Home

Windows 2000 is based on

A. Domain model

B. Peer to peer model

C. Client server model

D. None of this

You can do it
  1. Which utility is used to determine whether Windows 2000 properly recognize a newly installed modem?
  2. What will happen if you copy a file from one folder to another with in the same ntfs partition ?
  3. The minimum processor speed requirement for a P.C. where Windows2000 server O.S. is to be installed
  4. User passwords are case sensitive
  5. Which utility is used to determine whether Windows 2000 properly recognize a newly installed modem?
  6. If we want to run Nwadmin from DOS prompt what is the command we use?
  7. In a domain we can create
  8. An Administrator account is created when you install the Windows 2000 Server.
  9. Which command is used to change a FAT32 partition to NTFS without losing any data?
  10. Which utility is used to manage disks, volumes, partitions logical drives and dynamic volumes in Windows…
  11. NTFS permissions cannot be set on individual files.
  12. Is it possible to set net work properties from control panel?
  13. Dcproms programs can be run only when the Win2000 is installed in FAT32 partition.
  14. Domain based network allows multiple domain controller in a single domain
  15. Can we put computer management utility in desktop?
  16. Profile information is stored in NTprofile.Dat file.
  17. Purge command is used to
  18. A user name cannot contain : or = character.
  19. Dcproms programs can be run only when the Win2000 is installed in FAT32 partition.
  20. What is the distance limitation of Cat5 UTP?
  21. Which command is used to change a FAT32 partition to NTFS without losing any data?
  22. 10 base T network is implemented by co-axial cable
  23. Which of the following is the IEEE specification for wireless networks?
  24. Clipper command can be used for data encryption
  25. Which folder is used to store user profiles by default?
  26. Which of the following utility can be used to create a file share
  27. Clipper command can be used for data encryption
  28. Which of the following files have the .NCF file extension?
  29. Which piece of equipment operates at both the data-link and network layers?
  30. Which of the following is a media type that is most susceptible to interference?