Interview Questions
Interview Questions
Interview Questions
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 2
Hardware
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 3
1. What is CMOS?
Cmos is the Complementary metal Oxide semiconductor. Which is used
to store the Computer Hardware Settings like Date, Time and Hard
Disk Type..Etc. and it’s supported by 3 V Battery.
2. What is BIOS?
3. What is POST?
Post is the Process of BIOS Which Test the Hardware like Memory,
Hard Disk and DVD drive when the system is booting.
Intel
Mercury
Asus
Dlink
Gigabyte
6. What is the Mother Board Chipset?
It is part of Mother Board and The ICs Components like VGA, Sound
and Network Integrated in the mother Board called Mother Board Chip
sets.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 4
8. What is the maximum Memory Supported in the Mother Board?
Core: Having multiple cores means that the computer can work on
more than one task at a time more efficiently, which will help keep your
system running snappily even if you have tasks, such as an antivirus
scan or video render, running in the background.
What is clock speed? The GHz figure you’ll see represents the number
of clock cycles (calculations) a processor can manage in a second. Put
very simply, a bigger number means a faster processor. For example,
3.6GHz means 3,600,000,000 clock cycles. This figure should never be
used to compare processors from different families, generations or
manufacturers, however. Bigger is not better when comparing AMD and
Intel, or 2nd-gen to 7th-gen Intel processors: different processor
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 5
families have different levels of efficiency, so how much they get done
with each clock cycle is more important than the GHz number itself.
Cache Memory is Built inside the CPU . which is used to store the
Frequently used Information’s.
(And also Its is faster than the main memory and allows the CPU to
execute instructions and read and write data at a higher speed.)
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 6
L2 (level 2) cache - L2 cache is the next step down from L1 cache.
Most processors
today have L2 cache, which increases cache performance. Most desktop
processors
have an L2 Cache of about 256KB, but some high-end processors can
have as much as
2MB.
There are quite a few manufacturers that are producing different BIOS chips:
Award, AMI, Phoenix, and IBM. Most commonly you can find AMIs,
AWARDs and PHOENIXes. The BIOS is stored on a ROM chip.
These ROM BIOS chips can be of different measurements and look different
from each other. Check out the following two types of chips. The one on the
left is an AWARD (as stated on the sticker), while the one on the right is
a Phoenix chip.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 7
14. When you are working in windows if you get suddenly Blue
Screen Error or BSD
15. What are all the Different Types of hard Disk are available?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 8
16. What is Difference between IDE and SATA Hard Disk?
IDE SATA
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 9
18. What is difference Types memory Available?
SD Ram (Synchronous Dynamic Ram)
DDR –I (Double Data Rate)
DDR-II
DDR-III
19. What is difference Between SD and DDR-I, DDR-II, DDR-III
Ram?
BGA
Chips
(Bal
Grid
Array)
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 10
21. What is SMPS?
SMPS full form is Switching Mode Power Supply. It is a main power supply to
power the each and every component of computer or it converts the main
power supply 230volts to 12volts, 5volts, and 3volts and distribute to all
components of computer.
ATX SMPS:
ATX stands for Advanced Technology extended. They had 20pin Power
connector, this is called as ATX power connector. They were used in
Pentium-III, Pentium-IV and AMD CPUs.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 11
BTX SMPS:
BTX stands for Balanced Technology eXtended. They have 24pin Power
connector, this is also called as ATX power connector. It has 15pin SATA
power connectors. They are used in Dual core, core2duo, Quad core, i3, i5,
i7 and latest AMD CPUs.
RAMs Identification
It is very easy to identify Which is the SD RAM or DDR RAM. But in DDR RAM,
we have three types of RAM. these are difficult to identify, which is DDR-1,
DDR-2 or DDR-3.
Very easy to identify the SD RAM, SD RAMs have only two notches. so easy
to identify this is SD RAM. Any RAM chip has label. on the label, there are
some specification of RAM. is it SD RAM or not, speed and capacities are
mentioned on the label. as shown is the blow ram and label. it is SD RAM,
because it has two notches. in the label, it is mentioned as SD RAM, capacity
is 128MB and speed is 133MHz. so this is the 128MB SD RAM.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 12
How to know DDR RAM and Its speed and capacity?
DDR RAMs have single notch. so identify the DDR RAMs are easy, But DDR
RAMs are three types. so identify the DDR-1, DDR-2 and DDR-3 is difficult. so
to identify DDR RAM, Label is only way to identify is it DDR-1 or DDR-2 or
DDR-3, so DDR type, speeds and capacities are mentioned on the label. here
the RAM is DDR RAM and some label are there. DDR means DDR 1 RAM, first
label is 512MB DDR 1 RAM, second is 1GB DDR2 RAM and third is 2GB DDR3
RAM.
24. What are all the Different Type of Hard Disk Drives?
IDE Stands for Integrated Device Electronics. These drives are also called as
PATA (parallel Advanced Technology Attachment) hard drives. Hard drives
have 40pin data interface and 4 pin power connector and Jumper setting to
change drive setting to connect motherboard. These drives have low speed
and low capacity than SATA and SCSI hard drives. ATA cables are used to
connect Hard drives to motherboard. These drives capacities are 10GB, 20GB,
40GB, 80GB, 120GB, 160GB, 250GB and 320GB.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 13
SATA Hard Drives:
SATA stands for Serial Advanced Technology Attachment. These drives have
4pin data interface and 7 pin power interface to work and no jumper pins,
because no need to change drive setting. these drives have high speed and
high capacity than IDE hard drives and Low speed and low capacity than SCSI
hard drives. 4pin SATA cables are used to connect hard drives to motherboard.
These drives capacities are 80GB, 120GB, 160GB, 250GB, 320GB, 500GB, 1TB
and 2TB.
SCSI stands for Small Computer System Interface. These drives have
generally 50 to 68 pins. These drives are very high capacity and high speed
than both IDE and SATA drives. 50 to 68 pin SCSI data cables are used to
connect these hard drives. Generally these drives are used in servers.
Capacities are 160GB, 250GB, 320GB, and 500GB, 1TB, 2TB, 5TB and 10TB.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 14
25. What are all difference types of Ports are available?
Type of Ports
PS/2 Ports
Serial Port
VGA Port
Parallel Port or Printer Port
USB Ports
Ethernet Port
Audio Ports
DVI Port
eSATA Ports
Maximum all motherboards have PS/2 Ports, VGA ports, USB ports, Ethernet
Port and Audio Ports. but latest motherboards have DVI and eSATA ports.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 15
VGA Port
VGA stands for Video Graphics Array. VGA Port is also one of the back side
ports.
VGA port is used to connect monitors, Which has 15 pin in three rows. It is
always in blue color. This is also a D shape connector and This is female port.
This port is come from motherboard. when your VGA port has broken, You
must get the PCI VGA card to connect monitor. This VGA connector
supports analog and digital monitors. That means VGA , SVGA Monitors
USB Port
USB stands for Universal Serial Bus. It is a universal port and used for all
latest devices.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 16
It has 4 pins. two pins for 5volts and 2 pins for data transfer. It supports
maximum all latest devices, such as keyboards, mice, printers, scanner, pen
drives, cell phones, iPads, iPhones etc.
Symbol of USB
USB/versions
USB 1.1: Many versions from introduced USB. USB 1.1 released in 1998. It
supports 1.5 Mbitspersecond.
USB 2.0: It released in 2000. USB 1.1 has been upgraded by USB 2.0 with
Hi-Speed. It supports 480 Mbits per second. so that, this is called as hi-speed
USB.
USB 3.0: It released in 2008. It is 10 times faster than USB 2.0. speed is 5
Gbits per second.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 17
Ethernet or LAN port
Parallel Port is also called as Printer port. Because it is used for printers only.
It is a 25 Pin female port and D shape connector. It is bidirectional port, send
and receive data at a time. It supports Dot Matrix Printers only. Latest
motherboards doesn't have the parallel port.
Serial Port
Serial Port is used to connect external modems and old model serial mice.
Two serial port were in old motherboard. now all motherboards have only one
serial port. It has 9 pins, it is a male connector and D shape connector.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 18
PS/2 Ports
PS/2 Type of Port, simple PS 2 Ports. Here are the PS/2 ports, one for
keyboard and second for mice.
Some are also called as 6 pin PS/2 Ports. Maximum all motherboards have
two PS/2 Ports. Purple color PS/2 port for keyboard and green color PS/2 port
for mice device. Latest motherboard only one PS/2 Port. Purple color PS/2 port
is only for keyboard not for mice, at the same green color PS/2 port is only
for mice not for keyboard.It has 6 pins.
In older days 5 pin Din connector was used for Keyboard. PS/2 Ports are
replaced Din Port. PS/2 Ports are designed in 1987.
