Directions: There are five functional tabs in MS Configuration utility, namely General, Boot, Services, Startup and Tools.Â
Classify the following items according to the tabs they belong to. Write your answer on a separate paper.
 1. Event ViewerÂ
2. Safe BootÂ
3. List of services that start when computer bootsÂ
4. Make all boot settings permanentÂ
5. Normal startupÂ
6. No GUI BootÂ
7. OS Boot information
8. Hide All Microsoft ServicesÂ
9. Convenient List of Diagnostic ToolsÂ
10.Base VideoÂ
Directions: Complete the diagram of various Control Panel Applets with the components included in their categoryÂ
What are the key factors to consider when planning the configuration of a new computer system?
A) Storage space and processor type
B) Hardware compatibility, operating system, and software requirements
C) User preferences and security settings
D) All of the above
When selecting hardware for a new computer system, what is the most important consideration for ensuring compatibility?
A) Manufacturer brand
B) Form factor and motherboard compatibility
C) Software compatibility
D) External devices
What is the role of the motherboard in configuring a computer system?
A) It stores data
B) It manages power consumption
C) It connects and enables communication between various hardware components
D) It provides software drivers
What is the purpose of BIOS/UEFI settings when configuring a computer system?
A) To control hardware and system-level settings before the OS loads
B) To install the operating system
C) To provide security features for the OS
D) To organize the file system
Which of the following factors should be considered when configuring storage devices for a computer system?
A) Storage capacity and type (SSD vs HDD)
B) RAID configurations
C) File system format (NTFS, exFAT, etc.)
D) All of the above
What is the first step in planning the configuration of a network?
A) Choose network cables
B) Define network security policies
C) Identify the network's scope and requirements (e.g., size, devices, usage)
D) Set up routers and switches
Which type of network topology is most commonly used in office environments and why?
A) Bus topology
B) Star topology
C) Ring topology
D) Mesh topology
Which of the following is a primary task during the configuration of network devices such as routers and switches?
A) Assigning IP addresses
B) Installing physical hardware
C) Installing application software
D) Choosing the operating system
What is the purpose of subnetting when configuring a network?
A) To secure the network from unauthorized users
B) To break a large network into smaller, more manageable subnets
C) To assign static IP addresses to devices
D) To enhance the performance of network devices
When planning a wireless network, what is one of the most important factors to consider?
A) The type of router
B) Wireless security protocols (e.g., WPA2, WPA3)
C) Network cables
D) Printer compatibility
Which of the following is an important consideration when selecting an operating system for a computer system?
A) OS compatibility with hardware
B) Security features
C) User interface preferences
D) All of the above
How can you ensure network security when configuring a business network?
A) Using strong passwords for all devices
B) Implementing firewalls and encryption
C) Regularly updating software and firmware
D) All of the above
Why is it important to plan for future scalability when configuring computer systems and networks?
A) To ensure the system can grow with the organization’s needs
B) To minimize the initial installation cost
C) To meet legal compliance requirements
D) To avoid network downtime
Which of the following should be done to test a network configuration before going live?
A) Perform a full backup of the system
B) Conduct a network performance test (e.g., ping, speed test)
C) Test the installation of all software applications
D) None of the above
When configuring a computer system for a multi-user environment, what is essential to consider for user management?
A) User roles and permissions
B) System updates and patches
C) Backup and recovery procedures
D) All of the above
What is the importance of documenting the configuration process during system setup?
A) To ensure a system can be replicated in the future
B) To provide a reference for troubleshooting
C) To track hardware and software changes
D) All of the above
What is the most effective way to troubleshoot a network configuration issue?
A) Reboot the router
B) Use network diagnostic tools like ping and traceroute
C) Reinstall the operating system
D) Disconnect all devices
Which of the following tools would you use to analyze the performance and health of a network?
A) Task Manager
B) Network Analyzer (e.g., Wireshark)
C) Disk Cleanup Tool
D) Antivirus software
What is the main purpose of implementing a VLAN (Virtual Local Area Network) in a network?
A) To segregate traffic and improve security by isolating different segments of a network
B) To combine multiple physical networks into one large network
C) To reduce the amount of wiring in a network
D) To increase the speed of the network connection
When preparing for network configuration in a business environment, which of the following is a critical security step?
A) Assigning static IP addresses to all devices
B) Configuring user access controls and firewall settings
C) Limiting access to only local devices
D) Installing antivirus software only on client computers