Home

When we delete a file it is sent to the directory called

A. Purged.sav

B. Recycle.bin

C. Deleted.sav

D. None of these

You can do it
  1. Which of the following utility can be used to create a file share
  2. Which command is used to change a FAT32 partition to NTFS without losing any data?
  3. To use netbios name resolution in TCP/IP environments, we use
  4. What is the maximum number of characters that a password may contain?
  5. We can create _____ DFS root in a single Domain Controller
  6. What is the distance limitation of Cat5 UTP?
  7. The universal groups can contain
  8. Which of the following files have the .NCF file extension?
  9. The server where active directory wers can be created create is
  10. 10 base T network is implemented by co-axial cable
  11. DHCP is used for Dynamic address allocation for win2000 networking hosts
  12. Which utility is used to determine whether Windows 2000 properly recognize a newly installed modem?
  13. Dcproms programs can be run only when the Win2000 is installed in FAT32 partition.
  14. How many Dfs links are supported by a single Dfs root in domain based Dfs root?
  15. Identify the topology and network type that uses a central hub with cables connected to workstations.
  16. What is the maximum amount of RAM recognized by Windows 2000 Server?
  17. What is the maximum number of characters that a password may contain?
  18. Which properties tab is used in a member server for local user to configure logon hours?
  19. What can be used in the place of DNS to resolve host names to IP addresses?
  20. The minimum processor speed requirement for a P.C. where Windows2000 server O.S. is to be installed
  21. Which file contains active directory database?
  22. Which piece of equipment operates at both the data-link and network layers?
  23. Dcproms programs can be run only when the Win2000 is installed in FAT32 partition.
  24. Backup operator group is found in
  25. The NTFS security is not applicable in case of network access
  26. Clipper command can be used for data encryption
  27. Can Win2000 professional become terminal service client?
  28. Which policy specifies the number of invalid attempts allowed before account is locked out?
  29. Can we use 'net use' command to share a file?
  30. What is the minimum information that you need to connect a computer on a TCP/IP network to the Internet?…