Front Side Bus. Another name for the system bus. The Front Side Bus connects
the CPU to main memory. A microprocessor bus that connects the CPU to
aLevel 2 cache is called Back Side Bus. Typically, a backside bus runs at a
faster clock speed than the Front Side Bus.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 19
28. What Is Packaging A Microprocessor? What Are The Different
Packaging Available?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 20
32. What Is The Use Of Conventional Memory In The System?
The size of conventional memory is 640KB. It is also called DOS memory or
Base memory. This memory is used by some small programs like Word star,
Lotus etc…DOS cannot use more than 640KB.
33. What Is Cache Memory? What Is The Advantage If A Processor
With More Cache Memory You Are Using?
Cache memory is the memory area between RAM and Processor. If cache
memory increases the speed of the system will also improve.
34. What Are The Different Types Of Ram?
RAM, DRAM, VRAM, SGRAM, DDR-SDRAM etc….
35. Computer restarts frequently what is the Problems?
SMPS Problem. Replace the power supply.
36. Hard disk not detected what could be the problems?
First we have to check the hard disk power cable then check the Hard Disk
Data Cable
Any lose contact. Then Fix them properly.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 21
37. What is different Type of Beep codes Problems?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 23
SMPS AT ATX BTX
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 24
39. How do you check the SMPS?
Find the 24 Pin connector from SMPS then We have to short the Green and
Black wire using U shape bend wire.
If SMPS fan rotates then SMPS is fine if the FAN does not rotate then SMPS
is Faulty.
Green wire is Switching Volts 3 V or called power on.
Black wire is Ground wire.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 25
40. How do you fix Hard disk related problems?
Hard disk drive is internal storage media in a computer, on which you can
install operating system and save different data. Sometimes, some problems
probably occur on a hard disk drive, in which situation you usually cannot
write data to the hard disk drive. Even worse, the hard disk drive becomes
inaccessible and does not allow you to read or copy any file.
Common hard disk drive error and problems:
Hard disk drive turns to RAW and asks to be reformatted
Hard disk drive shows I/O device error
Hard disk drive is not accessible, access is denied
Hard disk drive is not accessible. The file or directory is corrupted and
unreadable.
Device error on hard disk drive
More other hard disk drive malfunctions
Hard Disk Drive Problems Causes
You may face different kinds of problems on a hard disk drive, which usually
result from following possible reasons:
Hard disk drive contains bad sectors
Hard disk drive is attacked by virus
The parameter of hard disk drive is lost or incorrect
MBR is corrupted
Hard disk drive file system is corrupted
Symptoms of Hard Drive Error
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 26
Your computer usually pops up some error message when a hard disk drive
has errors, but sometimes you do not receive any warning message. Or a
hard disk drive sometimes stops working normally when it has problems.
How can you know that a hard disk drive has problem? Here are some
common symptoms of hard disk drive errors:
Device error or Non-System disk or disk error, Replace strike any key
when ready
HDD Controller Failure
Invalid partition table
No ROM Basic, System Halted
Error loading operating system or Missing operating system
In fact, you may meet various kinds of malfunctions on a hard disk drive,
which usually cause different troubles on your computer.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 27
Hard Disk Drive RAW Not Formatted Error
If you receive not formatted error on system partition, your computer may
be not able to boot normally. You usually need to reinstall Windows
operating system and reformat the disk drive to fix the problem. If hard disk
drive shows not formatted error on a data partition, it usually has no
influence on system partition. However, you cannot access the hard disk
drive when it asks to be formatted and changes to RAW file system.
Solution: Extract all inaccessible files from the hard disk drive without a data
recovery tool and then format the disk drive from RAW to NTFS or FAT32
Hard Disk File or Directory Is Corrupted and Unreadable Error
It pops up error message "file or directory is corrupted and unreadable"
when you double click a hard disk drive on computer. This problem usually
occurs when the partition table gets damaged.
Solution:
1. Assign a new drive letter to the partition of hard disk drive. For example,
if the hard disk drive E shows the error message, you can assign another
drive letter like F, G, etc to this partition (Please make sure that there is no
other partition has the same drive letter when you attempt to assign a new
drive letter).
2. Click "Start" > "Programs" > "Command Prompt" > enter "chkdsk /f e:"
(e: is the drive letter of the partition that shows the error message)
3. Run Windows Error-checking tool to check and repair bad sectors on the
hard disk drive which shows the error message
4. If all solutions above failed, you can format hard disk drive to fix the
problem.
Hard Disk I/O Device Error
It shows I/O device error on hard disk drive? This problem may result from
hard disk bad sectors, unformatted error, file directory corruption or I/O
address conflict, etc.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 28
1. You can install the hard disk to another computer to see if it can work. If
it still shows the same error message, it indicates that there is something
wrong with the hard disk. You need to recover all data from the hard disk
and then run error-checking tool to fix the hard drive
2. If the hard disk works well in another computer, probably it is the I/O
address conflict that causes the I/O device error. You can boot your
computer in safe mode and fix the I/O address to fix the problem.
41, System is power on, but beep sound occurs. What would be the
problem?
One long beep: Memory problem
One long and two short beeps: Video error
One long and three short beeps: Video error
Continuous beeps: Video/memory problem
Other beeps: Check the motherboard manual
42. What is Power Good Signal? Explain its functionality.
In addition to the voltages and currents that a computer needs to operate,
power supplies also provide a signal called the Power-Good signal,
sometimes written as Power_OK or Power Good or you can distinguish it by
its gray color. Its purpose is to tell the computer all is well with the power
supply and that the computer can continue to operate normally. If the
Power-Good signal is not present at startup, the CPU is held in reset state. If
a Power-Good signal goes down during operation the CPU will shutdown. The
Power-Good signal prevents the computer from attempting to operate on
improper voltages and damaging itself.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 29
Windows
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 30
1. What is the difference between Win XP and Win 7 OS.?
Windows 7 Windows XP
Real system restore No Real System restore option
Bit locker feature available No Bit locker option
(Bit locker which helps you
protect your sensitive information
from hackers)
The shutdown and the startup is Slow
very fast in Windows 7
Windows 7 provides good Less
Graphical User Interface (GUI)
components
In windows 7 there is no It is necessary to install drivers.
necessity for the drivers to be
installed
User defined themes can be in Windows XP themes cannot be
implemented in Windows 7 created by the user
provides maximum security to Windows XP this feature is not
the operating system available.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 31
Win 8 & Win 8.1
A start button included on the taskbar but doesn't open the menu. It'll take
users to the start screen when clicked
In 8.1 they really want users to sign in with a Microsoft Account and store all
their user files online via SkyDrive
3. What is minimum Hardware requirements for windows 7 ?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 32
7. What is Minimum Hardware configuration for Windows 10?
Processor: 1 gigahertz (GHz) or faster.
RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
Free hard disk space: 16 GB.
Graphics card: Microsoft DirectX 9 graphics device with WDDM driver.
8 What is new features in windows 10?
The Start Menu is Back, Baby.
Cortana Makes the Start Menu Even Smarter.
Microsoft Edge Finally Replaces Internet Explorer.
You Can Now Add Multiple Desktops.
Windows Now Has a Central Notification Center.
Universal Apps and Continuum Bridge Tablets and PCs
9. What is different version of windows 7?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 33
10. What is the advantage of using ADO?
ADO, or Active X data objects, allows developers to create applications that
can interoperate well with other data application services.
11. What is APM?
APM, or Advanced Power Management, was developed by Microsoft and Intel
as an API. This API is mainly used for power management, and is very useful
especially to those using Windows on their laptops or netbooks.
12.What is plug and play?
Plug and Play is a technology wherein hardware components that are
installed on PCs using Microsoft operating system are immediately
recognized and made usable. This means that the drivers necessary to make
it work are already available on the operating system package.
13.What is a Hotfix?
Hotfix are files that are distributed by Microsoft Customer Service. These are
intended to address issues such as bugs and errors within existing software.
14.What are DLLs?
DLL is short for Dynamic Link Library. These are shared library files that
contain usable codes and routines that other applications can utilize to
create other new applications.
15. What is registry?
Registry is a very important component of the Windows Operating System.
It stores important information, such as setup and configuration, installation
settings, and user settings.
16. What are cookies?
Cookies are small pieces of information that are stored in a browser. It
keeps track of user preference, like what sites are visited, what keywords
are used, among others.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 34
17. What is defrag?
Defrag is a system utility tool under Windows operating system that is
designed to rearrange the ordering of data on disk. This action makes the
disk run faster and access to data more efficient.
18. What is the difference between Windows XP & Windows 7?
It Support More Graphics (GUI)
It Support Bit Locker(Hard disk partitions can be Protected with
Password)
Windows Defender(Built in Virus Scanner features from Microsoft)
Parental Control,( Parents can control the Children in Windows by
Restriction on Login Timings)
Windows Touch and Tap instead of point and Click,
Multiple Active Firewall.
19. What is the Difference between NTFS and FAT32.
NTFS
Support Maximum size of partition is 2 Terabytes & more.
Maximum File size is up to 16TB.
File & folder Encryption is possible only in NTFS.
It support Disk Quota (Means we limit the disk space for Windows usres
when logged in c: and d: in Hard disk.
FAT 32
Maximum size of partition is up to 2 TB.
Maximum File size is up to 4 GB.
File & folder Encryption is not possible.
20. How will you convert FAT32 to NTFS?
To convert a volume to NTFS from the command prompt
Open Command Prompt. In the command prompt window, type
C:> convert drive_letter: /fs:ntfs
For example, typing convert D: /fs:ntfs would format drive D: with the ntfs
format.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 35
21. What are primary Partition, Extended Partition and Logical
Partition?
A primary partition contains one file system. The first partition (C:) must be
a primary partition..
An extended partition is a primary partition which contains secondary
partition(s). A hard disk may contain only one extended partition..
Extended partition that is sub divided into many drives is called as Logical
partition..
22. 10. What is Virus?
Vital Information Resource under Seige.It is an executable Program which
Performs Malicious activities in the system.
23. What is Antivirus?
An Antivirus Is a Software that protects the system from Virus Attack..
24. What is the difference between Delete and Quarantine in Action
methodology for Virus Scanning?
Delete will delete all the virus infected files and Quarantine create a copy
from an infected file and produce a new one..
25. What are the procedures for cleaning an infected virus system?
Unplug the system from the Network if it is in a Network & Scan the System
with the Updated Antivirus..
26. When system booting “NTLDR file Missing” Error. What would be
the solution?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 36
27. Explain about Windows Firewall?
Firewall Restricts the System from Unwanted User Login to the computer
thro the Internet or Local Area Network..
Members of the Administrator group have total control over the computer
and everything on it. The user named Administrator is the default account
within this group
The Power User class can perform any task except for those reserved for
Administrators. They are allowed to carry out functions that will not directly
affect the operating system or risk security
A network printer is shared by more than one computer using the IP Address
that is assigned to the printer.
A local printer is directly connected to one computer & shared using sharing
& security
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 37
32. Explain detail how to install a Network Printer?
First is the POST, this stands for Power On Self-Test, for the computer. This
process tests memory as well as a number of other subsystems. You can
usually monitor this as it runs each test. After that is complete the system
will run POST for any device that has BIOS (Basic Input-Output System).
35. One fine morning system is not able to login into domain. What
could be the problem?
10 Systems
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 38
36.What is command to view computer name?
Packet Internet Gopher is a simple command line network tool that you can
use to verify your connectivity to a network.
39. What would the problem if the system gets hanged off?
System Restore helps you restore your computer's system files to an earlier
point in time. It's a way to undo system changes to your computer without
affecting your personal files, such as email, documents, or photos.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 39
44. How Many types of NT Backup are Available?
There are Five Types of backup
1.Normal
2.Copy
3.Daily
4.Incremental
5.Differential
45. What is the differential Between Incremental and Differential
Backup?
Incremental Backup will take the Back up of incremented data and it will
clear the Archive Bit after Taking the backup.
Differential Backup will take the Back up of Differential Data and it will not
clear the Archie bit.
46. What is an ActiveX control?
ActiveX is a software component of Microsoft Windows. If you have Internet
Explorer, then ActiveX is already installed on your computer. ActiveX
controls are small programs, sometimes called add-ons that are used on the
Internet. They can enhance your browsing experience by allowing animation
or they can help with tasks such as installing security updates at Microsoft
Update.
47. What is Patch?
A patch is a piece of software designed to update a computer program or its
supporting data, to fix or improve it. This includes fixing security
vulnerabilities [1] and other bugs, with such patches usually called bug fixes
or bug fixes, and improving the usability or performance
48. What is service pack (SP)?
An Service Pack is a small set of applications with software patches or
security loops removing errors and bugs, modifying components or adding
new features. Its purpose is to improve user productivity from earlier
versions. Most major software vendors release application service packs
annually or as required.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 40
49. How do you update the patches in Windows?
Swipe in from the right edge of the screen, and then tap Search. ...
Tap or click Settings.
In the search box, type Windows Update.
Tap or click Install optional updates.
In the details pane, click Check for updates, and then wait while
Windows looks for the latest updates for your computer.
50. What are all Different types of Security updates in Windows?
There are three types of updates:
Service packs
Regular updates
Security updates
Service packs upgrade systems to the most current code base. Updates and
security updates resolve a known issue. Updates should be adopted on an
as-needed basis. They should be evaluated and applied only if computers
within the organization are experiencing the problem the update is designed
to resolve.
We recommend that organizations install critical updates and service packs
as soon as they become available.
Service Packs
A service pack is a periodic update that corrects problems in one version of a
product. In addition to correcting known problems, service packs provide
tools, drivers, and updates that extend product functionality, including
enhancements developed after the product was released. Specifically,
service packs are designed to get software users to the current code base
for the product in question. This is important because the current code base
is where developers update the code.
Service packs keep the product current, and they update and extend a
computer's functionality. Service packs may also contain a limited number of
customer-requested design changes or features.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 41
Updates
Updates are code fixes for products that are provided to individual customers
when those customers experience critical problems for which no feasible
workaround is available.
Updates are not intended for general installation, since they do not undergo
extensive beta testing when they are created. Microsoft targets update
support toward enterprise-level customers and designs it to provide an extra
level of security for mission-critical software systems. Updates may not be
distributed outside the customer organization without written legal consent
from Microsoft.
Security Updates
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 42
56. Do We Have To Uninstall The Existing Antivirus Program Before
Installing A New One?
If you are changing to a new antivirus product, you will need to uninstall the
previous antivirus scanner first.
After uninstalling, you must reboot your PC before installing the new
scanner.
If you are simply upgrading the existing antivirus software to a newer
version of the same product, there is no need to uninstall the older version
first. However, if the new version is two or more versions newer than the
old, then you will want to uninstall the old version before installing the new.
57. What is malware?
Short for malicious software.
58. What Is Meant By Malware?
A is software used or created to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
It can appear in the form of code, scripts, active content, and other
software.
Malware' is a general term used to refer to a variety of forms of hostile,
intrusive, or annoying software
What Are The Uses Of Usage Of Malware?
59.Usage of Malware:
Many early infectious programs, including the first Internet Worm, were
written as experiments or pranks.
Today, malware is used primarily to steal sensitive personal, financial, or
business information for the benefit of others.
• Malware is sometimes used broadly against government or corporate
websites to gather guarded information, or to disrupt their operation in
general.
However, malware is often used against individuals to gain personal
information such as social security numbers, bank or credit card numbers,
and so on.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 43
60.What Are The Types Of Malware?
Types of Malware:
Viruses
Trojan horses
Worms
Spyware
Zombie
Phishing
Spam
Adware
Ransomware
61. What Is A Virus?
Viruses:
A program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.
Viruses can also replicate themselves.
All computer viruses are manmade.
Viruses copy themselves to other disks to spread to other computers.
They can be merely annoying or they can be vastly destructive to your files.
62. Give Few Examples Of Viruses?
Examples of computer viruses are:
Macro virus.
Boot virus.
Logic Bomb virus.
Directory virus.
Resident virus.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 44
63.What Is Trojan Horse?give Few Examples?
Trojan horse
A Trojan horse program has the appearance of having a useful and desired
function.
A Trojan Horse neither replicates nor copies itself, but causes damage or
compromises the security of the computer.
A Trojan Horse must be sent by someone or carried by another program and
may arrive in the form of a joke program or software of some sort.
These are often used to capture your logins and passwords.
Example of Trojan Horses :
Remote access Trojans (RATs)
Backdoor Trojans (backdoors)
IRC Trojans (IRCbots)
Keylogging Trojans
64. What Are Worms?
Worms
A computer worm is a self-replicating computer program.
It uses a network to send copies of itself to other nodes (computers on the
network) and it may do so without any user intervention.
It does not need to attach itself to an existing program.
65.What Is Spyware?
Spyware:
Spyware is a type of malware installed on computers that collects
information about users without their knowledge.
The presence of spyware is typically hidden from the user and can be
difficult to detect.
Spyware programs lurk on your computer to steal important information,
like your passwords and logins and other personal identification information
and then send it off to someone else.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 45
66. What Is Zombie?
Zombie : Zombie programs take control of your computer and use it and its
Internet connection to attack other computers or networks or to perform
other criminal activities
67. What Is Phishing?
Phishing :
• Phishing (pronounced like the word 'fishing') is a message that tries to
trick you into providing information like your social security number or bank
account information or logon and password for a web site.
• The message may claim that if you do not click on the link in the message
and log onto a financial web site that your account will be blocked, or some
other disaster.
67.What Is Ransomware?
Ransomware :
Ransomware is a form of malware that essentially holds a computer system
captive while demanding a ransom.
The malware restricts user access to the computer either by encrypting files
on the hard drive or locking down the system and displaying messages that
are intended to force the user to pay the malware creator to remove the
restrictions and regain access to their computer.
68.What Is Spam?
Spam :
Spam is email that you did not request and do not want.
