP.EXE
C. INSTALL.EXE
D. STARTUP.EXE

>> !
Answer: A


30. Which of the following contains the database of system settings and configurations?

A. Hardware tree
B. Registry
C. Taskbar
D. Resource system

>> !
Answer: B


31. Under what circumstances would you use Device Manager?

A. To install a new hardware device
B. To remove a software application
C. To resolve hardware conflicts
D. To load an MS-DOS game

>> !
Answer: C


32. You blow the dust off that old Windows 95 machine you keep around just for this reason. You've got some critical DOS files -- all right some old DOS games -- that won't run on your Windows ME machine. Which of the following files are required to boot your Windows 95 system to DOS? (Choose all that apply)

A. IO.SYS
B. IO.COM
C. MSDOS.SYS
D. MSDOS.COM
E. COMMAND.COM
F. COMMAND.SYS
G. CONFIG.SYS
H. CONFIG.BAT
I. AUTOEXEC.BAT
J. AUTOEXEC.SYS

>> !
Answer: A, C & E

If you got this one right, you've been around computers for a while or you really know how to study. IO.SYS and MSDOS.SYS are the two hidden files that make up MS-DOS. COMMAND.COM is what displays the DOS prompt and executes the commands that you type.


33. HMA is available on which of the following systems?

A. 286
B. 8088
C. 386
D. 486

>> !
Answer: A, C & D

The high memory area is available on any 286 or high computer.


34. To check for upper memory conflicts at Windows startup, which of the following commands would you use?

A. win /d:x
B. win d:/f
C. win /d:v
D. Press F8

>> !
Answer: A


35. HIMEM.SYS is used to access what part of memory?

A. Conventional
B. Upper
C. XMS
D. EMS

>> !
Answer: C


36. If you have a problem and need to step through the config.sys file, or you need to clean boot your PC, when do you need to press the key combination to allow you to perform these functions?

A. Right after POST has completed
B. When you see Starting MS-DOS...
C. When config.sys start's to run
D. While you are powering on the PC

>> !
Answer: B

If you have a problem and need to step through the config.sys file or you need to clean boot the PC. You need to press the correct key combination when you see; "Starting MS-DOS..."


37. DOS can access how many drives?

A. 3
B. 10
C. 20
D. 26

>> !
Answer: D

Digital Storage Concepts DOS can access up to 26 drives.


38. What directory are you placed in, when you first start your computer?

A. Parent Directory
B. Root Directory
C. Home Directory
D. First Directory

>> !
Answer: B

When the computer is first started, you are placed in the root directory, but after the autoexec.bat file runs you may end up in any directory that it specifies.


39. What is the maximum DOS partition which DOS 6.22 could handle?

A. 640 Megs
B. 32 Megs
C. 512 Megs
D. 1024 Megs
E. 2048 Megs

>> !
Answer: E

The limitation of DOS 6.22 is a 2 GB drive partition size. That is a limitation of the FAT. With Win95 and FAT32 you can now have partitions bigger than 2 GB.


40. 512 is the maximum files and subdirectories allowed in DOS's root directory.

A. True
B. False

>> !
Answer: A


41. DOS can be loaded into HMA memory.

A. True
B. False

>> !
Answer: A


42. When you are having problems with a software application, and you cannot print, where would you look first to resolve the problem?

A. You would look at the printer to make sure it's plugged in
B. You would check in the Printers folder to make sure you have configured a printer
C. You would check the settings in the software application you are using
D. You would call your Help Desk and have them figure it out

>> !
Answer: C


43. When you format a HDD or a floppy disk and it is made bootable, which files are copied to make it bootable?

A. COMMAND.COM
B. IO.SYS
C. MSDOS.SYS
D. AUTOEXEC.BAT
E. CONFIG.SYS

>> !
Answer: A, B & C

If the HDD or Floppy disk are bootable, the following files are copieD. COMMAND.COM IO.SYS MSDOS.SYS


44. Is it possible to set up a shortcut to launch an application from the Windows 95 desktop?

A. No
B. Yes
C. Only if you're running AUTOEXEC.BAT on startup
D. Only if you right-click the application's icon

>> !
Answer: B


45. To terminate a MSDOS batch program you can press ctrl + ______ key combination.

A. Break
B. C
C. Z
D. ATL + DEL

>> !
Answer: B


46. Which of the following examples would qualify for using safe mode?

A. To test an intermittent error condition
B. When you cannot printer to a local printer
C. When the video display does not work properly
D. When a NetWare client is not recognized

>> !
Answer: C


47. The upper memory address starts at ______.

A. A0000
B. 1A0000
C. BFFFF
D. C0000

>> !
Answer: A


48. In how many ways can you install new software and hardware?

A. One - through a CD-ROM or floppy disk SETUP.EXE file
B. Two - running the INSTALL.EXE file from a disk or from your hard drive
C. Three - You can use the Add/Remove Program utility, or you can use the Run command from the Start menu, or you can install the program from your hard disk or CD-ROM
D. You don't have a choice. You must follow the software or hardware vendor's instructions

>> !
Answer: C


49. During boot-up DOS looks for which files that are user editable?

A. Command.com
B. Autoexec.bat
C. Config.sys
D. IO.sys

>> !
Answer: B & C

During the boot-up process DOS looks for all these files, but only the autoexec.bat and config.sys are editable.


50. What DOS program is used to map XMS memory into unused regions of Upper Memory?

A. HIMEM.SYS
B. EMM286.EXE
C. EMM386.EXE
D. MEMMAKER.EXE

>> !
Answer: C

EMM386.EXE is used to map pockets of upper memory for programs to utilize.


51. You want to load DOS into HMA, which is the correct syntax line?

A. DOS=HIGH
B. DOS=HIGH,USB
C. LH=DOS
D. LOADHIGH=DOS

>> !
Answer: A


52. When attempting to isolate a problem, what will you ask a user? (Choose all that apply)

A. What does the error look like?
B. When did you first notice the problem?
C. Exactly when does the problem occur?
D. Can you reproduce the error?

>> !
Answer: A, B, C & D

When attempting to diagnose a computer problem, there are four basic questions which you can ask, that will assist you in isolating the problem: 1. What does the error look like? 2. When did you first notice the problem? 3. Exactly when does the problem occur? 4. Can you reproduce the error?


53. Which of the following entries is valid for config.sys?

A. Date
B. Device=c:\mouse\mouse.drv
C. ECHO OFF
D. Path=c:\;c:\dos

>> !
Answer: B

Echo off and Path statements are found in the autoexec.bat file and Device statements are located in the config.sys file.


54. Can you load device drivers and TSR's in to upper memory?

A. Yes
B. No
C. Sometimes

>> !
Answer: A

You can use upper memory to load device drivers or tsr's, provided you have loaded himem.sys or emm386.sys which converts Upper Memory into pockets of usable RAM.


55. The dynamic link library that handles the base operating system functions of Windows is: (Choose all that apply)

A. GDI.EXE
B. USER.EXE
C. HEAP.EXE
D. KRNLxxx.EXE

>> !
Answer: A, B & D


56. Which tool enables a user to diagnose a problem remotely, rather than having to be on site?

A. System Policy Editor
B. System Monitor
C. Net Watcher
D. Register Editor

>> !
Answer: B


57. The eraser hitting you in the forehead jolted you from a lovely nap. While most of the stuff in the A+ class was painfully boring, at least it was restful. You look up at the Instructor as he is rummaging around for something heavier to throw at you. "Ah, Sleeping Beauty is back," the Instructor, said with a sneer. "Perhaps you could tell us where Windows 95/98/ME/NT4.0/2000 stores your software settings?" What simple answer do you provide before dozing off again?

A. The Registry
B. The COMSVC database
C. The User database
D. The User Profile database
E. In the SS.ini file

>> !
Answer: A

The Registry is where most of your software settings are stored. It is a critical software component of your computer that you really don't want to screw up. The Registry and the improper loading or deleting of programs (not using the Add/Remove Software feature in Control Panel) is a major cause of problems with computers. Often they generate unrecoverable errors (unless you're a whiz with REGEDIT) that results in having to wipe a machine and start over. Always be sure you have a clean copy of your Registry before you start messing around with it.


58. You knew you should have been nervous about your new job when you noticed everyone had dot matrix printers on their desks. But, when you discovered everyone had multiple partitions on their drives you should have pleaded with your ex-boss for your old job. Which of the following file systems is limited to a maximum partition size of 2GB?

A. FAT16
B. FAT32
C. VFAT
D. FAT8
E. MSFAT

>> !
Answer: A

If you still have any machines that you have to work on that are loaded with Windows 95a, you have everybody's sympathy. This was a real issue years ago but is almost never occurs anymore. This problem vanished with the introduction of later versions of FAT in Windows 95b that was released in 1996.


59. The senior techie at your company -- the guy who looks and dresses like Jerry GarciA.- says you should always have a startup disk for your Windows 95/98/ME system. He is a wise beyond his years and carries the scars of many battles with the Evil Empire. You decide to heed his advice. In your new Windows 95/98/ME system where would you go to create a startup disk?

A. BDISK.EXE
B. RDISK.EXE
C. System Tools
D. System Properties
E. BD.EXE
F. Drive Tools
G. Hardware Tools
H. Add/Remove Programs

>> !
Answer: H

You can make a start up disk by going to Add/Remove Programs, clicking on the "Start Up Disk" tab and following the directions. Startup disks are like cops; there is never one around when you need one. If you ever need one you'll really be sorry you didn't spend the extra 2 minutes to create it.


60. You're reading your A+ manual when you discover there are things called a low level format and a high level format. Which of the following are created by a high level format? (Choose all that apply)

A. A boot sector
B. Ring markings
C. A root directory
D. File Allocation Tables
E. Head gauges

>> !
Answer: A, C & D

In a high level format a floppy disk or a hard drive must be initialized with the File Allocation Table or equivalent before it can be used. This will also add the root directory and the boot sector. On hard drives, the low level format is usually done at the factory. In the old days, 5 1/4 and 3 1/2 floppies came as IBM formatted or unformatted. You would also occasionally see something called MAC formatted. I wonder when MacDonald's got out of the computer business?


61. One of your users is taking networking classes and has noticed that from time to time his IP address changes. He calls to ask you what is happening. After changing the security setting that relates to him in order to prevent him from doing any damage to the network, what do you tell him?

A. You tell them that DHCP is being used
B. You tell them that their TCP/IP Stack is not initializing properly
C. You tell them that their computer has a MAC address conflict with another system on the network
D. You tell them that their computer has an IP address conflict with another system on the network
E. You tell them that their computer has a TCP address conflict with another system on the network

>> !
Answer: A

DHCP, or Dynamic Host Configuration Protocol, assigns IP addresses to client stations dynamically. In most cases a client system receives an address lease that is good for a period of time. However, in some cases a device can have a different IP address assigned to it every time it boots up and can even have it change while in the middle of the work day after the system has been powered up for awhile.


62. Thank goodness for the new carpeting in your office because you fell out of your chair when your boss finally said you could upgrade your workstation from NT to Windows 2000. After the 243 request, you were beginning to think he would never say yes. Now you're wondering how tough this upgrade will be? You figured there were only a few ways to mess it up. What are they? (Choose all that apply)

A. Verify that the computer's CMOS is set to boot from CD
B. Launch the installation program from within Windows NT
C. Create and use the Windows 2000 boot floppies with the Windows 2000 CD
D. Create and use the Windows 2000 boot floppies with the Windows NT CD
E. Create and use the Windows NT boot floppies with the Windows 2000 CD
F. Create and use a DOS boot disk with CD support to install from the Windows 2000 CD

>> !
Answer: D & E

You must create the installation disks from the CD of the OS you are trying to install. There are many ways to upgrade from Windows NT to Windows 2000 including:

-Booting from the Windows 2000 CD
-Launching the installation program from within Windows NT
-Creating and using the Windows 2000 boot floppies
-Creating and using a DOS boot disk with CD support in conjunction with the Windows 2000 CD


63. You want to install a new printer on one of your older systems. The computer has USB ports but when you the plug the printer in, nothing is detected. You know the printer is fine because you just stole, I mean borrowed, it from work. What might be causing this anti-social behavior?

A. The machine needs to be rebooted to recognize the devices
B. USB is not PnP compatible, the device must be manually specified
C. Windows 95a is being used on the system
D. The devices are faulty

>> !
Answer: C

In this day and age it's hard to imagine anyone is still running Windows 95a on a system. USB ports didn't show up until around 1997 and were not supported in Windows 95a. Windows 95b had a patch that you could download to make it work. USB is fully supported by Windows 98, Windows ME and Windows 2000.


64. Your dimwitted brother-in-law has been on your computer again and something is very, very wrong. Once again you find yourself in need of the recovery console. Which of the following options are available when you boot to the Recovery Console in Windows 2000? (Choose all that apply)

A. The ability to create disk partitions
B. The ability to delete disk partitions
C. The ability to create users
D. The ability to delete users
E. The ability to change user passwords
F. The ability to create groups
G. The ability to delete users
H. The ability to modify the membership of groups
I. The ability to repair the MBR
J. The ability to start and stop services
K. The ability to enable and disable devices

>> !
Answer: A, B, I & J

When booting Windows 2000, one of the options you can select from the F8 menu is the Recovery Console. It is designed to allow you repair serious system errors and includes a number of commands that can be used to that end. If Windows 2000 will not boot to the graphical user interface, but can be booted to the F8 menu, you may still have a chance to repair the system thanks to this console. http://www.microsoft.com/WINDOWS2000/techenthusiast/tricks/administration/recoveryconsole.asp


65. These "rolling black outs" are really starting to get irritating. They seem to only be rolling over you and your poor computer. You're getting tired of the snippy little note from Microsoft that says if you don't want to see this message again, shut down properly next time. If only you could! Not only is Windows automatically running a SCANDISK, half the time the system is coming up in Safe Mode. Which two of the following are used to generate Safe Mode in Windows 95/98/ME? (Choose all that apply)

A. USER.D__
B. USER.BAK
C. USER.DA0
D. SYSTEM.D__
E. SYSTEM.BAK
F. SYSTEM.DA0

>> !
Answer: C & F

You usually boot up in safe mode if your machine wasn't shut down properly. In that case, just reboot and you're fine. Minimal registry settings are loaded during a safe mode reboot, such as ones from the registry files above. The registry is what initializes drivers. Because minimal registry settings are loaded, only core drivers that are absolutely necessary for the operating system to function are loaded. http://www.techweb.com/encyclopedia/defineterm?term=Win%20Safe%20Mode


66. Your spouse drags you to an "Earth Day" celebration. You had no idea there were that many pairs of Birkenstock sandals in the whole world. (FYI: "Birkenstock" is listed in the MS default spell checker, that tells you everything you need to know about Microsoft). You learn two things while there - Recycling good, Republicans evil. With that in mind, which of the following will place files in the recycle bin after deleting them? Choose all that apply)

A. DEL.EXE when used from the command prompt
B. DELETE.EXE when used from the command prompt
C. DEL.EXE /R when used from the command prompt
D. DELETE.EXE /R when used from the command prompt
E. Windows Explorer
F. ERASE.EXE when used from the command prompt
G. RMFILE.EXE when used from the command prompt
H. RECYCLE.EXE when used from the command prompt
I. My Computer

>> !
Answer: E & I

The recycle bin is the friend of the inexperienced end user. By default, it is where Windows sends any delete requests from within the Windows graphical environment. This includes both Windows Explorer and My Computer. The recycle bin only applies to things on the hard drive. If you tell Explorer or My Computer to delete something off a floppy or Zip drive it is gone. Here's a handy tip. If you hold down the shift key while hitting the delete key you will bypass the recycle bin and permanently delete the item.


67. When you get a new computer you're like a little kid around the holidays. For grins and giggles, you've decided to set up a hardware profile for your laptop to boot with when it is not connected to the network. Where is this done in Windows 2000?

A. Control Panel => Add/Remove Software
B. Control Panel => System
C. Control Panel => Licensing
D. Control Panel => Profiles
E. Control Panel => Add/Remove Hardware

>> !
Answer: B

You can make this happen in Control Panel => System. It is fairly common to have multiple profiles on a laptop, particularly if you have a docking station or if you travel a great deal. Different profiles can be established to turn on or off certain services and/or devices automatically. This can reduce annoying error messages when you are not connected to the network, or when you computer is not docked. http://www.techweb.com/encyclopedia/defineterm?exact=1&term=hardware%20profile


68. The network administrator is out to lunch and has given you specific orders to not touch anything while he's gone. Yeah, like that's going to stop you. This is so easy, and you've done it a hundred times. You would like to copy a user's profile to another user account. Where is this done in Windows 2000?

A. Control Panel => System
B. Control Panel => Add/Remove Hardware
C. Control Panel => Add/Remove Software
D. Control Panel => Licensing
E. Control Panel => Profiles

>> !
Answer: A

Control Panel => System. Before the paramedics put the paddles on the chest of the network administrator -- who walked in while you were sitting at his console -- he finally speaks. "If you broke anything, you'll need the paramedics not me." System Properties can also be reached by right clicking on My Computer on the desktop and selecting Properties. Once the window is open, click on the User Profiles tab, select the profile you wish to copy, and click on the Copy To button. http://www.techweb.com/encyclopedia/defineterm?term=control+panel


69. You decided to impress your young co-workers with your command line skills. You ask one of the young pups, "When booted to a command prompt, which of the following can be used to edit and save text files?"

A. Text
B. Edln
C. Edit
D. Type
E. Notepad

>> !
Answer: C

Edit is a command line tool that can be used to edit text files. Type is a similar tool that can be used to display but not edit files. Edlin is an antique left over from early DOS and was a single line editor. Notepad is a graphical utility and is not used from the command prompt.


70. One of the dreaded end users at your office thinks they may have accidentally erased a file on their computer. You're pretty sure they did something stupid because now their NT Workstation won't boot. Help Desk 101, start at the beginning and eliminate possibilities. Which of the following files are required to be present in order for Windows NT to boot successfully? (Choose all that apply)

A. NTOSKRNL.EXE
B. NTOSKRNL.CMD
C. NTLDR
D. NTLDR.SYS
E. BOOT.INI
F. WINNT.EXE
G. WINNT32.EXE
H. CONFIG.SYS

>> !
Answer: A, C & E

Windows NT requires the following files to be present in order to boot successfully: NTOSKRNL.EXE, NTLDR, BOOT.INI. NTBOOTDD.SYS might also be required if the system boots from a SCSI controller with the BIOS disabled. These same files can be placed on a floppy disk that has been formatted from within Windows NT to create a Windows NT boot disk for the system.


