// Questions file created by MCBuilder © Mike Capstick // It is a javascript file of data // questions=new Array(); questions[1]='\'\'
Phishing is~one method frequently used by identity thieves to obtain your personal information~another name for the Disk Operating System~a minor electrical bug~the OS developed by IBM and Microsoft~the central component of any OS~A~1~1~ \'\'
Phishing is one method frequently used by identity thieves to obtain your personal information
\'\'
DOS is another name for the Disk Operating System
OS/2 is the OS developed by IBM and Microsoft
The kernal is the central component of any OS
A Glitch is a minor electrical bug
'; questions[2]='\'\'
Disinfection is~is the process of removing a computer virus~the place where the device drivers settings for Microsoft Windows are stored~when a ROM chip, such as BIOS copies itself into RAM~the DOS command that displays files across the screen~able to access hardware devices via the I/O address or port address~A~1~1~ \'\'
Disinfection is is the process of removing a computer virus
Registry is the place where the device drivers settings for Microsoft Windows are stored
\'\'
Shadow Ram is when a ROM chip, such as BIOS copies itself into RAM
A CPU is able to access hardware devices via the I/O address or port address
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[3]='A Polymorph is~a type of virus~a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention~another name for a virus that infects a computer and sends copies of itself to other computers~the way a BIOS detects the new drive and selects the correct drive capacity and configuration~another name for the Disk Operating System~A~1~1~ A Polymorph is a type of virus
\'\'
A Worm is another name for a virus that infects a computer and sends copies of itself to other computers
\'\'
DOS is another name for the Disk Operating System
An IRQ is a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention
Autodetection is the way a BIOS detects the new drive and selects the correct drive capacity and configuration
'; questions[4]='\'
A Bug is~an error in a program~another term for an icon driven interface~where your machine will run backdoor software that accepts remote connections~made more secure by using a mixture of letters, number and punctuation symbols~the way a BIOS detects the new drive and selects the correct drive capacity and configuration~A~1~1~ \'
A Bug is an error in a program
A password is made more secure by using a mixture of letters, number and punctuation symbols
\'\'
Botnet activity is where your machine will run backdoor software that accepts remote connections
A Gui is another term for an icon driven interface
Autodetection is the way a BIOS detects the new drive and selects the correct drive capacity and configuration
'; questions[5]='\'\'
A computer virus is~a program that replicates by appending a piece of its code to an otherwise harmless executable file~another name for a virus that infects a computer and sends copies of itself to other computers~connected by 9 pins~the DOS command that displays files~a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention~A~1~1~ \'\'
A computer virus is a program that replicates by appending a piece of its code to an otherwise harmless executable file
\'\'
A Worm is another name for a virus that infects a computer and sends copies of itself to other computers
An IRQ is a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention
A parallel printer port is connected by 9 pins
\'\'
type is the DOS command that displays files
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[6]='\'\'
A Worm is~another name for a virus that infects a computer and sends copies of itself to other computers~able to access hardware devices via the I/O address or port address~a concentric circle on a hard disk surface~a type of CPU.~also called a Cold Boot~A~1~1~ \'\'
A Worm is another name for a virus that infects a computer and sends copies of itself to other computers
A hard boot is also called a Cold Boot
\'\'
A Track is a concentric circle on a hard disk surface
\'\'
AMD is a type of CPU.
A CPU is able to access hardware devices via the I/O address or port address
'; questions[7]='A Spider is~a program that catalogs Web sites~the another name for the Basic Input Output System~a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention~an example of an optical backup medium~an example of a computer language~A~1~1~ A Spider is a program that catalogs Web sites
BIOS is the another name for the Basic Input Output System
A CD is an example of an optical backup medium
An IRQ is a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention
Java is an example of a computer language
'; questions[8]='\'\'
A Hacker is~a person who attempts to get unauthorized access to a computer or restricted data.~a type of CPU.~able to access hardware devices via the I/O address or port address~a program that replicates by appending a piece of its code to an otherwise harmless executable file~the way a BIOS detects the new drive and selects the correct drive capacity and configuration~A~1~1~ \'\'
A computer virus is a program that replicates by appending a piece of its code to an otherwise harmless executable file
\'\'
A Hacker is a person who attempts to get unauthorized access to a computer or restricted data.
\'\'
AMD is a type of CPU.