One person's spam is another's useful newsletter or sale ad.
Spam is a common way to spread viruses, trojans, and the like.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 46
69.What Is Adware?
Adware :
Adware (short for advertising-supported software) is a type of malware that
automatically delivers advertisements.
Common examples of adware include pop-up ads on websites and
advertisements that are displayed by software.
Often times software and applications offer “free” versions that come
bundled with adware.
70.How Malware Spreads?
Malware is a program that must be triggered or somehow executed before it
can infect your computer system and spread to others.
Here are some examples on how malware is distributed:
Social network.
Pirated software.
Removable media.
Emails.
Websites.
71. How Can You Protect Your Computer?
Install protection software.
Practice caution when working with files from unknown or questionable
sources.
Do not open e-mail if you do not recognize the sender.
Download files only from reputable Internet sites.
Install firewall.
Scan your hard drive for viruses monthly.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 47
72.What Are The Symptoms?
Symptoms:
Increased CPU usage.
Slow computer or web browser speeds.
Problems connecting to networks.
Freezing or crashing.
Modified or deleted files.
Appearance of strange files, programs, or desktop icons
Programs running, turning off, or reconfiguring themselves (malware will
often reconfigure or turn off antivirus and firewall programs) Strange
computer behavior Emails/messages being sent automatically and without
user’s knowledge (a friend receives a strange email from you that you did
not send).
There seems to be a lot of network activity when you are not using the
network.
The available memory on your computer is lower than it should be.
Programs or files appear or disappear without your knowledge.
File names are changed.
73.What Is Anti-malware Program?
Anti-Malware Program : Anti-Malware program is used to prevent, detect,
and remove computer viruses, worms, trojan horses and any other type of
malware.
Examples of Anti-Malware program:
Antivirus program.
Anti-spyware program.
Anti-spam program.
Firewall.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 48
74.What Is Antivirus Program? Give Few Examples?
Antivirus Program :
“Antivirus" is protective software designed to defend your computer against
malicious software.
In order to be an effective defense, the antivirus software needs to run in
the background at all times, and should be kept updated so it recognizes
new versions of malicious software.
Examples of Antivirus Program :
Norton Antivirus.
AVG.
Kaspersky.
Avast.
PC-Cilin.
McAffee.
Avira.
75.What Is Anti-spyware Program?what Is Anti-spam Program?
Anti-Spyware Program : Anti-spyware program is a type of program
designed to prevent and detect unwanted spyware program installations and
to remove those programs if installed.
Examples of Anti-spyware program:
Spyware Doctor.
AVG Anti-spyware.
STOPzilla.
Spysweeper.
Anti-Spam Program : Anti-spam software tries to identify useless or
dangerous messages for you.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 49
76. Explain What Is Firewall?
A firewall blocks attempts to access your files over a network or internet
connection.
That will block incoming attacks.
Your computer can become infected through shared disks or even from
another computer on the network.
So you need to monitor what your computer is putting out over the network
or internet also.
77. what does APIPA stand for and how can you tell if your computer
is using it? why would your computer be using it?
APIPA stands for Automatic Private IP Addressing, if a client machine fails to
get an IP Address Allocated by the DHCP Server, APIPA will give it a non
rout-able address in the 169.254 range
When client fails to obtain IP address from server then it automatically allots
IP address by itself. It is called APIPA.
78. What is the difference between Network Printer and Shared
Printer?
Network printer: Network printer has its own IP address. it is connected to
local area network through switch.
Shared printer: When printer is installed in one system, it is in network when
we share that printer to another system which is in same network is called
shared printer
79. If the computer restarts continuously while booting before the
appearance of login screen, what could be the cause, what are the
different methods of solving this problem?
If system restart continues please follow the below steps.
1. Check if the RAM is inserted properly or not
2. Check the CPU fan
3. Check the SMPs voltage.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 50
80 What are all windows Booting files?
NTLDR - Loader file
NTDETECT.COM - Recognizes hardware
BOOT.INI - OS menu
BOOTSECT.DOS - Alt boot sector
NTOSKRNL.EXE - Kernel
HAL.DLL
SYSTEM32CONFIG - Registry
SYSTEM32DRIVERS*.SYS - Drivers
81. What are booting files for Windows 7?
BOOTMGR – Found in the MBR this file boots up the Windows operating
system
BCD (Boot Configuration Data) - is text file that lists the available OS
found and tells the BOOTMGR where to find boot partition
WINLOAD.EXE- Loads the Windows Interface
NTOSKRNL.EXE- Windows Vista/7 Core Files
WIN.COM - Windows Vista/7 command file
HAL.DLL - Hardware Abstraction layer of Windows Vista/7
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 51
82. What is network discovery?
Network discovery is a network setting that affects whether your computer
can find other computers and devices on the network and whether other
computers on the network can find your computer.
There are three network discovery states:
• On
This state allows your computer to see other network computers and devices
and allows people on other network computers to see your computer. This
makes it easier to share files and printers.
• Off
This state prevents your computer from seeing other network computers and
devices and prevents people on other network computers from seeing your
computer.
• Custom
This is a mixed state in which some settings related to network discovery are
enabled, but not all of them. For example, network discovery could be
turned on, but you or your system administrator might have changed
firewall settings that affect network discovery.
Network discovery requires that the DNS Client, Function Discovery
Resource Publication, SSDP Discovery, and UPnP Device Host services are
started, that network discovery is allowed to communicate through Windows
Firewall, and that other firewalls are not interfering with network discovery.
If some but not all of these are true, the network discovery state will be
shown as Custom.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 52
To turn on network discovery
1. Open Advanced sharing settings by clicking the Start button, and then
clicking Control Panel. In the search box, type network, click Network and
Sharing Center, and then, in the left pane, click Change advanced sharing
settings.
2. Click the chevron to expand the current network profile.
3. Click Turn on network discovery, and then click Save changes. If
you're prompted for an administrator password or confirmation, type the
password or provide confirmation.
83. What is new features of Windows 10
Start Menu is back.
Microsoft Edge is new Web browser it replaced with old Internet Explorer.
It support creating Multiple Desktops.
Central Notification Center
Universal Apps and Continuum Bridge Tablets and PCs
85. What is the Difference Between 32bit and 64bit version of
windows ?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 53
Windows Server Interview Questions
Navigate to Local User and Groups add the domain users to administrators
group in the local system.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 54
6. What is DNS Server?
Domain Name System is used to resolve domain name to IP Address and
also used to resolve IP Address to Domain Name. It has two zones Forward
and Reverse Lookup Zone. Forward Lookup Zone resolve Domain name to IP
address. Reverse Lookup Zone is used to resolve IP address to Domain
Name. Some records associate with DNS
A Record binds Name with IP Address
PTR Record binds IP Address to Name
7. Why DNS server is required for Active Directory?
The key reason for integrating DNS with AD is that client server
communication takes place with Domain Name. Network needs IP address to
reach the destination; In order to resolve Domain Name to IP Address we
need DNS Server. If DNS Server is not configured properly the network
becomes slow.
8. What is the Purpose of A and PTR Record?
A Record OR Host Record is used to bind a Name with IP Address.
PTR Record is used to bind an IP Address with Name.
9. What is the purpose of DHCP Server?
DHCP Server is used to assign IP address automatically to all the clients’
computers. It is useful in large enterprise network, where we may not able
track the IP address and also used to avoid IP conflict.
Active Directory has five special roles which are vital for the smooth running
of AD as a Multi master system. Some functions of AD require there is an
authoritative master to which all Domain Controllers can refer to. These
roles are installed automatically and there is normally very little reason to
move them, however if you de-commission a DC and DCPROMO fails to run
correctly or have a catastrophic failure of a DC you will need to know about
these roles to recover or transfer them to another DC.
The forest wide roles must appear once per forest, the domain wide roles
must appear once per domain.
The Roles
There are five FSMO roles, two per forest, three in every Domain. A brief
summary of the role is below.
Schema Master
The schema is shared between every Tree and Domain in a forest and must
be consistent between all objects. The schema master controls all updates
and modifications to the schema.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 56
Domain Naming Master
When a new Domain is added to a forest the name must be unique within
the forest. The Domain naming master must be available when adding or
removing a Domain in a forest.
When moving objects between domains you must start the move on the DC
which is the RID master of the domain that currently holds the object.
PDC Emulator
It is also the password master (for want of a better term) for a domain. Any
password change is replicated to the PDC emulator as soon as is practical. If
a logon request fails due to a bad password the logon request is passed to
the PDC emulator to check the password before rejecting the login request.
Infrastructure Master
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 57
Enter in ntdsutil
At the ntdsutil command prompt enter in roles
At the fsmo maintenance prompt enter in connection
At the server connections prompt enter in connect to
domancontrollername
At the server connections prompt enter in quit
At the fsmo maintenance prompt enter in transfer schema master
Quit from the console
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 58
20. What ports are used by DHCP and the DHCP clients?
Requests are on UDP port 68, Server replies on UDP 67.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 59
29. What is Minimum Configuration hardware configuration for
Windows 2012 server
CPU-Pentium-IV-!ghz
RAM 1 GB
HDD free Space 20 GB.
