Nt1330 Final Exam Paper

Decent Essays
21 Which operating system doesn't support networking between computers?
a. Windows 3.1
b. Windows 95
c. Windows 2000
d. Windows NT
22Which Operating System doesn't support networking between computers?
a. Windows 3.1
b. Windows 95
c. Windows 2000
d. Windows NT
23 Which of the following does not support more than one program at a time?
a. DOS
b. Linux
c. Windows
d. Unix
24 Which of the following is not an operating system?
a. DOS
b. Linux
c. Windows
d. Oracle
25 Linux is a ------------- operating system
a. Open source
b. Microsoft
c. Windows
d. Mac
26 Which operating system can you give smallest file name?
a. Ps/2
b. Dos
c. Windows
d. Windows NT
27 Which one is not operating system? a P11
b. OS/2
c. Windows
d. Unix
28 Which of the following is not a multitasking operating system?
…show more content…
Windows
b. Linux
c. Win NT
d. DOS

29. You should choose Sleep option when
a. The computer is tired after working for the whole day
b. Vou are leaving for a very short time and want to resume you work shortly
c. When computer gets hanged frequently. Let it sleep for some time
d. You finish working and going to bed
30. The.... displays the name of every computer user on the computer
a. Wish list screen
b. Command screen
c. Welcome screen
d. None of the

Related Documents

  • Decent Essays

    It is software free, so it can run on all operating systems…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Hi Hemant, USHDCWPBTD03 and USHDCWPBTD04 we are not using at full extend. Both the servers only use for “Single Sign on Feature”. Both the servers use 2 processor each (2 + 2 = 4). I am thinking if we remove 1 process from each server (1 + 1 = 2) we end up with 2 processer, this will save us some BizTalk cost.…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The virtual machine can be part Hyper-V client found feature on control panel through programs and feature. That is type 2. Type 2 would least process because the host operation system is also process same time with virtual machine. The virtual machine also able to access full through host operation system that are approve to gain access and it has a very limit to…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 1 Study

    • 419 Words
    • 2 Pages

    Virtual Machine 2. Guest OS 3. Host OS. Most middle is the Virtual Machine. It is a method of representing a real machine using software to manage the execution of an operating system.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 354 Words
    • 2 Pages

    HIE provides the capability to electronically move clinical information among disparate healthcare information systems, and maintain the meaning of the information being exchanged. (HIMSS Dictionary of Healthcare Information Technology Terms, Acronyms and Organizations, Third Edition) 11)) 1) 1. What sorts of HIEs are there? 2. How are protection and security of patient wellbeing data guaranteed?…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The Pangu 9 jailbreak is now out for those of you running the latest iOS 9.0.2 software update. You can follow the guide for jailbreaking with Pangu 9 on every device that can run the iOS 9.0.2 firmware. You can catch that completely list available from the requirements section below. Those with anything under the iPhone 4S cannot follow this guide, just like they cannot update to any version of iOS 9. REQUIREMENTS…

    • 516 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    I have to agree with you that waterway ports are the busiest at the same time I do not believe that are the hardest to secure. Living here in Jacksonville, FL I have several ports around me. There is Jacksonville Port Authority (Jaxport) that controls three cargo terminals, a cruise terminal and an intermodal rail terminal. Blount Island (controlled by the Marines) is one terminal that I am familiar with because of the military. This facility has some of the tightest security even more than some operational bases.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2. Explain how the submission engine plan will handle submissions in other languages, including Portuguese and Mandarin. When the data is submit through the submission engine using the web form, email, Twitter, Facebook, Internet crawler and other data input, Google translate API will start the translation from the other languages using it data-driven approach of millions of multilingual documents into English, then to the target language of the user. When the source text is short, the submission will use rule-based machine translations, for better accurately on the translation. If the language does not have direct translation, Google will translate to a closely related language that maybe more spoken in that area.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Often, team members of both Apple and Microsoft convocate to ameliorate the upcoming operating system that they plan to release in a certain period of time. Many different features are added to technology each day to facilitate the use of it. For example, Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion are qualities that aid the success of an operating system. In Apple, features such as Control center, Task manager and fingerprints contribute to the success in IOS Seven. I will be discussing the advantages of Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion.…

    • 682 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1. I think that I would rather have a conversation with others in phone because it limits the chances of misinterpretations. I mostly text my friends or family because if they’re busy with something, it is just more convenient for them to check their phone and see that I texted them. Another great reason I rather text is because I come from a big family and if there was an emergency, one person’s text can be sent to everyone in my family text group. The only thing that I hate is because I can send anything with emotion in the message, so conflicts would arise.…

    • 681 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays