অণুজীব

hardware-networking – web-dev-net-platform – কুইজ মডেল টেস্ট অনুশীলন – 9

81. ____________________ controls the peripheries device of a computer

  1. Driver Signature checking
  2. Devices
  3. Driver
  4. Device Manager

82. ______ rules are followed by Windows Vista computers for authentication before connecting to other computers.

  1. Security Connection
  2. Connection Security
  3. Security
  4. Connection

83. The IDE interface supports a maximum of _________hard drives on a system.

  1. 6
  2. 8
  3. 4
  4. 2

84. With respect to the interface network card, what does the term 10/100 refer to?

  1. A fiber network.
  2. Megabits per second.
  3. Protocol speed
  4. Minimum and maximum server speed

85. XYZ company is facing problem as there are visitors who use the computer for a short while and have to be provided with credentials of employee. The engineer want to provide an account using which the employee’s data can’t be accessed by the visitors which method we use

  1. Guest Account
  2. Administrator Account
  3. Standard Account
  4. Temporary Account

86. The __________ Manager is a control which allows users to view the information about all the installed and connected Plug and Play devices.

  1. Control
  2. Device
  3. Driver
  4. General

87. The ______________ operation is used to create a hive file.

  1. Restore
  2. Unload
  3. Query
  4. Save

88. What is an appropriate use of a default route?

  1. to provide routing to a local web server
  2. to provide routing to a destination that is not specified in the routing table and which is outside the local network
  3. to provide routing that will override the configured dynamic routing protocol
  4. to provide routing from an ISP to a stub network

89. What is the common language that computers use to talk with one another on a network?

  1. Protocol
  2. Adapter
  3. Client
  4. Operating system

90. The XYZ company wants to choke up certain program which may access by some of the employee that may cause damage to their computer system . Which method should be used to choke up those programs

  1. Blocking specific program
  2. Restricting access to websites
  3. Bypassing Logon Screen
  4. Monitoring users activities

আমাদের কাছে থাকা লক্ষ লক্ষ মডেল টেস্ট থেকে প্রাকটিজের জন্য কিছু এখানে তুলে ধরা হল। প্রতিটি অধ্যায়ের উপরে ইশিখন.কম কুইজ চ্যালেঞ্জ এ আছে শত শত মডেল টেস্ট বার বার মডেল টেস্ট দিয়ে নিজেকে যাচাই কর এবং পুরো বাংলাদেশের সকল শিক্ষার্থীর সাথে আপনার মেধা তালিকা দেখুন। প্রশ্নে কোন প্রকার ভুল থাকলে সঠিক উত্তরসহ নিচে কমেন্ট করে জানাবেন, আমরা ঠিক করে দেবো।

Leave a Reply

স্যার, কিভাবে আপনাকে সাহায্য করতে পারি?

Click one of our representatives below

Customer Support
Customer Support

Syeda Nusrat

I am online

I am offline

Technical Support
Technical Support

Ariful Islam Aquib

I am online

I am offline