File Transfer Protocol is used transfer large volume of files and huge number
of files simultaneous between different geographic locations.
34. Specify the Port Number for AD, DNS, DHCP, HTTP, HTTPS, SMTP,
POP3 & FTP
AD - 389
DNS - 53
DHCP Server- 67,
DHCP Client -68
HTTP - 80
HTTPS - 443
SMTP - 25
POP3 - 110
FTP - 21,22
35. Explain Virtual Directory in IIS?
A virtual server can have one home directory and any number of other
publishing directories. These other publishing directories are referred to as
virtual directories.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 61
38. What command is used to clear DNS cache in client PC?
Ipconfig /flushdns
Only when installing active directory and DNS in the same server (AD
Integrated Zones) we can select Secure Dynamic Updates. Then all the
records will automatically be updated in DNS. Since all the information is
validated in active directory there will not be any duplicate or unwanted
records
40. Explain FRS in detail.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 62
45. What is the difference between Dynamic Disk and Basic Disk?
Basic Disk: Basic Disk uses a partition table to manage all partitions on the
disk, and it is supported by DOS and all Windows versions. A disk with
installed OS would be default initialized to a basic one. A basic disk contains
basic volumes, such as primary partitions, extended partition, and all logical
partitions are contained in extended partition.
46. If the Client machine does not receive the IP Address from DHCP
server how do you troubleshoot?
We have to go command Prompt and type the following command.
Ipconfig /renew
47. What is “hosts” files?
The lmhosts files are a computer file used in an operating system to map
NetBIOS name. It is equivalent that of WINS.
49. Explain About Global Catalog.
global catalog contains a complete replica of all objects in Active Directory
for its Host domain, and contains a partial replica of all objects in Active
Directory for every other domain in the forest.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 63
50. Name some OU design considerations.
53. By default, if the name is not found in the cache or local hosts
file, what is the first step the client takes to resolve the FQDN name
into an IP address?
DNS Issues
55. Describe how the DHCP lease is obtained.
It’s a four-step process consisting of (a) IP request, (b) IP offer, (c) IP
selection and (d) acknowledgement.
57. We’ve installed a new Windows-based DHCP server, however,
the users do not seem to be getting DHCP leases off of it.
The server must be authorized first with the Active Directory.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 64
56. I can’t seem to access the Internet, don’t have any access to the
corporate network and on ipconfig my address is 169.254.*.*. What
happened?
The 169.254.*.* netmask is assigned to Windows machines running
98/2000/XP if the DHCP server is not available. The name for the technology
is APIPA (Automatic Private Internet Protocol Addressing).
What is Roaming profile?
Roaming Profiles is used to allow users of an Active Directory Domain to
access their desktop and documents from any PC of the domain.
What is the Difference between Local profile and Roaming profile?
A Local profile is a folder that contains all the settings pertaining to a user’s
working environment. By default, the profile is stored in the C:\Users
directory.
A roaming profile, on the other hand, is stored on a network instead on the
local drive of the machine where you are logged. A Roaming profile is cached
locally by default. The advantage of a roaming profile is that a user can log
into any machine in the domain and have a consistent working environment.
A profile has two types of content:
Files and folders, NTUSER.DAT
The concept of a roaming profile is that the user’s profile is stored on a file
share, and it is downloaded from the file server whenever a user logs in,
doesn’t matter on which machine. It is cached in C:\Users on the computer
that the user is logged into.
When the user is logged out, the content changes of the profile are saved
back to the file server.
What is Mandatory profile?
A mandatory user profile is a roaming user profile that has been pre-
configured by an administrator to specify settings for users. Settings
commonly defined in a mandatory profile include (but are not limited to):
icons that appear on the desktop, desktop backgrounds, user preferences in
Control Panel, printer selections, and more. Configuration changes made
during a user's session that are normally saved to a roaming user profile are
not saved when a mandatory user profile is assigned.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 65
58. How do you configure mandatory profiles?
Page File Is Storage Space For The Virtual Memory, Page File Uses Hard Disk
Space As a Memory To Provide Memory Allocation...
61. Where are group policies stored?
%SystemRoot%System32\Group Policy
64. You change the group policies, and now the computer and user
settings are in conflict. Which one has the highest priority?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 66
Microsoft
Mail Client
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 67
1). How to configure Outlook?
To configure we need basic following Things.
1. Email ID and Password
2. POP3 and SMTP protocols.
Then we have to follow the steps:
First we have to open control Panel then select Mail then select Add email
then provide Email ID and password the provide the POP3 and SMTP
protocols it will get configured.
POP3 means Post Office Protocol 3 is a protocol that offers a simple way
for users to use mailboxes and download messages to their computers. It
allows users to download mails from the mail server to the local server and
enables you to read the mail even if you are offline.
SMTP or Simple Mail Transfer Protocol allows you to send emails and not to
receive them, it act as Mail Transfer Agent (MTA) to deliver your e-mail to
the recipient’s mail server.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 68
6) Explain how to create an e-mail signature in an Outlook?
Preview message in the message list: You can figure it out from
the message list itself, what message to read and what to be ignored,
as you can see a little description of mail on the mailing list.
Quicker respond with inline replies: Just with one click you can
reply to the mail sender and act as a real-time chat
8) Explain how you can access AOL e-mail account with Outlook?
PST is the personel storage file which is used to store all the outlook
messages.
An OST file (.ost) is an offline folder file in Microsoft Outlook. Offline folders
make it possible for the user to work offline and then to synchronize changes
with the Exchange server the next time they connect. The ability to work
offline is useful in environments with limited or unreliable connectivity.
On the other hand, PST stands for Personal Storage Tables. These are also
known as personal folders or personal files. It is not created by Outlook or
the Exchange server. Instead, you (or any user, for that matter) can create
it to store all your emails, contacts, calendar entries etc. These PST files can
be stored anywhere in your computer and it makes it that much easier for
you to keep a backup copy of your PST files or move it from one computer to
another.
Until Outlook 2002, a PST file could hold only upto 2GB of data. And as it
approached that limit it would start to become unstable. But from Outlook
2003 onwards, it could hold up to 10 times that limit.
If, at any point of time your PST files become unstable, you can still repair it
using the Scanpst.exe utility, which you can find when you run a search in
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 70
your computer. It is a fairly easy process. All you need to do is to follow the
onscreen instructions.
Similarly, if your OST file happens to become corrupted, you can scan it and
repair it with the Scanost.exe utility. You will find it when you search for it in
your computer.
Step 1: To start backing up your files in Outlook 2013 and 2016, click the
File menu and select Open & Export from the left-hand menu.
Step 2: Click the Import/Export button to open the Import and Export
Wizard, which will also kick you out of the touch-friendly menu system — it’s
best to have a conventional keyboard and mouse or touchpad for the
following steps. In Outlook 2010, click File, select Options, and click
Advanced.
Step 3: Click Export to open the wizard. The following steps are identical for
all three versions of Outlook.
Step 4: Select Export to a file from the action list and click Next, which will
result in two options. Select Outlook Data File (.pst), and click Next again.
On the next screen, select which files and folders you want to back up. Most
of the time, you’ll want to create a complete backup of the files for one
account. To do this, simply click the email address associated with the
account, the first item in the list, and click Next. Make sure that Include
subfolders is checked so that you capture all the information.
Step 5: If you want greater control of what’s backed up, click an individual
mail folder, the Contacts or Calendars section, or any of the other options in
the list. By default, all of the folders within a selected folder will be backed
up as well. To disable this behavior, uncheck the box marked include
subfolders. To remove specific email messages from the backup, such as
mail sent to or from your personal address, click filters. On this screen, you
can create a search by word, subject or body field, to or from address, or
time. More advanced filters, including size, flags, and importance ratings,
are available via the More Choices and Advanced tabs. When you’re finished
setting up your filters, click OK to return to the export menu.
Step 6: The next screen allows you to select the location and name of your
backup file. Click Browse, then navigate to the folder you want, name the
file, and click OK. The browser window will then close.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 71
Step 7: Click Finish. You can add a password to this file for extra security, or
leave both fields blank if you don’t want to assign a password. Then, click
OK to create the backup file. Keep in mind that it may take a few seconds if
you have a ton of emails stored in Outlook.
Using the Tool called scanpst.exe we can repair the PST file.
C:\Users\admin\AppData\Local\Microsoft\Outlook\Outlook.pst
An Archive is a way to reduce the size of your Outlook Data File when the
amount of email you keep starts to tax your computers resources, causing it
to slow down. Unlike a traditional backup in which a copy is made, archived
items are moved to a separate Outlook Data File and set aside to be
accessed when needed.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 72
16) what is the Difference between Outlook and Outlook express?
Open Outlook.
In the window that opens you can change the settings to Archive:
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 73
All your folders and subfolders.
Click OK and the Archive file will be created and attached to Outlook.
The Archive process will then run using the settings you previously entered.
All email received before the date you selected will be moved to the Archive
file. If the email being Archived is in a folder named John Doe, it will be
stored in a folder named John Doe in the Archive file. If a folder does not
have email old enough to be Archived, the folder will not be created in the
Archive file until it does.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 74
Note: To see if the Archive process is running, look at the lower right-hand
corner of the Outlook screen.
When the Archive process has finished, right-click on the Archive and select
Close"archive".
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 75
14) Mention what is the short cut used to undelete a message in an
Outlook?
15) Mention what is the short cut for switching to tasks and
switching to mail in Outlook 2013?
In the main window, tap on options NEW, now click the arrow right of
the NEW button and select Meeting Request
Click on options and then recurrence
Select the type of details from your options and then click OK
Enter the recipient’s mail address and then click send
Go to the main menu, tap on tools option and select “options” tab
It will open a window, under preference tab; you will have the option,
“Junk E-mail” and “E-mail options.”
If you click on “junk e-mail” option, it will open another window
In this window, you can choose the option and click on the checker’s
box the way you required like “permanently delete suspected junk
emails” or “disable links and other functionality in phishing messages.”
In the end, tap on “Apply” and then click “OK”.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 76
18) what is office 365?
Through that you can login and use all features of office 365 like word,
excel, PowerPoint and Mail.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 77
4. Using your mouse as a laser pointer for better PowerPoint
presentations
Use a simple keyboard shortcut (Ctrl+P) to turn your mouse into a laser
pointer during your PowerPoint presentations. You can also use the
Presenter Mode commands. This feature has been part of PowerPoint for
years, but was recently integrated for touch-screen devices. If you hold your
finger or stylus down on the device, the red button fake laser pointer will
appear.
5. Power Map in Excel: Turning data into a map
Power Map is part of the powerful and interactive data visualization features
in Excel, which are enhanced with Power BI, the solution for analyzing,
visualizing and sharing data insights. You can turn rows of data into a 3D
interactive map with Power Map, which includes the ability to filter data
using three different filters: List, Range, or Advanced.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 78
8. 50GB of email storage
Each user gets 50GB of storage with Exchange Online for email, calendar,
tasks, notes, contacts and attachments. You can save more space in your
mailbox by using the OneDrive cloud storage to share attachments.
9. Intelligent email inbox that can de-clutter itself
Microsoft’s Clutter feature will use your mailbox rules to automatically
organize your email so high-priority messages are visible first. Other email
will be moved to the Clutter folder so you can view it later.
10. Working anywhere from any device
You get the Office Web Apps with your Office 365 subscription, so you can
work on your cloud files from any up-to-date Web browser on an Internet-
connected computer. You don’t have to install the Office software on the
computer.
You also get access to Office Mobile Apps so you can use Word, Excel,
PowerPoint, Outlook and OneDrive directly from your smartphone or tablet
while you’re on the move! Download them from your Android or iOS device
store.
20. if Out look is Too slow how do you troubleshoot?
This is the most common of Outlook’s problems. Over time, emails, notes,
calendar entries, attachments etc. keep piling up in the Outlook PST making
it abnormally large in size. It eventually reaches to such an extent that
working with Outlook becomes nearly impossible due to its utterly slow
speed.
Solution – The first solution here is to starve the PST. You need to remove
any and everything that is causing the PST to bloat up. Find out the folder
called “Larger Than 100 Kb” in Outlook 2007, it will contain all emails that
are larger than 100 Kb. Delete all unwanted old emails (especially the ones
with bulky attachments). If you really need an attachment, save it to the
disk but clear it out of the PST. Also, delete all other unwanted emails and
clear out the Trash.
The second thing that could do wonders is Archiving. Archive your emails by
year. This will save large amounts of data to your disk relieving the PST of
its burden.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 79
21.) Outlook crashes unexpectedly Crashed?
It’s ironical how something that’s meant to help can itself become a cause of
the trouble. Many Outlook add-ins claim to help around with Outlook’s working
and make things easier for you but heaven turns into hell when any of the
add-ins corrupt. Sadly quite a few add-ins have bugs and many are poorly
written. A corrupted add-in can cause Outlook to crash without warning. And
if you were in the middle of composing a rather long and important email, the
frustration can be imagined. Installing too many add-ins can make Outlook
slow too.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 80
23 Explain how to create an e-mail signature in an Outlook?
To set an e-mail signature in an Outlook
In the main menu under TOOLS, click on OPTIONS
Go to the MAIL FORMAT tab and click signature
Under signature tab, click NEW
Type the new signature’s desired name and the click OK
Type the desired text of your under “EDIT SIGNATURE” and then click OK
and click OK again
24.) Given below are some of the commonly used MS Outlook ‘Run’
Commands:
Click Start then choose Run then type each of the following commands
followed by <<Enter>>
1: Outlook /Safe (Opens the outlook in Safe mode)
2: Outlook /Cleanprofile (cleans the profile)
3: Outlook /cleanfreebusy (while using meeting planner to check the free-
busy information)
4: Outlook /cleanreminders (Clean the reminders)
5: outlook /cleanviews
25.) How Much Mail Can Be Stored In Each Mailbox?
The recommendation is 5000 messages per folder.
26.) What Is IMAP Protocol?
IMAP (Internet Message Access Protocol): Is a standard protocol for
accessing e-mail from your local server. IMAP is a client/server protocol in
which e-mail is received and held for you by your Internet server. As this
requires only a small data transfer this works well even over a slow
connection such as a modem.
Only if you request to read a specific email message will it be downloaded
from the server. You can also create and manipulate folders or mailboxes on
the server; delete messages etc.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 81
27.) Explain Email Ports?
For networks, a port means an endpoint to a logical connection. The port
number identifies what type of port it is. Here are the default email ports
for: –
POP3 – port 110
IMAP – port 143
SMTP – port 25
HTTP – port 80
Secure SMTP (SSMTP) – port 465
Secure IMAP (IMAP4-SSL) – port 585
IMAP4 over SSL (IMAPS) – port 993
Secure POP3 (SSL-POP) – port 995
28.) How To Backup Your .pst File?
Outlook stores each user’s folders, messages, forms, and files in a special
file known as a Personal Folder file. You can save, copy, and even move a
Personal Folder (.pst) file, although you shouldn’t move it unless you have a
specific reason for doing so and know what you’re doing. Use Windows
Search to find the file quickly using the search string *.pst. Usually, this file
is on the local drive.
Backing up your .pst file occasionally is a good idea. How often depends on
you. But if you get a lot of important mail, every day isn’t too often. To back
up your Personal Folder file and all its subfolders, simply export it, as
follows:
Choose Import and Export from the File menu to launch the wizard.
Choose Export To A File from the Choose An Action To Perform list and
click Next.
Select Personal Folder File (.pst) from the Create A File Of Type list and
click Next.
Choose Personal Folders from the Select The Folder To Export From list.
Check the Include Subfolders option and click Next.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 82
Specify a folder and filename for the backup file.
From Options, specify how to treat duplicate items.
Click Finish.
29) Main difference in POP3 and IMAP4 are as follows.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 83
1
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 84
1) Describe the layers of OSI model?
OSI model stands for Open System Interconnection It is a framework which
guides the applications how they can communicate in a network.
OSI model has seven layers. They are listed below,
Physical Layer (Deals with transmission and reception of unstructured data
through a physical medium)
Data Link Layer (Helps in transferring error-free data frames between
nodes)
Network Layer (Decides the physical path that should be taken by the data
as per the network conditions)
Transport Layer (Ensures that the messages are delivered in sequence and
without any loss or duplication)
Session Layer (Helps in establishing a session between processes of
different stations)
Presentation Layer (Formats the data as per the need and presents the
same to Application layer)
Application Layer (Serves as the mediator between Users and processes of
applications).
2.)What is TCP/IP?
TCP/IP is Transport control protocol and Internet protocol this contains Four
layers
Transport, Network,Datalink,Physical layers.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 85
2) Explain various types of networks based on their sizes?
Size of the Network is defined as the geographic area and the number of
computers covered in it. Based on the size of the network they are classified
as below,
Based on the size of the Network they are classified as below,
Local Area Network (LAN): A network with a minimum of two computers
to a maximum of thousands of computers within an office or a building is
termed as LAN.Generally, it works for a single site where people can share
resources like printers, data storage etc.
Metropolitan Area Network (MAN): It is larger than LAN and used to
connect various LAN’s across small regions, a city, campus of colleges or
universities etc which in turn forms a bigger network.
Wide Area Network (WAN): Multiple LAN’s and MAN’s connected together
form a WAN. It covers a wider area like a whole country or world.
3) Define various types of internet connections?
There are three types of internet connections. They are listed below
1) Broadband Connection – This type of connection gives continuous
high-speed internet. In this type, if we log off from the internet for any
reason then there is no need to log in again.