71. A week ago you downloaded a, let's say, "questionable", program from the Internet and installed it on your machine. Now, every time you boot your system the program opens. This could very embarrassing if your boss happened to be walking into the room as it loaded. You don't want the program to open but would like it to remain on your system, what can you do? (Choose all that apply)

A. Check the Startup folder to ensure there isn't a shortcut to the application in it
B. Check for an entry for the program in the START.INI file
C. Check for an entry for the program in the SYSTEM.INI file
D. Check for an entry for the program in the WIN.INI file
E. Check the system's registry to ensure that it is not set to automatically launch the program
F. Check for an entry for the program in the CONFIG.SYS file
G. Check for an entry in the AUTOEXEC.SYS file

>> !
Answer: A, D & E

Software writers often can't imagine anyone would want to wait to see their little masterpiece and they put these self-loading features into their programs. Most will put it in the Startup folder, evil ones will add in the WIN.INI file but the real turkeys will put it in the Registry where only the most computer savvy will be able to locate and remove it. In many cases the program has a configuration check box that governs this behavior and you don't need to search in any of these places to prevent it from launching when the computer starts. The only one you might stumble on here is the START.INI. Despite it's name, it won't start anything until you tell it to.


72. Once again you've been prowling garage sales and came up with a dandy modem for only a buck. You are preparing to install it in your Windows 2000 system when you discover there may be a problem. The device is not on the Hardware Compatibility List (HCL). Which of the following should you have available in case you are prompted for it?

A. The modem's registration code
B. The modem's hardware emulation type
C. The driver diskette provided by the manufacturer
D. The modem's top speed
E. The modem's supported compression and error correction protocols

>> !
Answer: C

If you buy something that isn't on the HCL, or Hardware Compatibility List, you're running a risk. At the very least you had better have the manufacturer's drivers on a disk when you get ready to install it. If you're smart you'll save your receipt and only buy from stores with generous return policies. The HCL is designed to let technicians know which devices have been rigorously tested for compatibility with the operating system. Each Microsoft operating system has it's own HCL.


73. "Doesn't work well with others." You've seen that on every job evaluation you ever had. Now the same can be said for one of your network printers. Your Windows system has File and Print Sharing enabled, but you cannot access a printer that is installed on the system from across your network. Which of the following is most likely the problem?

A. You do not have the proper permissions set to access the printer
B. You do not have the printer shared
C. The printer is designed for home use and cannot be shared on a network
D. You need to install the correct network print server software on your Windows computer

>> !
Answer: B

File and Printer Sharing enables other users to access resources on a Windows 98 system. Simply enabling File and Printer Sharing isn’t enough. If the process stopped there, all of the computer’s resources would be available on the network, which is an unacceptable security risk. In order for a folder or printer to be accessible from across the network, it must be shared. This ensures that only specific resources are accessible from across the network.


74. You have just arrived at a user's desk and found him sniveling in the corner sucking his thumb. The dispirited end user just keeps muttering, "I didn't break it, I didn't break it." The problem looks pretty simple but you need to quickly determine what operating system they are running. The desktop looks like it could be Windows 95, 98, or NT. Which of the following steps will you do?

A. You will right click on My Computer and select Properties
B. You will right click on My Computer and select Manage
C. You will right click on the Desktop and select Properties
D. You will right click on the Desktop and select Manage
E. You will right click on the Taskbar and select Properties.
F. You will right click on the Taskbar and select Help.

>> !
Answer: A

Right click My Computer then select Properties. This will not only give you the operating system but a wealth of other information including Device Manager that will tell everything that is installed on the computer. A simpler way would be to click on the Start button. The operating system version will be displayed along the left edge of the Start menu.


75. You believe in good dental hygiene and you also believe in proper system maintenance. Because of this you regularly run SCANDISK and Disk Defragmenter. Recently, Disk Defragmenter has been locking up, but none of your other diagnostic utilities have been able to detect any problems with the system. Which of the following is most likely the cause of the problem?

A. Your Windows system files have become corrupt
B. Your master boot record has become corrupt
C. Your system has too many files stored in the root of the hard drive
D. Your History folder contains URL’s with more than 256 characters in them

>> !
Answer: D

The most common problem with a defrag program is you forget to turn something off (screen saver, anti-virus, etc) and it keeps starting over again whenever a background program starts running. However, many versions of Disk Defragmenter cannot handle names with more than 256 characters in them. Although it is virtually impossible for them to encounter a file name larger than that, it is possible for a URL to exceed it. Generally, this will lock it up.


76. The other guys in the hub room helped you back up to your feet. You had fainted when your boss, the cheapest man to ever live, told you you could install Windows 2000 on the network. Which of the following can be used to view your statically configured IP address in Windows 2000? Choose all that apply)

A. IPCONFIG /ALL
B. IPCONFIG
C. Start => Settings => Network and Dialup Connections => Local Area Connection => Properties => Internet Protocol => Properties
D. Right click My Network Places => Properties => Local Area Connection => Properties => Internet Protocol => Properties

>> !
Answer: A, B, C & D

All of these answers are valid ways of determining a statically configured address on a Windows 2000 computer. Only IPCONFIG will display a DHCP (dynamically assigned) address.


77. When booting up a few moments ago, Windows 98 detected that the registry was corrupt. Your co-worker panics and starts breathing into a paper sack, but you remain calm. What happened next?

A. The system crashed
B. The system rebooted and asked for the emergency restore disk
C. The system automatically restored a backup of the registry
D. The system automatically ran REGFIX.EXE and corrected the problem

>> !
Answer: C

You are wise beyond your years. You not only saved a registry backup, you also activated the auto restore feature. To do this you selected Options => Job => Advanced and checked the Backup Windows Registry box. Your system automatically restored itself to the saved Registry backup. The downside is that the registry will be restored to the exact state it was in at the time you save it. You will lose any changes that may have been made since your last back up.


78. You hate having the boss breathing down your neck and watching your every keystroke as you work on a critical document. Before going to the meeting, you saved the file that you were working on to a network drive. When you get back to your desk, your boss nearly had a stroke when he saw a file not found error while you were attempting to access it. Which of the following is the most likely reason?

A. You have been disconnected from the network drive you saved it on
B. The file was not properly saved
C. The computer you saved it on has crashed
D. It has been erased

>> !
Answer: A

Most likely you had mapped a network drive to a share on a network server and it has become disconnected. Often, a user's profile or login script makes these connections. If it is no longer available but was a persistent mapping, it can be reconnected manually or by logging out and back in.


79. "How much was our email postage bill last month?" You look at your boss trying to gauge if he's serious or as technically challenged as you've always suspected. You realize he's being serious so you figure its time to explain the basics of email to him. You figure you'll start at the beginning. Which of the following protocols is used to send email?

A. SMTP
B. SNTP
C. FTP
D. NNTP
E. HHTP
F. POP3

>> !
Answer: A

SMTP or, Simple Mail Transfer Protocol, is the standard e-mail protocol for sending email on the Internet. SMTP was originally designed for only ASCII text but with MIME, or Multipurpose Internet Mail, non-text files can be sent as well.


80. You couldn't believe some of the prices at the computer show. You picked up a 20 GIG hard drive for only $3! Unfortunately when you got home and tried to format it, you received an error telling you that sector 0 is bad. Which of the following is the most likely reason for the error?

A. The drive is not compatible with your system
B. You do not have the correct cable attached to the drive
C. The drive is incorrectly set as Master
D. There is an unsupported partition size or type on the disk
E. The drive is bad
F. The cable to the drive is reversed
G. The drive is incorrectly set as Slave

>> !
Answer: E

Tip of the Day: Never buy anything used at a computer show that you don't see boot or operate. If you are certain that the hard drive is connected correctly, then hopefully you didn't buy any Florida real estate from this guy because it's probably under water. You bought a bad drive.


81. For five years your boss has refused to upgrade his computer. "If it ain't broken, don't fix it," he would say. What he really means is "I'm a cheapskate and I'm paying you to keep this technical stuff running." How can a printer be located on a Windows network from a Windows 95 computer?

A. A printer can be located by protocol
B. A printer can be located by type
C. A printer can be located by NetBIOS name
D. A printer can be located by a printer number
E. A printer can be located by model
F. A printer can be located by NBDNS name

>> !
Answer: C

A key networking protocol in Windows networks is NetBIOS. NetBIOS computers are identified by unique 15-character names and periodically broadcast their names over the network so that users can find them using Network Neighborhood or My Network Places.


82. Which mouse action copies an object to another location?

A. Ctrl+drag and drop
B. Shift+drag and drop
C. Shift+Ctrl+drag and drop
D. Click+drag and drop

>> !
Answer: A


83. Which tool enables a user to diagnose a problem remotely, rather than having to be onsite?

A. System Policy Editor
B. System Monitor
C. Net Watcher
D. Register Editor

>> !
Answer: B


84. To check for upper memory area conflicts at system startup, which of the following commands would you use?

A. win /d:x
B. win/ d:f
C. win /d:v
D. Press F8

>> !
Answer: D


85. The purpose of ScanDisk is to:

A. File a file quickly
B. Find and correct hard disk errors
C. Defragment the file allocation tables
D. Prepare for a Disk Defrag program

>> !
Answer: B


86. High memory area is considered?

A. Everything above 1024K to the limit of the computers memory.
B. First 64K above 1024K.
C. The second 1024K of memory.
D. Everything from 1024K to 4Megs.

>> !
Answer: B


87. Command.com will run after?

A. CONFIG.SYS
B. AUTOEXEC.BAT
C. MSDOS.SYS
D. IO.SYS

>> !
Answer: A

Here's the order: IO.SYS->MSDOS.SYS->CONFIG.SYS (if present) ->COMMAND.COM->AUTOEXEC.BAT (if present).


88. CONFIG.SYS is a text file which contains a series of commands to configure your computers hardware components so MSDOS and applications can use them.

A. True
B. False

>> !
Answer: A


89. Most computer users are ______ but as a PC service technician all they want you to do is repair their computer system.

A. Technical
B. Non-Technical
C. Computer Literate
D. Understanding

>> !
Answer: B


90. In DOS, which command is used to determine which IRQ's are currently assigned?

A. MEM /P
B. MEM /TSR
C. MEM /C
D. MSD

>> !
Answer: D

In Windows 95, the Device Manager can be used to display IRQ and other resource usage such as PORTS.


91. Which of the following statements are required to run games which use Expanded memory? (Choose all that apply)

A. DEVICE=HIMEM.SYS in the CONFIG.SYS file
B. DOS=HIGH in the CONFIG.SYS file
C. DOS=UMB in the CONFIG.SYS file
D. DEVICE=EMM386.EXE NOEMS in the CONFIG.SYS file
E. DEVICE=EMM386.EXE RAM in the CONFIG.SYS file

>> !
Answer: A, C & E

Example Config.sys to use games:
Device=c:\dos\HIMEM.SYS
DOS=UMB
Device=c:\dos\Emm386.exe RAM


92. You would like to create a bootable disk without destroying the data currently on the disk. Which command should be used?

A. Format a: /s
B. System a:
C. Sys a:
D. Boot a:

>> !
Answer: C

The Sys.com command is available in both DOS and Windows 95. In Windows 95 the best method of use is to create and use a Windows 95 Startup Disk.


93. You would like to create a blank bootable disk. Which command should be used?

A. Format a: /s
B. System a:
C. Sys a:
D. Boot a: /f

>> !
Answer: A

The format.com command is available in both DOS and Windows 95.


94. To hide the file FOO.BAR, which of the following commands should be used?

A. Attrib -h foo.bar
B. Attrib +h foo.bar
C. Fdisk +h foo.bar
D. hide foo.bar

>> !
Answer: B

A DOS or Windows 95 file has 4 attributes R-Read Only, A-Archive, H-Hidden, S-System. These attributes can be changed using the Attrib command from the DOS prompt. File properties can also be changed from Windows 95 or Windows 3.1 by accessing the files properties. A read only file cannot be deleted by the DOS commands although Windows will delete it; a hidden file cannot be seen by DOS commands but Windows 95 can see it if properly specified. The System attribute notifies programs and utilities that the files should NOT be moved or changed.


95. To display the hidden file FOO.BAR to the console, which of the following commands should be used?

A. Attrib h foo.bar
B. Attrib +h foo.bar
C. Attrib -h foo.bar
D. Attrib foo.bar

>> !
Answer: D

A DOS or Windows 95 file has 4 attributes R-Read Only, A-Archive, H-Hidden, S-System. These attributes can be changed using the Attrib command from the DOS prompt. File properties can also be changed from Windows 95 or Windows 3.1 by accessing the files properties. A read only file cannot be deleted by the DOS commands although Windows will delete it; a hidden file cannot be seen by DOS commands but Windows 95 can see it if properly specified. The System attribute notifies programs and utilities that the files should NOT be moved or changed.


96. Which command(s) can be used in Windows 95 or DOS to perform a surface scan of the C: drive?

A. CHKDSK C: /F
B. CHKDSK C:*.*
C. SCANDISK C:
D. FDISK C:

>> !
Answer: C

In Windows 95, ScanDisk is a full-featured disk analysis and repair program. ScanDisk runs automatically when you start Windows 95 Setup. After Windows 95 is installed, ScanDisk can be used on both uncompressed and compressed drives. ScanDisk checks compressed drives created with compression software from other vendors, but it checks these drives as if they are uncompressed. ScanDisk can also provide a detailed analysis of compression structures on DoubleSpace or DriveSpace drives.


97. Which command(s) can be used in DOS to fix lost allocation units and clusters?

A. CHKDSK C: /F
B. CHKDSK C:*.*
C. SCANDISK C:
D. FDISK C:

>> !
Answer: A & C

In Windows 95, ScanDisk is a full-featured disk analysis and repair program. ScanDisk runs automatically when you start Windows 95 Setup. After Windows 95 is installed, ScanDisk can be used on both uncompressed and compressed drives. ScanDisk checks compressed drives created with compression software from other vendors, but it checks these drives as if they are uncompressed. ScanDisk can also provide a detailed analysis of compression structures on DoubleSpace or DriveSpace drives.


98. In DOS, you would like to use SMARTDRV to cache your CD-ROM drive. Which of the following must be entered first in the AUTOEXEC.BAT?

A. SMARTDRV.EXE
B. DEVICE=SMARTDRV.EXE
C. MSCDEX
D. DEVICE=MSCDEX

>> !
Answer: C

For Windows 95, the 32-bit protected-mode CDFS provides improved CD-ROM access performance over the real-mode MSCDEX driver in DOS and Windows 3.1. This CDFS driver replaces the 16-bit real-mode MSCDEX driver, and it features 32-bit protected-mode caching of CD-ROM data. If MSCDEX is specified in the user’s AUTOEXEC.BAT when Windows 95 is installed, the 32-bit CDFS driver is used instead.


99. In DOS, which of the following is required to be loaded prior to using the "prompt" command to use advance screen functions such as color changes?

A. MSCDEX.EXE in the AUTOEXEC.BAT
B. SCREEN.SYS
C. ANSI.SYS in the CONFIG.SYS
D. MONITOR.SYS
E. ANSI.SYS in the AUTOEXEC.BAT

>> !
Answer: C

ANSI.SYS is a screen control device driver which is used to enhance standard DOS features. It is used for ASCII text screens and has no real purpose or use in the Windows 3.x or 95 environment.


100. In DOS, which of the following utilities is utilized to optimize memory?

A. SMARTDRV
B. MEMMAKER
C. MEM
D. FDISK

>> !
Answer: B

Even in Windows 95, you can still run the MEMMAKER utility provided with MS-DOS 6.2x to load real-mode drivers in the upper memory blocks (UMB). This utility is available in the OTHER\OLDDOS directory on the Windows 95 compact disc.


101. Which of the following commands would be used to ensure a file cannot be changed?

A. ATTRIB +R
B. CHKDSK R
C. ATTRIB -R
D. SCANDISK +R

>> !
Answer: A

A DOS or Windows 95 file has 4 attributes R-Read Only, A-Archive, H-Hidden, S-System. These attributes can be changed using the Attrib command from the DOS prompt. File properties can also be changed from Windows 95 or Windows 3.1 by accessing the file's properties. A read-only file cannot be deleted by the DOS commands although Windows will delete it; a hidden file cannot be seen by DOS commands but Windows 95 can see it if properly specified. The System attribute notifies programs and utilities that the files should NOT be moved or changed.


102. TSR refers to which of the following:

A. Tally Sum Resister
B. Terminate and Stay Resident Program
C. Total Static Resistant

>> !
Answer: B

TSR stands for terminate-stay-resident. Windows 95 uses a new system file, IO.SYS that replaces the MS-DOS system files (IO.SYS and MSDOS.SYS). This real-mode operating system file contains the information needed to start the computer. Your computer does not need CONFIG.SYS and AUTOEXEC.BAT to start the Windows 95 operating system (although these files are preserved for backward compatibility with certain applications and drivers). The Windows 95 IO.SYS file is automatically renamed to WINBOOT.SYS if you start the computer using your previous operating system.


103. Your users complain that they have a problem with disk space. Upon examination you notice that there are hundreds of .TMP, or temporary files, which exist in the C:\TEMP directory. What causes this problem?

A. The user is not starting Windows 3.1 properly
B. The user is not properly shutting down Windows 3.1
C. A program is causing a general protection fault which the user continues to run
D. Windows must be reloaded

>> !
Answer: B

This problem will happen for both Windows 3.x and Windows 95.


104. Which of the following is used to process commands for a DOS 6.2 prompt?

A. MSDOS.SYS
B. CONFIG.SYS
C. COMMAND.COM
D. AUTOEXEC.BAT

>> !
Answer: C


105. To make the file FOO.BAR read only, which of the following commands should be used?

A. Attrib -R foo.bar
B. Attrib +R foo.bar
C. Fdisk +R foo.bar
D. Protect foo.bar

>> !
Answer: B

A DOS or Windows 95 file has 4 attributes R-Read Only, A-Archive, H-Hidden, S-System. These attributes can be changed using the Attrib command from the DOS prompt. File properties can also be changed from Windows 95 or Windows 3.1 by accessing the file's properties. A read only file cannot be deleted by the DOS commands although Windows will delete it; a hidden file cannot be seen by DOS commands but Windows 95 can see it if properly specified. The System attribute notifies programs and utilities that the files should NOT be moved or changed.


