logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Windows 2000 Server See What Others Are Saying!
  • Question
  • You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?


  • Options
  • A. Restart the computer in safe mode. Then restart the computer again
  • B. Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command
  • C. Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command
  • D. Restart the computer by using the last known good configuration
  • E. None of above

  • Correct Answer
  • Restart the computer by using the last known good configuration 


  • More questions

    • 1. Claude Shannon described the operation of electronic switching circuits with a system of mathematical logic called:

    • Options
    • A. LISP
    • B. XLISP
    • C. Boolean algebra
    • D. neural networking
    • E. None of the above
    • Discuss
    • 2. An example of a medium-speed, switched communications service is

    • Options
    • A. Series 1000
    • B. Dataphone 50
    • C. DDD
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. A system design is said to be functionally modular if

    • Options
    • A. the system is able to handle all the function of the application
    • B. each module performs a specific function and can be developed relatively independently by programmers
    • C. the system makes extensive use of function. keys for maximum user assistance
    • D. the system is developed using structured programming through COBOL or PASCAL
    • E. None of the above
    • Discuss
    • 4. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

    • Options
    • A. True
    • B. False
    • Discuss
    • 5. A _____ is responsible for the design and control of a company's data base

    • Options
    • A. DBA
    • B. DBM
    • C. DPMA
    • D. EDP auditor
    • E. None of the above
    • Discuss
    • 6. An audit trail

    • Options
    • A. is used to make back-up copies
    • B. is the recorded history of operations performed on a file
    • C. can be used to restore lost information
    • D. All of the above
    • E. None of the above
    • Discuss
    • 7. What command is used with file named 'letter' to remove the executable permission from the user and assign read permission to the group and others?

    • Options
    • A. chmod go + x, u - x letter
    • B. chmod g - x, uo + r letter
    • C. chmod go + r, u + x letter
    • D. chmod u - x, go + r letter
    • E. None of the above
    • Discuss
    • 8. The speed at which the monitor accepts data is called:

    • Options
    • A. bandwidth
    • B. response time
    • C. interlacing
    • D. scanning
    • E. None of the above
    • Discuss
    • 9. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?

    • Options
    • A. Upgradability
    • B. Upward mobility
    • C. Universality
    • D. Upward compatibility
    • E. None of the above
    • Discuss
    • 10. Which of the following rules out the use of GO TO?

    • Options
    • A. Flowchart
    • B. HIPO-DIAGRAMS
    • C. Nassi-Shneiderman diagram
    • D. All of the above
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment