Home

When we delete a file it is sent to the directory called

A. Purged.sav

B. Recycle.bin

C. Deleted.sav

D. None of these

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Can we delete a folder, which is shared?
  2. To use netbios name resolution in TCP/IP environments, we use
  3. Can Win2000 professional become terminal service client?
  4. 10 base T network is implemented by co-axial cable
  5. The universal groups can contain
  6. User account names are case-sensitive
  7. In a Windows 2000 Server domain Controller what utility is used to create domain user account?
  8. The server where active directory wers can be created create is
  9. What is the minimum information that you need to connect a computer on a TCP/IP network to the Internet?…
  10. Clipper command can be used for data encryption
  11. Which of the following is not needed to configure printing in NetWare environment?
  12. Which of the following services are not available with the standard version of Win2k Server?
  13. Can a global group be created in a member server?
  14. What can be used in the place of DNS to resolve host names to IP addresses?
  15. Which of the following protocols are considered unreliable or connectionless?
  16. Which folder is used to store user profiles by default?
  17. Which policy specifies the number of invalid attempts allowed before account is locked out?
  18. Can we use local users and group utility to create user in a member server?
  19. An Administrator account is created when you install the Windows 2000 Server.
  20. Which properties tab is used in a member server for local user to configure logon hours?
  21. A user name cannot contain : or = character.
  22. What is the maximum number of characters that a password may contain?
  23. The command to convert a FAT partition into NTFS is
  24. To use netbios name resolution in TCP/IP environments, we use
  25. If we want to run Nwadmin from DOS prompt what is the command we use?
  26. Identify the topology and network type that uses a central hub with cables connected to workstations.
  27. Which of the following network topologies has the highest level of redundancy?
  28. The NTFS security is not applicable in case of network access
  29. Windows 2000 is based on
  30. The NTFS security is not applicable in case of network access