A CPU is able to access hardware devices via the I/O address or port address
Autodetection is the way a BIOS detects the new drive and selects the correct drive capacity and configuration
'; questions[9]='\'\'
A EULA is~a customer-vendor agreement that describes your rights and limitations related to software~the built in software that determines what a computer can do without accessing a disk~the part of a hard drive used to boot the OS~broken down into one or more partitions~exactly 512 bytes long and occupies one sector~A~1~1~ \'\'
A EULA is a customer-vendor agreement that describes your rights and limitations related to software
BIOS is the built in software that determines what a computer can do without accessing a disk
\'\'The Master Boot Record is exactly 512 bytes long and occupies one sector
\'\'
The Active Partition is the part of a hard drive used to boot the OS
\'\'
A hard drive is broken down into one or more partitions
'; questions[10]='Registry is~the place where the device drivers settings for Microsoft Windows are stored~the OS developed by IBM and Microsoft~Power-On Self Test~a person who attempts to get unauthorized access to a computer or restricted data.~used to automatically complete words on a previously visited web page form.~A~1~1~ \'\'
A Hacker is a person who attempts to get unauthorized access to a computer or restricted data.
Registry is the place where the device drivers settings for Microsoft Windows are stored
\'\'
POST is Power-On Self Test
\'\'
A Cookie is used to automatically complete words on a previously visited web page form.
OS/2 is the OS developed by IBM and Microsoft
'; questions[11]='A hard boot is~also called a Cold Boot~one method frequently used by identity thieves to obtain your personal information~the place where the device drivers settings for Microsoft Windows are stored~the way a BIOS detects the new drive and selects the correct drive capacity and configuration~used when the computer is booted~A~1~1~ \'\'
Phishing is one method frequently used by identity thieves to obtain your personal information
Registry is the place where the device drivers settings for Microsoft Windows are stored
A hard boot is also called a Cold Boot
A CMOS setting is used when the computer is booted
Autodetection is the way a BIOS detects the new drive and selects the correct drive capacity and configuration
'; questions[12]='BIOS is~the another name for the Basic Input Output System~the upgrade from Windows XP~a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention~a customer-vendor agreement that describes your rights and limitations related to software~the type of formatting that builds a file system for each logical drive~A~1~1~ \'\'
A EULA is a customer-vendor agreement that describes your rights and limitations related to software
BIOS is the another name for the Basic Input Output System
An IRQ is a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention
\'\'
High-level formatting is the type of formatting that builds a file system for each logical drive
\'\'
Windows Vista is the upgrade from Windows XP
'; questions[13]='BIOS is~the built in software that determines what a computer can do without accessing a disk~another name for the Disk Operating System~the size of largest supported FAT32 volume for Windows 2000 and XP~the DOS command that displays files across the screen~the place where the device drivers settings for Microsoft Windows are stored~A~1~1~ Registry is the place where the device drivers settings for Microsoft Windows are stored
BIOS is the built in software that determines what a computer can do without accessing a disk
\'\'
DOS is another name for the Disk Operating System
\'\'
32GB is the size of largest supported FAT32 volume for Windows 2000 and XP
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[14]='\'\'
POST is~Power-On Self Test~is the process of removing a computer virus~able to access hardware devices via the I/O address or port address~ where the hard drive has tracks and sectors physically written to it~the DOS command that displays files~A~1~1~ \'\'
Disinfection is is the process of removing a computer virus
\'\'
POST is Power-On Self Test
\'\'
A Low-level format is where the hard drive has tracks and sectors physically written to it
A CPU is able to access hardware devices via the I/O address or port address
\'\'
type is the DOS command that displays files
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[15]='\'\'
A Firewall is~a program designed to monitor network connections and shield a computer from remote intruders~made more secure by using a mixture of letters, number and punctuation symbols~the OS developed by IBM and Microsoft~one method frequently used by identity thieves to obtain your personal information~a well known mechanism for storing information about an internet user on their local computer~A~1~1~ \'\'
Phishing is one method frequently used by identity thieves to obtain your personal information
\'\'
A Firewall is a program designed to monitor network connections and shield a computer from remote intruders
\'\'
A Cookie is a well known mechanism for storing information about an internet user on their local computer
OS/2 is the OS developed by IBM and Microsoft
A password is made more secure by using a mixture of letters, number and punctuation symbols
'; questions[16]='\'\'
A Cookie is~used to automatically complete words on a previously visited web page form.~a type of CPU.~a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention~Power-On Self Test~made more secure by using a mixture of letters, number and punctuation symbols~A~1~1~ \'\'
POST is Power-On Self Test
\'\'
A Cookie is used to automatically complete words on a previously visited web page form.
An IRQ is a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention
\'\'
AMD is a type of CPU.
A password is made more secure by using a mixture of letters, number and punctuation symbols
'; questions[17]='\'\'
A Cookie is~a well known mechanism for storing information about an internet user on their local computer~a type of protection that requires users to enter the letters seen in an image~a Windows 9x and DOS utility used to partition a hard drive~an example of a computer language~the type of formatting that builds a file system for each logical drive~A~1~1~ \'\'
A Cookie is a well known mechanism for storing information about an internet user on their local computer
Captcha is a type of protection that requires users to enter the letters seen in an image
Fdisk is a Windows 9x and DOS utility used to partition a hard drive
\'\'
High-level formatting is the type of formatting that builds a file system for each logical drive
Java is an example of a computer language
'; questions[18]='Captcha is~a type of protection that requires users to enter the letters seen in an image~the way a BIOS detects the new drive and selects the correct drive capacity and configuration~the DOS command that displays files across the screen~the DOS command that shows all the files in a directory~where an I/O device send data directly to memory, bypassing the CPU~A~1~1~ Captcha is a type of protection that requires users to enter the letters seen in an image
A DMA Channel is where an I/O device send data directly to memory, bypassing the CPU
Autodetection is the way a BIOS detects the new drive and selects the correct drive capacity and configuration
\'\'
dir *.* is the DOS command that shows all the files in a directory
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[19]='A CD is~an example of an optical backup medium~a minor electrical bug~also known as IEEE 1394~a program that catalogs Web sites~the way a BIOS detects the new drive and selects the correct drive capacity and configuration~A~1~1~ A Spider is a program that catalogs Web sites
A CD is an example of an optical backup medium
FireWire is also known as IEEE 1394
A Glitch is a minor electrical bug
Autodetection is the way a BIOS detects the new drive and selects the correct drive capacity and configuration
'; questions[20]='\'\'
A Track is~a concentric circle on a hard disk surface~a well known mechanism for storing information about an internet user on their local computer~the upgrade from Windows 2000~the central component of any OS~connected by 9 pins~A~1~1~ \'\'
A Cookie is a well known mechanism for storing information about an internet user on their local computer
\'\'
A Track is a concentric circle on a hard disk surface
The kernal is the central component of any OS
A parallel printer port is connected by 9 pins
\'\'
Windows XP is the upgrade from Windows 2000
'; questions[21]='A DMA Channel is~where an I/O device send data directly to memory, bypassing the CPU~made more secure by using a mixture of letters, number and punctuation symbols~another name for a virus that infects a computer and sends copies of itself to other computers~is the process of removing a computer virus~a program that catalogs Web sites~A~1~1~ \'\'
Disinfection is is the process of removing a computer virus
\'\'
A Worm is another name for a virus that infects a computer and sends copies of itself to other computers
A Spider is a program that catalogs Web sites
A DMA Channel is where an I/O device send data directly to memory, bypassing the CPU
A password is made more secure by using a mixture of letters, number and punctuation symbols
'; questions[22]='\'\'
DOS is~another name for the Disk Operating System~the binary number 00011001~a type of CPU.~a program designed to monitor network connections and shield a computer from remote intruders~the DOS command that shows the the current OS version~A~1~1~ \'\'
A Firewall is a program designed to monitor network connections and shield a computer from remote intruders
\'\'
DOS is another name for the Disk Operating System
\'\'
AMD is a type of CPU.
The decimal number 25 is the binary number 00011001
\'\'
vers is the DOS command that shows the the current OS version
'; questions[23]='OS/2 is~the OS developed by IBM and Microsoft~a person who attempts to get unauthorized access to a computer or restricted data.~connected by 9 pins~an example of a computer language~the another name for the Basic Input Output System~A~1~1~ \'\'
A Hacker is a person who attempts to get unauthorized access to a computer or restricted data.
BIOS is the another name for the Basic Input Output System
OS/2 is the OS developed by IBM and Microsoft
A parallel printer port is connected by 9 pins
Java is an example of a computer language
'; questions[24]='The kernal is~the central component of any OS~the DOS command that shows the the current OS version~the type of formatting that builds a file system for each logical drive~a person who attempts to get unauthorized access to a computer or restricted data.~where an I/O device send data directly to memory, bypassing the CPU~A~1~1~ \'\'
A Hacker is a person who attempts to get unauthorized access to a computer or restricted data.
A DMA Channel is where an I/O device send data directly to memory, bypassing the CPU
The kernal is the central component of any OS
\'\'
High-level formatting is the type of formatting that builds a file system for each logical drive
\'\'
vers is the DOS command that shows the the current OS version
'; questions[25]='\'\'The Master Boot Record is~exactly 512 bytes long and occupies one sector~the size of largest supported FAT32 volume for Windows 2000 and XP~the DOS command that displays files~the upgrade from Windows 2000~when a ROM chip, such as BIOS copies itself into RAM~A~1~1~ \'\'The Master Boot Record is exactly 512 bytes long and occupies one sector
\'\'
Shadow Ram is when a ROM chip, such as BIOS copies itself into RAM
\'\'
32GB is the size of largest supported FAT32 volume for Windows 2000 and XP
\'\'
Windows XP is the upgrade from Windows 2000
\'\'
type is the DOS command that displays files
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[26]='\'\'
Shadow Ram is~when a ROM chip, such as BIOS copies itself into RAM~the another name for the Basic Input Output System~the DOS command that changes the name of a file~the type of formatting that builds a file system for each logical drive~a type of virus~A~1~1~ A Polymorph is a type of virus
BIOS is the another name for the Basic Input Output System
\'\'
Shadow Ram is when a ROM chip, such as BIOS copies itself into RAM
\'\'
High-level formatting is the type of formatting that builds a file system for each logical drive
\'\'
ren is the DOS command that changes the name of a file
'; questions[27]='An IRQ is~a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention~also called a Cold Boot~used to automatically complete words on a previously visited web page form.~an error in a program~connected by 9 pins~A~1~1~ \'
A Bug is an error in a program
A hard boot is also called a Cold Boot
\'\'
A Cookie is used to automatically complete words on a previously visited web page form.
An IRQ is a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention
A parallel printer port is connected by 9 pins
'; questions[28]='A parallel printer port is~connected by 9 pins~a minor electrical bug~the way a BIOS detects the new drive and selects the correct drive capacity and configuration~where an I/O device send data directly to memory, bypassing the CPU~the DOS command that shows all the files in a directory~A~1~1~ A DMA Channel is where an I/O device send data directly to memory, bypassing the CPU
A parallel printer port is connected by 9 pins
A Glitch is a minor electrical bug
Autodetection is the way a BIOS detects the new drive and selects the correct drive capacity and configuration
\'\'
dir *.* is the DOS command that shows all the files in a directory
'; questions[29]='Fdisk is~a Windows 9x and DOS utility used to partition a hard drive~a program that catalogs Web sites~the upgrade from Windows 2000~a type of CPU.~the DOS command that duplicates files~A~1~1~ A Spider is a program that catalogs Web sites
Fdisk is a Windows 9x and DOS utility used to partition a hard drive
\'\'
AMD is a type of CPU.
\'\'
Windows XP is the upgrade from Windows 2000
\'\'
copy is the DOS command that duplicates files
'; questions[30]='\'\'
The Active Partition is~the part of a hard drive used to boot the OS~a person who attempts to get unauthorized access to a computer or restricted data.~the DOS command that clears the screen~a concentric circle on a hard disk surface~where an I/O device send data directly to memory, bypassing the CPU~A~1~1~ \'\'
A Hacker is a person who attempts to get unauthorized access to a computer or restricted data.