106. DOS represents which of the following type of operating system?

A. 8 bit
B. 16 bit
C. 32 bit
D. 64 bit

>> !
Answer: B


107. You install a new hard disk on your computer. After using the FDISK DOS utility to partition the disk, you wish to prepare it for use and also transfer the system files to make it bootable. Which of the following will you use to perform this task?

A. FORMAT C:
B. FDISK C: /S
C. FORMAT C: /S
D. SYS C:
E. FDISK /MBR

>> !
Answer: C

In Windows 95, the Fdisk and Format utilities can be used to partition and format disks. They behave exactly as their counterparts in MS-DOS versions 6.x. Also, you can use a graphical form of Format in Windows 95 Explorer.


108. What command is used to repair the master boot record on a fixed disk drive?

A. SYS
B. FDISK
C. FORMAT
D. SCANDISK

>> !
Answer: B

The FDISK /MBR command can be used to rewrite the Master Boot Record and remove potential errors or viruses which may destroy data and prevent the machine from booting.


109. The "SYS" command copies which of the following files?

A. IO.SYS, MSDOS.SYS, COMMAND.COM, DBLSPACE.BIN
B. IO.SYS, MSDOS.SYS, CONFIG.SYS, AUTOEXEC.BAT
C. IO.SYS, CONFIG.SYS, CONFIG.SYS, DBLSPACE.BIN
D. MSDOS.SYS, CONFIG.SYS, AUTOEXEC.BAT, DBLSPACE.BIN

>> !
Answer: A

Windows 95 uses the same names for the real-mode operating system files as MS-DOS does (IO.SYS, MSDOS.SYS, and COMMAND.COM). However, to support dual-boot, the MS-DOS versions of these files are renamed with a .DOS extension when you install or start Windows 95 after having started the computer with the previous operating system.


110. Which of the following function keys allows one to "step" through the DOS system startup files?

A. F1
B. F3
C. F5
D. F8
E. SHIFT

>> !
Answer: D

F8 can be used for both DOS and Windows 95 to perform an interactive boot. The Interactive boot allows one to step through each of the boot process steps. With DOS you can step through CONFIG.SYS and AUTOEXEC.BAT and with Windows 95 you can access the BOOT Menu by pressing F8. It is a great troubleshooting tool.


111. Which of the following function keys allows one to "bypass" the DOS system startup files? (Choose all that apply)

A. F1
B. F3
C. F5
D. SHIFT

>> !
Answer: C & D

F5 OR processes a "Clean Start" and bypasses the startup files. It, by defaul,t will set the Prompt to $p$g and the Path to C:\DOS. F8 allows an interactive boot and the ability to bypass startup files.


112. Which of the following function keys allows one to "recall" the previously entered DOS command?

A. F1
B. F3
C. F5
D. F8
E. SHIFT

>> !
Answer: B

Beyond pressing F3, Windows 95 provides DOSKEY to give you quick access to your most recent commands and enable you to assign frequently used commands to a single keystroke. DOSKEY is also available for character-based programs that accept buffered input.


113. You have just finished configuring a user's PC with the proper drivers and software to connect to the Internet through the company's network. What command should be used to verify the user's Internet connection?

A. NET USE
B. PING
C. ATTRIB
D. NET DIAG
E. WINIPCFG

>> !
Answer: B

The "PING" command verifies connections to remote host or hosts by sending Internet Control Message Protocol (ICMP) echo packets to the host and listening for echo reply packets. During the "PING" process, the "PING" command will wait for up to 1 second for each packet sent and then prints the number of packets transmitted and received to the tester's screen. Also note that each received packet is validated against the transmitted message. By default, four echo packets containing 64 bytes of data (a periodic uppercase sequence of alphabetic characters) are transmitted. You can use the "PING" utility to test both the host name and the IP address of the host. If the IP address is verified, but the host name is not, you may have a name resolution problem. In this case, be sure that the host name you are querying is in either the local HOSTS file or in the DNS database.


114. You have just finished configuring a user's PC with the proper drivers and software to connect to the Internet through the company's network. What command should be used to verify the user's local PC TCP/IP configuration?

A. IPCONFIG
B. PING
C. ATTRIB
D. NET DIAG
E. WINIPCFG

>> !
Answer: E

The IP Configuration utility (WINIPCFG) is a troubleshooting utility that displays all current TCP/IP network configuration values for any computer running Microsoft TCP/IP. Network configuration values include the current IP address allocated to the computer and other useful data about the TCP/IP allocation.


115. TCP/IP uses DNS for which of the following?

A. Resolve Domain names to IP addresses
B. Resolve IP addresses to MAC addresses
C. Resolve Domain names to MAC addresses
D. Resolve MAC addresses to IP addresses

>> !
Answer: A

DNS provides a distributed database that contains a hierarchical naming system for identifying hosts on the Internet. The DNS database is a tree structure called the domain name space, where each node or domain is named and can contain subdomains. The domain name identifies the domain’s position in the database in relation to its parent domain, with a period (.) separating each part of the name for the network nodes of the DNS domain.


116. Which of the following commands would be used to MOST efficiently delete a directory from the DOS command prompt?

A. RMDIR
B. DELTREE
C. DEL
D. FORMAT
E. FDISK

>> !
Answer: B

To make it easier to delete files and directories, copy the Windows 95 version of DELTREE.EXE to the boot drive.


117. The "DEFRAG" command should be used on which type of PC environment?

A. PC's running MS-DOS only
B. PC's running MS-DOS and Windows 95
C. PC's running Windows 3.1 and MS DOS
D. PC's running Windows 3.1 and Windows 95

>> !
Answer: C

Defrag should NEVER be used on a Windows 95 machine. In Windows 95 "Disk Defragmenter" should be used to optimize a drive.


118. The DOS "DEFRAG" does which of the following? (Choose all that apply)

A. Repair cross-linked files
B. Make files contiguous
C. Consolidate free space
D. Detect lost clusters

>> !
Answer: B & C

Number one, DO NOT run the DOS Defrag command if your system has Windows 95 loaded or you will lose your long file names! Over time, as programs read from and write to a hard disk, information stored on the disk can become fragmented, that is, files are stored in noncontiguous sectors. Fragmentation doesn’t affect the validity of the information so the files are still complete when they are opened. Note that it takes much longer for the computer to read and write fragmented files than it does for unfragmented files.


