Below we have listed all the Microsoft Basics Interview Questions and answers. Feel free to comment on any Microsoft Basics Interview Questions or answer by the comment feature available on the page.
To buy an eBook containing 30,000 Interview Questions, with Answers, Click Here.
View All Microsoft Basics Interview Questions & Answers - Exam Mode / Learning Mode
Microsoft BASIC was the foundation product of the Microsoft company. It first appeared in 1975 as Altair BASIC, which was the first BASIC (and indeed the first high level programming language) available for the MITS Altair 8800 hobbyist microcomputer.
|The SMS 2003 site hierarchy consists of a
single primary site. Servers run Microsoft Windows Server 2003. Desktop computers run
Windows XP Professional. Users who are members of a group named Help Desk want to access
computers remotely. The Remote Tools Client Agent is configured as shown in the exhibit.
Users in the Help Desk group have full access rights on the Remote Assistance tool and SMS
Remote Tools. All SMS client computers use the default settings for the Remote Desktop service.
You need to instruct the users in the Help Desk group how to access computers remotely. What
should you instruct them to do?
A. In the SMS Administrator console, start Windows Diagnostics.
B. In the SMS Administrator console, start Remote Tools.
C. In the SMS Administrator console, start Remote Assistance.
D. In the SMS Administrator console, start Remote Desktop Client.
|What is IUnknown and what are its three parts?
|All servers run Microsoft Windows Server
2003. All desktop computers run Windows 98. You plan to deploy the SMS client software to all
desktop computers on the network. You want to install the SMS client software based on the
logon credentials. You need to create a logon script that will automatically install the SMS client
on all desktop computers. What are two possible ways to achieve this goal? (Each correct answer
presents a complete solution. Choose two.)
A. Configure the logon script to run Capinst.exe.
B. Configure the logon script to run CCMSetup.exe.
C. Configure the logon script to run Client.msi.
D. Configure the logon script to run Smsman.exe.
|The company has a single SMS site. All site
roles are enabled. The Hardware Inventory Client Agent and the Software Inventory Client Agent
are disabled. The SMS Advanced Client is installed on all computers in the network. You want to
create a list of the computers on the network. The list must include the computer name, IP
address, last logged on user, and MAC address for each computer. You want all users on your
team to have access to this list. You are the only user on your team who has access to the SMS
Administrator console. You need to configure SMS to automatically create the list. Which two
actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a report to display the required data.
B. Create a query to display the required data.
C. Configure permissions on the created report to allow users to view it.
D. Configure permissions on the created query to allow users to view it.
|You use SMS 2003 SP1 and the Security
Update Inventory Tool for patch management. The Security Update Inventory Tool is installed
and configured with the default settings. The package created by the tool is named Security. you
force the security sync advertisement to run and download new information on updates. you force
the security advertisement to run on a test server named 1 to collect software update data. three
hours later you discover that there is no new data. you need to ensure that the current software
update data is sent from 1 to the sms server as soon as possible. What should you do?
A. Change the Security advertisement to run the Security program.
B. Change the Security program to run Scanwrapper.exe /cache /kick.
C. force 1 to run a hardware inventory cycle.
D. force 1 to run a software inventory cycle.
|The SMS hierarchy consists of a single
primary site. You use SMS to deploy a program that examines the latest version of the antivirus
software that is used by the computers on the network. Two advertisements use this program.
One advertisement runs daily on servers and portable computers. Another advertisement runs
weekly on desktop computers. You discover a security flaw in the program that collects the
antivirus software information. You need to prevent computers from running the program until you
fix the security flaw. You need to ensure that all other advertisements function normally. You want
to achieve this goal by using the least amount of administrative effort. What should you do?
A. Disable the program.
B. Delete the program.
C. Disable the Advertised Programs Client Agent.
D. Delete each advertisement.
|How do you create Virtual Root in IIS
|I want questions in windows DNA.|
|What is the difference between web service and web application?
|How many data types are supported in Vbscript
India News Network
Latest 20 Questions
Payment of time- barred debt is:
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal