Exam 16: NTFS, Users, and Groups
Exam 1: The Path of the PC Tech30 Questions
Exam 2: Operational Procedures30 Questions
Exam 3: The Visible PC119 Questions
Exam 4: Visible Windows148 Questions
Exam 5: Visible Networks147 Questions
Exam 6: Microprocessors148 Questions
Exam 7: RAM129 Questions
Exam 8: Bios130 Questions
Exam 9: Motherboards130 Questions
Exam 10: Power Supplies120 Questions
Exam 11: Hard Drive Technologies120 Questions
Exam 12: Implementing Hard Drives120 Questions
Exam 13: Removable Media100 Questions
Exam 14: Installing and Upgrading Windows130 Questions
Exam 31: The Right PC for You150 Questions
Exam 16: NTFS, Users, and Groups120 Questions
Exam 17: Maintaining and Optimizing Windows100 Questions
Exam 18: Working With the Command-Line Interface115 Questions
Exam 19: Troubleshooting Windows90 Questions
Exam 20: Input Devices90 Questions
Exam 21: Video119 Questions
Exam 22: Local Area Networking90 Questions
Exam 23: Wireless Networking110 Questions
Exam 24: The Internet121 Questions
Exam 25: Multimedia120 Questions
Exam 26: Portable Computing120 Questions
Exam 27: Mobile Devices90 Questions
Exam 28: Printers120 Questions
Exam 29: Securing Computers89 Questions
Exam 30: Virtualization90 Questions
Exam 31: The Right PC for You90 Questions
Exam 32: The Complete PC Tech37 Questions
Select questions type
Windows enables logged-on users to create a __________ they can use if they forget a password.
(Short Answer)
4.9/5
(44)
If you have the Full Control permission on a folder and only the Read permission on a file within that folder,you will actually get the ____________________ permission on the file.
(Short Answer)
4.8/5
(41)
A user account with the ____________________ permission can give or take away permissions for other accounts.
(Short Answer)
4.8/5
(26)
Name five of the built-in groups offered in the various versions of Windows.
(Essay)
4.8/5
(37)
Which one of the following is NOT a UAC level in Windows 7?
(Multiple Choice)
4.8/5
(40)
With the ____________________ permission,you can give or take away permissions for other accounts.
(Multiple Choice)
4.8/5
(31)
If you use the System Configuration utility (msconfig)and select Disable UAC on the Tools tab,what further action is required to turn off UAC?
(Multiple Choice)
5.0/5
(36)
Strong passwords should include letters,numbers,and ____________________ symbols.
(Short Answer)
5.0/5
(34)
What are the two key data-related protection processes called?
(Short Answer)
4.9/5
(30)
What modern encryption technology is especially useful for protecting data stored on laptops?
(Essay)
4.9/5
(51)
Most often,the ____________________ account remains disabled for every version of Windows.
(Short Answer)
4.9/5
(38)
It's considered best practice to assign __________ to groups and then add user accounts to groups.
(Short Answer)
4.9/5
(47)
What is an individual record for a particular user on a single computer called?
(Multiple Choice)
4.8/5
(34)
Name the three target sharing permissions you can assign to a user account in Windows Vista.
(Essay)
4.9/5
(43)
What basic information does Windows ask you to provide in the New Group dialog box?
(Essay)
4.8/5
(35)
What are the premade folders that are accessible by everyone on a computer called in Windows XP?
(Short Answer)
4.8/5
(31)
What logon style is automatically used when a Windows XP Professional computer is joined to a domain?
(Essay)
4.8/5
(38)
List a few examples of the default subfolders in the Windows Vista Public folder.
(Essay)
4.9/5
(43)
Showing 61 - 80 of 120
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)