Eg: Modems of cables, Fibres, wireless connection, satellite connection etc.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 86
4) Few important terminology we come across networking concepts?
Below are few important terms we need to know in networking
Network – A set of computers or devices connected together with a
communication path to share data.
Networking – The design and construction of a network are termed as
networking.
Link – The physical medium or the communication path through which the
devices are connected in a network is called as a Link.
Node – The devices or the computers connected to the links are named as
nodes.
Router / Gateway – A device/computer/node that is connected to different
networks is termed as a Gateway or Router. The basic difference between
these two is that Gateway is used to control the traffic of two contradictory
networks whereas router controls the traffic of similar networks.
The router is nothing but a switch which processes the signal/traffic using
routing protocols.
Protocol – A set of instructions or rules or guidelines that are used in
establishing communications between computers of a network is called as
Protocol.
Unicasting – When a piece of information or a packet is sent from a
particular source to a specified destination then it is called as Unicasting.
Anycasting – Sending the datagrams from a source to the nearest device
among the group of servers which provide the same service as the source is
termed as Anycasting.
Multicasting – Sending one copy of data from a single sender to multiple
clients or receivers (selected clients) of the networks which are in need of
such data.
Broadcasting – Sending a packet to each device of the network is termed
as broadcasting.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 87
5) Explain the characteristics of networking?
The main characteristics of networking are mentioned below,
Topology: This deals with how the computers or nodes are arranged in the
network. The computers are arranged physically or logically.
Protocols: Deals with the process how the computers communicate with
one another.
Medium: This is nothing but the medium used by the computers for
communication.
6) Name the different types of Network Topologies and brief its
advantages?
Network Topology is nothing but the physical or logical way in which the
devices (like nodes, links, and computers) of a network are arranged.
Physical Topology means the actual place where the elements of a network
are located.
Logical Topology deals with the flow of data over the networks. A Link is
used to connect more than two devices of a network. And more than two
links located nearby forms a topology.
The network topologies are classified as mentioned below
1) Bus Topology: In Bus Topology, all the devices of the network are
connected to a common cable (also called as the backbone). As the devices
are connected to a single cable, it is also termed as Linear Bus Topology.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 88
2) Star Topology: In Star Topology, there is a central controller or hub to
which every node or device is connected through a cable. In this topology,
the devices are not linked to each other. If a device needs to communicate
with the other, then it has to send the signal or data to the central hub. And
then the hub sends the same data to the destination device.
The advantage of the star topology is that if a link breaks then only that
particular link is affected. The whole network remains undisturbed. The main
disadvantage of the star topology is that all the devices of the network are
dependent on a single point (hub). If the central hub gets failed, then the
whole network gets down.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 89
3) Ring Topology: In Ring Topology, each device of the network is
connected to two other devices on either side which in turn forms a loop.
Data or Signal in ring topology flow only in a single direction from one device
to another and reaches the destination node.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 90
4) Mesh Topology: In a Mesh Topology, each device of the network is
connected to all other devices of the network. Mesh Topology uses Routing
and Flooding techniques for data transmission.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 91
10) What are the basic differences between Internet, Intranet and
Extranet?
The terms Internet, Intranet and Extranet are used to describe how a
network application should be accessed. In Internet anyone can access the
application from anywhere in world. In Intranet only the authorized users
from the company for which the application was built can access the
application. In Extranet selected external users are allowed to access the
application which was built for Internet.
11) A company has offices in Jaipur and Delhi. What type of
computer network it will use to connect these offices?
WAN (Wide Area Network) network is used to connect the networks which
are spread over the different geographical location.
12.) What is the backbone network?
The network which connects two or more networks together is considered as
a backbone network. Usually backbone network contains high speed data
transferring devices such as routers and switches. Backbone network should
never be used for end user connectivity. The network which provides end
user connectivity should be connected through the backbone network.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 92
17) What is the maximum data transmission speed of Category 2,
Category 3 and Category 4 in UTP cable?
UTP cable has four pairs of wires. Each pair has two wires, twisted with each
other. So there are total eight wires in UTP cable.
How many wires are used for data transmission in UTP cable?
Only four wires from eight wires are used in data transmission.
19) Which wires are used for data transmission in UTP cable?
The wires 1, 2, 3 and 6 are used for data transmission in UTP cable. The
wires 1 and 2 are used to transmit the data while wires 3 and 6 are used to
receive the data.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 93
21) How Straight-through UTP cable is built?
In Straight through UTP cable all pins are matched on both sides. Pin-1
connects with Pin-1; Pin2 connects Pin2, this way each pin connects with the
same number of pin on other side.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 94
22)Where do we use Straight-through UTP cable?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 95
24) How Cross-over cable is built?
In Cross-over cable the pins which send data from one end connect with the
pins which receive data on other end. Pin1 connects with Pin3 while Pin2
connects with Pin6.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 96
25)Where do we use Cross-over cable?
Hub/Switch to Hub/Switch
System to System
Router to Router
Router to System
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 97
26) What is FTP and what port does it use?
FTP or File Transfer Protocol, is one of the big legacy protocols that probably
should be retired. FTP is primarily designed for large file transfers, with the
capability of resuming downloads if they are interrupted. Access to an FTP
server can be accomplished using two different techniques: Anonymous
access and Standard Login. Both of these are basically the same, except
Anonymous access does not require an active user login while a Standard
Login does. Here’s where the big problem with FTP lies however- the
credentials of the user are transmitted in cleartext which means that
anybody listening on the wire could sniff the credentials extremely easily.
Two competing implementations of FTP that take care this issue are SFTP
(FTP over SSH) and FTPS (FTP with SSL). FTP uses TCP ports 20 and 21.
SSH or Secure Shell is most well known by Linux users, but has a great deal
that it can be used for. SSH is designed to create a secure tunnel between
devices, whether that be systems, switches, thermostats, toasters, etc. SSH
also has a unique ability to tunnel other programs through it, similar in
concept to a VPN so even insecure programs or programs running across
unsecure connections can be used in a secure state if configured correctly.
SSH runs over TCP port 22.
28) Name Three Steps Which You Would Use To Troubleshoot Ftp
Server Related Problems.
Test basic connectivity with ping, Check with nmap if the ports are open (20
and 21). Check if a firewall is restricting traffic to the server.
Straight Cable
Cross Cable
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 98
30) What Is A Cross Cable?
Its used to connect same type of devices without using a switch/hub so that
they can communicate.
The theoretical length is 100 meters but after 80 meters you may see drop
in speed due to loss of signal.
32) What Would You Use To Connect Two Computers Without Using
Switches?
Cross cable.
From the output we can find out the IP address, DNS IP address, gateway IP
address assigned to that computer.
When DHCP server is not available the Windows client computer assigns an
automatic IP address to itself so that it can communicate with the network
computers. This ip address is called APIPA. It’s in the range of 169.254.0.0
to 169.254.255.255
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 99
35)What Is Ping Utility?
Logical Address : It’s Called as Ip Address (IPv4 -32 bit & IPv6 -128 bit)
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 100
37)What Is The Difference Between Public And Private Ip
Addresses?
Public IP addresses:
Private IP addresses:
10.0.0.0 10.255.255.255
172.16.0.0 172.31.255.255
192.168.0.0 192.168.255.255
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 101
38) What Is A Gateway?
A default gateway is a routing device used to forward all traffic that is not
addressed to a destination within the local network or local subnet. If you
don’t have a default gateway, it is not possible to communicate with the
network device/host of different networks.
C:\ getmac
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 102
42) What is Difference between Hub and Switch?
Routers are small electronic devices that join multiple computer networks
together via either wired or wireless connections.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 103
44) What are the Router ports or Interfaces?
Serial: Serial interfaces are typically used for WAN connections from ISP
(Internet Service Providers) for connectivity types like Frame Relay, T1, T3,
etc
Router uses the following Routing protocols to transmit the data from one
network to another network:
RIP, IGRP, OSPF, EGP, EIGRP, BGP and IS-IS routing protocols
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 104
46) what is the difference between Router and Switch?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 105
47) What is VLAN ?
A virtual LAN (Local Area Network) is a logical subnet work that can group
together a collection of devices from different physical LANs. Larger business
computer networks often set up VLANs to re-partition their network for
improved traffic management.
48) What is the Advantages of VLAN?
VLANs provide a number of advantages, such as ease of administration,
confinement of broadcast domains, reduced broadcast traffic, and
enforcement of security policies.
VLANs provide the following advantages:
VLANs enable logical grouping of end-stations that are physically dispersed
on a network.
When users on a VLAN move to a new physical location but continue to
perform the same job function, the end-stations of those users do not need
to be reconfigured. Similarly, if users change their job functions, they need
not physically move: changing the VLAN membership of the end-stations to
that of the new team makes the users' end-stations local to the resources of
the new team.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 106
49) Important network command:
IPCONFIG: find out your IP Address, find your Default Gateway and
find your Subnet Mask.
Network Layer
Physical Layer Device Data Link Layer Device
Device
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 107
51) Important TCP Services and Port Numbers?
Telnet 23
2
3 SMTP 25
DNS 53
4
DNCP server 67
5
6 DHCP Client 68
7 HTTP 80
8 HTTPS 443
RDC 3389
14 Remote
Desktop
connections
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 108
ITIL
(Information Technology Infrastructure Libraries)
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 109
ITIL
(Information Technology Infrastructure
Libraries)
___________________________________________
What is ITIL?
The ITIL (Information Technology Infrastructure Library) framework is
designed to standardize the selection, planning, delivery and support of IT
services to a business. The goal is to improve efficiency and achieve
predictable service levels. The ITIL framework enables IT to be a business
service partner, rather than just back-end support.
Basics IT Service Management Terminology & Key Concepts
Services: It is a means of delivering value to customers without requiring
the customer to own specific costs and risks.
Service Management: It is a set of specialized capabilities for delivering
value to customers in the form of services.
Service Assets: Service Assets or assets refer to the ‘resources’ and
‘capabilities’ which a Service Provider must allocate in order to offer a
service.
Value, Utility and Warranty: The value of a service consists of two
components: utility and warranty. Services must offer both utility and
warranty in order to have value. Utility, also called ‘fitness for purpose’,
refers to the ability of the service to remove constraints or increase the
performance of the customer. Warranty, also called ‘fitness for use’ is the
ability of the service to operate reliably.
Processes: Processes are structured sets of activities designed to achieve a
specific objective. The four basic characteristics of processes are:
1) They transform inputs into outputs
2)They deliver results to a specific customer or stakeholder
3) They are measurable
4)They are triggered by specific events
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 110
Functions: Functions are self-contained subsets of an organization intended
to accomplish specific tasks. They usually take the form of a team or group
of people and the tools they use.
Roles: Roles are defined collections of specific responsibilities and privileges.
Roles may be held by individuals or teams.
Resources: Resources are the raw materials which contribute to a service,
such as money, equipment, time, staff etc.
Capabilities: Capabilities are the specialized skills or abilities an
organization applies to resources in order to create value.
The ITIL Service Lifecycle
The entire framework of ITIL is divided into five broad
components/categories:
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 111
These components form the skeleton of the ITIL Service Lifecycle.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 112
ITIL Key Concepts: Processes, Functions
The five broad components of the ITIL Service Lifecycle cover various other
sub-categories/aspects, including Demand Management, Capacity
Management, Release Management, Incident Management, Event
Management, and so on. These are aspects that are meant to cover all areas
of ITSM (IT Service Management).
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 113
ITIL Core Components
Service Strategy Process
4) Strategy Operations:
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 114
Service Design
The Service Design lifecycle phase is about the design of services and all
supporting elements for introduction into the live environment.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 115
Operational Level Agreements (OLAs) are performance agreements
nearly identical in nature to SLAs
Availability Management
Capacity Management
IT Security Management
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 116
Authenticity -- Assurance that the transactions and the identities of
parties to transactions are genuine Non-Repudiation -- Assurance
that transactions, once completed, may not be reversed without
approval
Supplier Management
Service Transition
In this phase of the lifecycle, the design is built, tested and moved into
production to enable the business customer achieve the desired value. This
phase addresses managing changes: controlling the assets and configuration
items (the underlying components such as hardware, software, etc.)
associated with the new and changed systems, service validation, and
testing and transition planning to ensure that users, support personnel and
the production environment have been prepared for the release to
production.
Change Management
The objective of this process activity is to control the lifecycle of all the
changes. The primary objective of Change Management is to enable
beneficial changes to be made with minimum disruption to IT services.
Change Evaluation
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 117
Project Management (Transition Planning and Support)
Application Development
This makes available the applications and systems which provide the
required functionality of IT services. This process includes the
development and maintenance of custom applications as well as the
customization of products from software vendors.
This ensures that deployed Releases and the resulting services meet
customer expectations, and to verify that IT operations is able to
support the new service.
Knowledge Management
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 118
Service Operation
Event Management
Incident Management
Request Fulfillment
Access Management
Problem Management
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 119
IT Operations Control
Facilities Management
Application Management
Technical Management
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 120
Continual Service Improvement (CSI)
Service Review
Process Evaluation
CSI Initiatives
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 121
Ticketing Tools
What is an Incident?
All this talk of incidents, service requests, and how we refer to them leads us
to another common question…
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 122
What is a Ticket?
When an incident occurs, a user submits a “ticket.” The service desk works
the ticket according to workflows the organization has set up. Simply put,
the incident is the event, and the ticket is the documentation of the event. It
is the physical (err… digital) vehicle through which your service desk is
alerted of an incident and responds to it.
Service requests are not tickets. Service requests are made from a number
of predetermined items that the organization has made available to its users
through the service catalog. There’s no need to “create a ticket” to describe
a service request. Your organization is already familiar with this type of
request, which is why they built it out and made it available in the service
catalog.
Support Priorities are assigned to all tickets and take the entire service and
our user base into context when assigned. The following table shows
examples of support request response times and assigned priorities.
Remember that you can change an assigned priority at any time and that
the answers to the most common requests are available in the
Knowledgebase at http://support.proofpointessentials.com. The support
team reserves the right to change the priority pending review of the criteria
of your ticket per the table below. You will be notified via a comment in the
ticket if any priority changes are made.
Please remember that in your terms of service, your company, our partner,
shall provide tier 1 support for your end-users. Proof point Essentials
Support will assist in finding a solution for you only after tier 1 resources
have been exhausted. Direct end-user support will not be provided and any
direct contact will be deferred back to our partner for assistance.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 123
Different types of Tickets Priority levels
Help desk best practices suggest that SLA policies be driven by ticket
priorities. In Freshservice you can define your service levels for Urgent,
High, Moderate and Low priority tickets. You can then use various
automations in Freshservice or manually dictate which ticket constitutes an
Urgent Priority issue and which is Low Priority.
Target Response
Priority Definition and Typical Examples
Time
General questions or feature requests
1 Business Week
P4
Questions relating to the Proofpoint
Essentials platform and its operations which
are for information purposes only.
Single group/domain affected. Other email
received by and sent by subscribing
customers unaffected.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 124
Editing SLA policies
The default SLA policy in Freshservice will be applicable to all tickets coming
in to your helpdesk. It will define the due by time on your ticket based on
your the priorities of your tickets. Once you have configured it in your
system, it will control the way your agents work everyday by telling them
what ticket they have to work on next in a sequential order.
You can learn more about how SLA policies work and Due By times here.
You can also create multiple SLA policies in Freshservice for different
customer tiers, products, agent groups etc. For example, you could have an
"Express Support" SLA policy for high value clients.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 125
SLA Matrix
Requests are for new functionality that takes less than 4 hours to
implement. Requests that take more than 4 hours to implement are
considered projects are billed on a fixed-fee basis.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 126
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 127
Tickets based on Service Level Agreements (SLAs). Once a ticket’s
priority has been established, an SLA timer begins for the ticket. The
chart below defines each priority and the expected SLA response and
resolution times. Our goal is to hit SLAs 100% of the time.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 128
Q. ITIL framework consists of which processes?
The quality and the costs of the IT services can be controlled more
efficiently.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 129
Q. What Processes are utilized by the Service Desk?
5. Incident closure
7. Repeatable Process
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 130
Q. When can the KE known error be closed?
4. Resolution
Incident Management
1. Analyzing risks.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 131
Q. Which ITIL process helps to monitor the IT services by
maintaining a logical model of the IT infrastructure and IT
services?
Configuration Management.
Plan-Do-Check-Act
Process owner
Interrelated Activities.
Q. Explain Classification?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 132
Q. What Information is regularly exchanged between Problem
Management and Change Management?
1. The Service Desk is critically important as the very first contact the
organization’s users have with IT Services.
Examples:
1. Application
3. Application bug
5. Hardware
6. System-down
7. Automatic alert
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 133
Q. What is Proactive problem management?
Incident => an incident is any event that is not part of the standard
operation.
Known Error =>is an incident or problem for which the root cause is
known and for which a temporary workaround or permanent alternative
has been identified.
Request for Change (RFC) is needed in order to fix the known error.
1. Evaluate
2. Plan
3. Build
4. Deploy
5. Operate
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 134
Q. Which activity in the problem management process is
responsible for generating Requests for Change (RFC)?
Error Control.
Problem Management.
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 135
Q. What is the primary task of error control?
Incident Management
User
Functional Escalation.
Availability Management
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 136
Q. What is serviceability?
Availability Manager
Q. What is SLA?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 137
Q. SLA Types?
Reg Office: #63/1 ShreyaEnclave,BTRGarden,Kudlu Main road, Bangalore-560 068, Karnataka, India.
Phone:080-49701050 |Mobile:9886311552 |Mail:[email protected] | Web:www.aviroltd.com
[Type text] Page 138