119. "Virtual Memory" results in which of the following?

A. Unimportant and unnecessary
B. Faster performance for most applications
C. Less total memory available for applications
D. More total memory available for applications

>> !
Answer: D

Windows 95 uses a file on a hard disk called a virtual-memory swap file or paging file. With the virtual memory manager under Windows 95, some of the program code and other information are kept in RAM while other information is swapped temporarily to virtual memory. When that information is required again, Windows 95 pulls it back into RAM and, if necessary, swaps other information to virtual memory. This activity is invisible, although you might notice that your hard disk is working. The resulting benefit is that you can run more programs at one time than the computer’s RAM would usually allow. Swapping from disk to RAM can be monitored through System Monitor locally or remotely using the remote registry service on a network.


120. "Virtual Memory" would be summarized as which of the following?

A. Simulates RAM on physical disk storage
B. Simulates physical disk storage in RAM
C. Increase amounts of physical RAM available
D. Increase amount of disk storage available

>> !
Answer: A

Windows 95 uses a file on a hard disk called a virtual-memory swap file or paging file. With the virtual memory manager under Windows 95, some of the program code and other information are kept in RAM while other information is swapped temporarily to virtual memory. When that information is required again, Windows 95 pulls it back into RAM and, if necessary, swaps other information to virtual memory. This activity is invisible, although you might notice that your hard disk is working. The resulting benefit is that you can run more programs at one time than the computer’s RAM would usually allow. Swapping from disk to RAM can be monitored through System Monitor locally or remotely using the remote registry service on a network.


121. As your system boots, the HIMEM.SYS is testing the memory and issues the error 3CDF:145DFCAB. This indicates which of the following?

A. Bad High Memory
B. Bad Virtual Memory
C. Bad Extended Memory
D. Bad Expanded Memory

>> !
Answer: C

HIMEM.SYS is an installable device driver that allows MS-DOS programs to access extended memory using Extended Memory Specifications (XMS).


122. Which of the following commands would be used in DOS to display the memory utilization by program?

A. MEM /C
B. MEM /P
C. CHKDSK
D. HIMEM

>> !
Answer: A

MEM /C classifies programs by memory usage. Lists the size of programs, provides a summary of memory in use, and lists largest memory block available.


123. Which of the following commands would be used in DOS to display the memory utilization in general?

A. SCANDISK
B. MEM
C. CHKDSK
D. HIMEM

>> !
Answer: B

MEM /C classifies programs by memory usage. Lists the size of programs, provides a summary of memory in use, and lists largest memory block available. MEM by itself gives general memory information.


124. In DOS, which of the following refers to the "User Interface" component?

A. MSDOS.SYS
B. IO.SYS
C. COMMAND.COM
D. CONFIG.SYS
E. AUTOEXEC.BAT

>> !
Answer: C

The command shell COMMAND.COM is used by DOS to process commands. It is loaded as part of the boot and also is responsible for loading DOS programs into memory.


125. In the CONFIG.SYS file, which of the following statements should appear first?

A. DOS=HIGH,UMB
B. DEVICE=C:\WINDOWS\HIMEM.SYS
C. DEVICE=C:\WINDOWS\EMM386.EXE NOEMS
D. LASTDRIVE=Z
E. BUFFERS=40

>> !
Answer: B

The extended memory driver needs to be loaded first. Himem.sys is an extended-memory manager which manages a computer’s extended memory, including the HMA, so that no two applications or device drivers use the same memory at the same time. This device driver must be loaded by a device command in CONFIG.SYS and must come before any commands that start applications or device drivers that use extended memory.


126. Loading the command "SMARTDRV /X" from the Autoexec.bat file will result in which of the following? (Choose all that apply)

A. A 2MB cache with Write Cache enabled
B. A 2MB cache with Write Cache disabled
C. A 2MB cache with Read Cache disabled
D. A 2MB cache with Read Cache enabled

>> !
Answer: B & D

The /X setting with SMARTDRV refers to disabling the Write-Behind-Cache. Write behind cache allows the OS to hold data in memory allowing the program to think the data has been committed to disk. Although this may increase performance, it is not recommended because if the system fails, data could be lost.


127. The "Mouse.sys" file would be loaded from which startup file?

A. Autoexec.bat
B. Msdos.sys
C. Config.sys
D. Io.sys

>> !
Answer: C

Anything with a SYS extension would be loaded as a device driver in the CONFIG.SYS file using a DEVICE= statement. In this case the statement DEVICE=C:\DOS\MOUSE.SYS would be added to the CONFIG.SYS. Recall that CONFIG.SYS is an ASCII text file and can be edited by the qualified support person.


128. The "Mouse.com" file would be loaded from which startup file?

A. Autoexec.bat
B. Msdos.sys
C. Config.sys
D. Io.sys

>> !
Answer: A

Programs that end with "COM, EXE, or BAT" are generally loaded from the AUTOEXEC.BAT file. These files are programs which mean they require COMMAND.COM to be loaded prior to being loaded themselves. Recall that Autoexec.bat is an ASCII text file and can be edited by the qualified support person.


129. The "DOSKEY" driver would be loaded from which startup file?

A. Autoexec.bat
B. Msdos.sys
C. Config.sys
D. Io.sys

>> !
Answer: A

DOSKEY.COM is a program. Programs that end with "COM, EXE, or BAT" are generally loaded from the AUTOEXEC.BAT file. These files are programs which mean they require COMMAND.COM to be loaded prior to being loaded themselves. Recall that Autoexec.bat is an ASCII text file and can be edited by the qualified support person.


130. The "SMARTDRV" file would typically be loaded from which startup file?

A. Autoexec.bat
B. Msdos.sys
C. Config.sys
D. Io.sys

>> !
Answer: A

SMARTDRV.EXE is a program. Programs that end with "COM, EXE, or BAT" are generally loaded from the AUTOEXEC.BAT file. These files are programs which mean they require COMMAND.COM to be loaded prior to being loaded themselves. Recall that Autoexec.bat is an ASCII text file and can be edited by the qualified support person. Smartdrv.exe can also be loaded as a device driver from the Config.sys but will not generally increase performance for IDE and will not replace the requirement that SMARTDRV is loaded from AUTOEXEC.BAT. It is simply a way to address SCSI buffering.