\'\'
A Track is a concentric circle on a hard disk surface
A DMA Channel is where an I/O device send data directly to memory, bypassing the CPU
\'\'
The Active Partition is the part of a hard drive used to boot the OS
cls is the DOS command that clears the screen
'; questions[31]='FireWire is~also known as IEEE 1394~another name for a virus that infects a computer and sends copies of itself to other computers~the DOS command that duplicates files~the DOS command that displays files~a well known mechanism for storing information about an internet user on their local computer~A~1~1~ \'\'
A Worm is another name for a virus that infects a computer and sends copies of itself to other computers
\'\'
A Cookie is a well known mechanism for storing information about an internet user on their local computer
FireWire is also known as IEEE 1394
\'\'
copy is the DOS command that duplicates files
\'\'
type is the DOS command that displays files
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[32]='PCI is~a type of slot on the motherboard~the way a BIOS detects the new drive and selects the correct drive capacity and configuration~also known as IEEE 1394~connected by 9 pins~the DOS command that displays files across the screen~A~1~1~ A parallel printer port is connected by 9 pins
FireWire is also known as IEEE 1394
PCI is a type of slot on the motherboard
Autodetection is the way a BIOS detects the new drive and selects the correct drive capacity and configuration
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[33]='Incremental Backup is~the one that clears the archive bit~the DOS command that duplicates files~another name for the Disk Operating System~a type of protection that requires users to enter the letters seen in an image~the type of formatting that builds a file system for each logical drive~A~1~1~ Captcha is a type of protection that requires users to enter the letters seen in an image
\'\'
DOS is another name for the Disk Operating System
Incremental Backup is the one that clears the archive bit
\'\'
High-level formatting is the type of formatting that builds a file system for each logical drive
\'\'
copy is the DOS command that duplicates files
'; questions[34]='A File System is~responsible for storing files and folders on secondary storage devices~the first thing to change when installing an IDE hard drive~the one that clears the archive bit~the upgrade from Windows XP~made more secure by using a mixture of letters, number and punctuation symbols~A~1~1~ Incremental Backup is the one that clears the archive bit
A File System is responsible for storing files and folders on secondary storage devices
A password is made more secure by using a mixture of letters, number and punctuation symbols
\'\'
A DIP switch is the first thing to change when installing an IDE hard drive
\'\'
Windows Vista is the upgrade from Windows XP
'; questions[35]='\'\'
High-level formatting is~the type of formatting that builds a file system for each logical drive~the DOS command that changes the name of a file~a well known mechanism for storing information about an internet user on their local computer~the upgrade from Windows 2000~the part of a hard drive used to boot the OS~A~1~1~ \'\'
A Cookie is a well known mechanism for storing information about an internet user on their local computer
\'\'
The Active Partition is the part of a hard drive used to boot the OS
\'\'
High-level formatting is the type of formatting that builds a file system for each logical drive
\'\'
Windows XP is the upgrade from Windows 2000
\'\'
ren is the DOS command that changes the name of a file
'; questions[36]='\'\'
A Low-level format is~ where the hard drive has tracks and sectors physically written to it~the DOS command that clears the screen~a program that replicates by appending a piece of its code to an otherwise harmless executable file~a customer-vendor agreement that describes your rights and limitations related to software~a well known mechanism for storing information about an internet user on their local computer~A~1~1~ \'\'
A computer virus is a program that replicates by appending a piece of its code to an otherwise harmless executable file
\'\'
A EULA is a customer-vendor agreement that describes your rights and limitations related to software
\'\'
A Cookie is a well known mechanism for storing information about an internet user on their local computer
\'\'
A Low-level format is where the hard drive has tracks and sectors physically written to it
cls is the DOS command that clears the screen
'; questions[37]='A Glitch is~a minor electrical bug~responsible for storing files and folders on secondary storage devices~a type of protection that requires users to enter the letters seen in an image~an error in a program~Power-On Self Test~A~1~1~ \'
A Bug is an error in a program
\'\'
POST is Power-On Self Test
Captcha is a type of protection that requires users to enter the letters seen in an image
A File System is responsible for storing files and folders on secondary storage devices
A Glitch is a minor electrical bug
'; questions[38]='\'\'
AMD is~a type of CPU.~used when the computer is booted~able to access hardware devices via the I/O address or port address~the first thing to change when installing an IDE hard drive~a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention~A~1~1~ An IRQ is a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention
\'\'
AMD is a type of CPU.
