Interview Questions: 01 Differences Between PST & OST? PST OST
Interview Questions: 01 Differences Between PST & OST? PST OST
PST OST
* PST is a personal folders we create PST OST created when the outlook is
offline(network cable disconnected or in
outlook some problem)then the mails gone
in offline the send mails are automatically
saved to sent items & when outlook are
online will be automatically sent to
destination point.
For moving mails from mailbox to local
Computer
* PST Files is Simply a Storage Location on OST Files Starts as a mirror image of your
Your HDD or Server than the Exchange Server. Folders on your Exchange Server and works
In conjunction with Exchange Server
During Synchronization
*Full Backup: - In this backup we are talking all the files & folders on the system
*Differential Backup: - it’s a cumulative backup of changed made since the last full backup it backup
the only modified file but does not update the achieve attribute.
*Incremental Backup: - it takes the modified file since the last backup users need to update the
achieve attribute while backup only modified files.
SATA PATA
In 1 HDD, 23 partitions can create: - 26 alphabets, A & B for floppy drive, D goes for CD Drive
26-3 = 23 Partitions
08* If Monitor Goes Off & PC Is Running. What Problem Can Happen?
IP :- (Internet protocol)
IP is a 32 bits nos. normally expressed 4 octets “a dotted decimal number’’. It comes under network
layer protocol that contains addressing information and some control information that enables packets
to be routed it can be used to communicate across any set of interconnected networks and equally well
suited for LAN & WAN connections.
IP Classes:-
0-126:- Class A N.N.H.H. Network: - 2*8 Host: - 2*24(Few large Organization)
127:- Loop Back
128-191:- Class B N.N.H.H. Network: - 2*16 Host: - 2*16(Medium Large Organization)
192-223:- Class C N.N.N.H Network: - 2*24 Host: - 2*8 (Relatively Small Organization)
Active Directory is a directory in which we can cerate users & Groups & Add different rights &
permission for particular is the active directory purpose is to organize information about real objects
such as user, printers, applications & so fourth users can use the resources they need. Through the
active directory, users do not have to keep the track of which servers hold which resources or where a
particular printer resides.
Outlook is that from which we send & receive mails & saved address book.
Outlook Configuration
START- CONTROL PANEL- MAIL- NEW MAIL ACCOUNT- SERVER IP OR SERVER NAME-
NAME OF THE USER- CHECK NAME(Means it will search user name in exchange server) then
automatically takes particular user name- after it will ask for user name & password – FINISH.-
outlook configured. After that send test mail to any user.
If PST has been corrupted, it can be recovered from PST recovery software or If PST has been saved
in server or the better way is that recover PST from LTO backup tape restore it previous backup.
SWITCH HUB
* works at layer 2 works at layer 1
* uses MAC address for packet forwarding uses broadcast for packet forwarding
* does not required CSMA/CD requires CSMA/CD
* Faster than HUB slower than switch
* Full duplex half duplex
* High throughput low throughput.
19* What IS Straight & Cross Crimping?
STRAIGHT CROSS
20* What Is Dual Core Processor? Which Technology Is Use In Dual Core Processor?
Dual core processor is only a processor which is installed in PC but it functions like a 2 processor that
why is known a Dual Core processor when we see processor performances in task manager when then
it shows 2 processor running .In that hyper threading technology is used for multi-casting when we
several applications & files at a time then it do multi-casting in all files which are running because of
these the applications will run fast & it saves very fast.
Outlook Express
MS-outlook
C :\documents & settings\user name\local settings\application data\microsoft\outlook\file.PST
In case of formatting HDD, the main part is to take the backup of mails means outlook we are taking
backup of mails which are saved in PST (means in local computer or server) PST saved in the profile
of the user means proper destination C :/> documents & settings\user name\windows\microsft\outlook
in that in some folder or if the user save in her own destinations in C drive or D drive So, we have to
take the backup of PST.
Address Book:-
C :/> documents & settings\user name\local settings\application data\Microsoft\address book.
* POP 3
POP3 works by reviewing the inbox on the mail server, and downloading the new messages to your
computer.
You only check e-mail from one computer.
You want to remove your e-mail from the mail server.
Set to remove mail from server after 30 days.
Don't check more frequently than every 15 minutes.
75 MB is the maximum for POP3 users. POP’ing large mail boxes consume excessive server
resources.
* IMAP
IMAP downloads the headers of the new messages on the server, then retrieves the message you want
to read when you click on it.
You check e-mail from multiple locations.
You use Web mail.
Do NOT check all folders for new messages! This slows your e-mail substantially.
Use "mail/" (without the quotes) as your IMAP folder directory.
You can set your client to download the mail and to remove the mail from the server, like a POP3
client.
Domain Workgroup
VIRUS WARMS
If virus attacks any of the files, when you warms attacks to the files, it does not require
Open that particular file at that time it will attacks to open affected file it is directly replicated.
VLAN is a collection of nodes that are grouped together in a single broadcast domain that is based on
something other than physical location some reasons To Have Using VLAN:-
* Security: - separating systems that have sensitive data from the rest of the network decreases the
chances that other people cannot access your information.
* Projects/Special Attentions: - Managing a project or working with a specialized application can be
simplified by the use of VLAN that brings all required nodes together.
* Performance/Bandwidth: - careful monitoring of network use allows the network admin to create
VLAN that reduce nos. of router hops & increase apparent bandwidth for network users.
* Departments/Specific Job types:-companies may want VLAN set up for a department that are
heavy network users or a VLAN across a department that is dedicated tp specify users.you can create
VLAN (Name, Domain & Port Assignments).Communication between VLAN requires the use of a
router for multiple VLAN on multiple switches, you must to be able to communicate via a single link
between the switches, you must use a process called TRUNKING. It is the technology that allows
information from multiple VLAN TRUNKING PROTOCOL (VTP) is the protocol that switches use
to communicate among themselves VLAN configuration.
A Function that is often combined with a firewall is a proxy server. It is used to access web pages by
the other computers when another computer requests a web page, it is retrieved by proxy server &
then sent to the requesting computer it can also make your internet access work more effectively.
38* Minimum & Maximum RAM Required for Installing of Win 2K3?
Scalable — The Active Directory is highly scalable, which means it can function in small
networking environments or global corporations. The Active Directory supports multiple stores,
which are wide groupings of objects, and can hold more than one million objects per store.
Extensible — The Active Directory is "extensible," which means it can be customized to meet the
needs of an organization.
Secure — The Active Directory is integrated with Windows 2000 security, allowing
administrators to control access to objects.
Seamless — The Active Directory is seamlessly integrated with the local network and the
intranet/Internet.
Open Standards — The Active Directory is based on open communication standards, which allow
integration and communication with other directory services, such as Novell's NDS.
Backwards Compatible — Although Windows 2000 operating systems make the most use of the
Active Directory, the Active Directory is backwards compatible for earlier versions of Windows
operating systems. This feature allows implementation of the Active Directory to be taken one
step at
Uncountable
1- Standard Edition
2- Enterprise Edition
3- Web Edition
4- Data Centre Edition.
The purpose of LDAP is to allow network users to search and find the objects in the Active Directory
they want to use. For this to happen, the Active Directory domain controllers maintain a "global
catalog."
The global catalog allows users and applications to find objects in the Active Directory by searching
for a particular attribute(s). The global catalog holds a partial "replica" of the objects and their most
common attributes. When a user performs a search operation to find a user (or other object), the
global catalog is checked to find matches for that request. The global catalog looks for that attribute
and returns matches to the user. Data in the global catalog is built and maintained through replication
among domain Controller.
RAID is a fault tolerant method of storing data meaning that a failure can occur & the system will still
function 3 Advantages Of RAID:- Redundancy, Increased Performance, Lower Costs. These is a form
of a data backup in the storage array in case of any failure if one of the drives in the array failed, it
could either be swapped out for a new drive without turning off the system or the redundant drive
could be used.