A CMOS setting is used when the computer is booted
A CPU is able to access hardware devices via the I/O address or port address
\'\'
A DIP switch is the first thing to change when installing an IDE hard drive
'; questions[39]='A password is~made more secure by using a mixture of letters, number and punctuation symbols~the type of formatting that builds a file system for each logical drive~a well known mechanism for storing information about an internet user on their local computer~the upgrade from Windows XP~the first thing to change when installing an IDE hard drive~A~1~1~ \'\'
A Cookie is a well known mechanism for storing information about an internet user on their local computer
\'\'
High-level formatting is the type of formatting that builds a file system for each logical drive
A password is made more secure by using a mixture of letters, number and punctuation symbols
\'\'
A DIP switch is the first thing to change when installing an IDE hard drive
\'\'
Windows Vista is the upgrade from Windows XP
'; questions[40]='\'\'
Botnet activity is~where your machine will run backdoor software that accepts remote connections~a type of slot on the motherboard~the binary number 111~a well known mechanism for storing information about an internet user on their local computer~is the process of removing a computer virus~A~1~1~ \'\'
Disinfection is is the process of removing a computer virus
\'\'
A Cookie is a well known mechanism for storing information about an internet user on their local computer
PCI is a type of slot on the motherboard
\'\'
Botnet activity is where your machine will run backdoor software that accepts remote connections
The decimal number 7 is the binary number 111
'; questions[41]='A CMOS setting is~used when the computer is booted~the DOS command that displays files~the size of largest supported FAT32 volume for Windows 2000 and XP~another name for a virus that infects a computer and sends copies of itself to other computers~Power-On Self Test~A~1~1~ \'\'
A Worm is another name for a virus that infects a computer and sends copies of itself to other computers
\'\'
POST is Power-On Self Test
A CMOS setting is used when the computer is booted
\'\'
32GB is the size of largest supported FAT32 volume for Windows 2000 and XP
\'\'
type is the DOS command that displays files
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[42]='HCL is~the way to check if a driver will work in Windows XP/2000~exactly 512 bytes long and occupies one sector~responsible for storing files and folders on secondary storage devices~where your machine will run backdoor software that accepts remote connections~an example of an optical backup medium~A~1~1~ A CD is an example of an optical backup medium
\'\'The Master Boot Record is exactly 512 bytes long and occupies one sector
A File System is responsible for storing files and folders on secondary storage devices
\'\'
Botnet activity is where your machine will run backdoor software that accepts remote connections
HCL is the way to check if a driver will work in Windows XP/2000
'; questions[43]='A CPU is~able to access hardware devices via the I/O address or port address~a customer-vendor agreement that describes your rights and limitations related to software~ where the hard drive has tracks and sectors physically written to it~made more secure by using a mixture of letters, number and punctuation symbols~a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention~A~1~1~ \'\'
A EULA is a customer-vendor agreement that describes your rights and limitations related to software
An IRQ is a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention
\'\'
A Low-level format is where the hard drive has tracks and sectors physically written to it
A password is made more secure by using a mixture of letters, number and punctuation symbols
A CPU is able to access hardware devices via the I/O address or port address
'; questions[44]='\'\'
A DIP switch is~the first thing to change when installing an IDE hard drive~the part of a hard drive used to boot the OS~the screen that appears showing menus, icons and commands~an error in a program~able to access hardware devices via the I/O address or port address~A~1~1~ \'
A Bug is an error in a program
\'\'
The Active Partition is the part of a hard drive used to boot the OS
A CPU is able to access hardware devices via the I/O address or port address
\'\'
A DIP switch is the first thing to change when installing an IDE hard drive
The Desktop is the screen that appears showing menus, icons and commands
'; questions[45]='\'\'
A hard drive is~broken down into one or more partitions~a program that replicates by appending a piece of its code to an otherwise harmless executable file~the size of largest supported FAT32 volume for Windows 2000 and XP~the upgrade from Windows XP~a well known mechanism for storing information about an internet user on their local computer~A~1~1~ \'\'
A computer virus is a program that replicates by appending a piece of its code to an otherwise harmless executable file
\'\'
A Cookie is a well known mechanism for storing information about an internet user on their local computer
\'\'
A hard drive is broken down into one or more partitions
\'\'
32GB is the size of largest supported FAT32 volume for Windows 2000 and XP
\'\'
Windows Vista is the upgrade from Windows XP
'; questions[46]='\'\'
32GB is~the size of largest supported FAT32 volume for Windows 2000 and XP~Power-On Self Test~when a ROM chip, such as BIOS copies itself into RAM~the binary number 111~a program designed to monitor network connections and shield a computer from remote intruders~A~1~1~ \'\'
POST is Power-On Self Test
\'\'
A Firewall is a program designed to monitor network connections and shield a computer from remote intruders
\'\'
Shadow Ram is when a ROM chip, such as BIOS copies itself into RAM
\'\'
32GB is the size of largest supported FAT32 volume for Windows 2000 and XP
The decimal number 7 is the binary number 111
'; questions[47]='\'\'
Windows XP is~the upgrade from Windows 2000~ where the hard drive has tracks and sectors physically written to it~the part of a hard drive used to boot the OS~the DOS command that clears the screen~the one that clears the archive bit~A~1~1~ \'\'
The Active Partition is the part of a hard drive used to boot the OS
Incremental Backup is the one that clears the archive bit
\'\'
A Low-level format is where the hard drive has tracks and sectors physically written to it
\'\'
Windows XP is the upgrade from Windows 2000
cls is the DOS command that clears the screen
'; questions[48]='\'\'
Windows Vista is~the upgrade from Windows XP~the DOS command that changes the name of a file~also called a Cold Boot~a concentric circle on a hard disk surface~the binary number 00011001~A~1~1~ A hard boot is also called a Cold Boot
\'\'
A Track is a concentric circle on a hard disk surface
\'\'
Windows Vista is the upgrade from Windows XP
The decimal number 25 is the binary number 00011001
\'\'
ren is the DOS command that changes the name of a file
'; questions[49]='A Gui is~another term for an icon driven interface~a type of CPU.~broken down into one or more partitions~a program designed to monitor network connections and shield a computer from remote intruders~connected by 9 pins~A~1~1~ \'\'
A Firewall is a program designed to monitor network connections and shield a computer from remote intruders
A parallel printer port is connected by 9 pins
\'\'
AMD is a type of CPU.
\'\'
A hard drive is broken down into one or more partitions
A Gui is another term for an icon driven interface
'; questions[50]='The Desktop is~the screen that appears showing menus, icons and commands~the first thing to change when installing an IDE hard drive~when a ROM chip, such as BIOS copies itself into RAM~another name for the Disk Operating System~a concentric circle on a hard disk surface~A~1~1~ \'\'
A Track is a concentric circle on a hard disk surface
\'\'
DOS is another name for the Disk Operating System
\'\'
Shadow Ram is when a ROM chip, such as BIOS copies itself into RAM
\'\'
A DIP switch is the first thing to change when installing an IDE hard drive
The Desktop is the screen that appears showing menus, icons and commands
'; questions[51]='Autodetection is~the way a BIOS detects the new drive and selects the correct drive capacity and configuration~a well known mechanism for storing information about an internet user on their local computer~also called a Cold Boot~a person who attempts to get unauthorized access to a computer or restricted data.~a Windows 9x and DOS utility used to partition a hard drive~A~1~1~ \'\'
A Hacker is a person who attempts to get unauthorized access to a computer or restricted data.
A hard boot is also called a Cold Boot
\'\'
A Cookie is a well known mechanism for storing information about an internet user on their local computer
Fdisk is a Windows 9x and DOS utility used to partition a hard drive
Autodetection is the way a BIOS detects the new drive and selects the correct drive capacity and configuration
'; questions[52]='Java is~an example of a computer language~one method frequently used by identity thieves to obtain your personal information~is the process of removing a computer virus~the central component of any OS~the DOS command that shows the the current OS version~A~1~1~ \'\'
Phishing is one method frequently used by identity thieves to obtain your personal information
\'\'
Disinfection is is the process of removing a computer virus
The kernal is the central component of any OS
Java is an example of a computer language
\'\'
vers is the DOS command that shows the the current OS version
'; questions[53]='The decimal number 7 is~the binary number 111~a type of virus~the way to check if a driver will work in Windows XP/2000~a program that catalogs Web sites~the DOS command that duplicates files~A~1~1~ A Polymorph is a type of virus
A Spider is a program that catalogs Web sites
HCL is the way to check if a driver will work in Windows XP/2000
The decimal number 7 is the binary number 111
\'\'
copy is the DOS command that duplicates files
'; questions[54]='The decimal number 25 is~the binary number 00011001~exactly 512 bytes long and occupies one sector~another term for an icon driven interface~an example of a computer language~the way a BIOS detects the new drive and selects the correct drive capacity and configuration~A~1~1~ \'\'The Master Boot Record is exactly 512 bytes long and occupies one sector
A Gui is another term for an icon driven interface
Autodetection is the way a BIOS detects the new drive and selects the correct drive capacity and configuration
Java is an example of a computer language
The decimal number 25 is the binary number 00011001
'; questions[55]='\'\'
vers is~the DOS command that shows the the current OS version~ where the hard drive has tracks and sectors physically written to it~the DOS command that displays files~the central component of any OS~the DOS command that clears the screen~A~1~1~ The kernal is the central component of any OS
\'\'
A Low-level format is where the hard drive has tracks and sectors physically written to it
\'\'
vers is the DOS command that shows the the current OS version
\'\'
type is the DOS command that displays files
\'\'
dir /w is the DOS command that displays files across the screen
cls is the DOS command that clears the screen
'; questions[56]='\'\'
dir *.* is~the DOS command that shows all the files in a directory~the size of largest supported FAT32 volume for Windows 2000 and XP~also known as IEEE 1394~is the process of removing a computer virus~responsible for storing files and folders on secondary storage devices~A~1~1~ \'\'
Disinfection is is the process of removing a computer virus
FireWire is also known as IEEE 1394
A File System is responsible for storing files and folders on secondary storage devices
\'\'
32GB is the size of largest supported FAT32 volume for Windows 2000 and XP
\'\'
dir *.* is the DOS command that shows all the files in a directory
'; questions[57]='\'\'
copy is~the DOS command that duplicates files~where an I/O device send data directly to memory, bypassing the CPU~the type of formatting that builds a file system for each logical drive~also called a Cold Boot~a concentric circle on a hard disk surface~A~1~1~ A hard boot is also called a Cold Boot
\'\'
A Track is a concentric circle on a hard disk surface
A DMA Channel is where an I/O device send data directly to memory, bypassing the CPU
\'\'
High-level formatting is the type of formatting that builds a file system for each logical drive
\'\'
copy is the DOS command that duplicates files
'; questions[58]='\'\'
type is~the DOS command that displays files~a minor electrical bug~the way to check if a driver will work in Windows XP/2000~a program designed to monitor network connections and shield a computer from remote intruders~a type of protection that requires users to enter the letters seen in an image~A~1~1~ \'\'
A Firewall is a program designed to monitor network connections and shield a computer from remote intruders
Captcha is a type of protection that requires users to enter the letters seen in an image
A Glitch is a minor electrical bug
HCL is the way to check if a driver will work in Windows XP/2000
\'\'
type is the DOS command that displays files
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[59]='\'\'
ren is~the DOS command that changes the name of a file~made more secure by using a mixture of letters, number and punctuation symbols~also called a Cold Boot~also known as IEEE 1394~a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention~A~1~1~ A hard boot is also called a Cold Boot
An IRQ is a line of motherboard bus that a hardware device can use to signal the CPU that the device needs attention
FireWire is also known as IEEE 1394
A password is made more secure by using a mixture of letters, number and punctuation symbols
\'\'
ren is the DOS command that changes the name of a file
'; questions[60]='\'\'
dir /w is~the DOS command that displays files across the screen~a person who attempts to get unauthorized access to a computer or restricted data.~another name for a virus that infects a computer and sends copies of itself to other computers~the DOS command that changes the name of a file~the OS developed by IBM and Microsoft~A~1~1~ \'\'
A Worm is another name for a virus that infects a computer and sends copies of itself to other computers
\'\'
A Hacker is a person who attempts to get unauthorized access to a computer or restricted data.
OS/2 is the OS developed by IBM and Microsoft
\'\'
ren is the DOS command that changes the name of a file
\'\'
dir /w is the DOS command that displays files across the screen
'; questions[61]='cls is~the DOS command that clears the screen~a program designed to monitor network connections and shield a computer from remote intruders~when a ROM chip, such as BIOS copies itself into RAM~a program that replicates by appending a piece of its code to an otherwise harmless executable file~the another name for the Basic Input Output System~A~1~1~ \'\'
A computer virus is a program that replicates by appending a piece of its code to an otherwise harmless executable file
BIOS is the another name for the Basic Input Output System
\'\'
A Firewall is a program designed to monitor network connections and shield a computer from remote intruders
\'\'
Shadow Ram is when a ROM chip, such as BIOS copies itself into RAM
cls is the DOS command that clears the screen
';