Pointers For Interview On Friday
Pointers For Interview On Friday
How does BIOS work? BIOS comes included with computers, as firmware on a chip on the motherboard. In contrast, an OS like Windows or iOS can either be pre-
installed by the manufacturer or vendor or installed by the user. BIOS is a program that is made accessible to the microprocessor on an erasable programmable read-only
memory (EPROM) chip. When users turn on their computer, the microprocessor passes control to the BIOS program, which is always located at the same place on EPROM.
When BIOS boots up a computer, it first determines whether all of the necessary attachments are in place and operational. Any piece of hardware containing files the computer
needs to start is called a boot device. After testing and ensuring boot devices are functioning, BIOS loads the OS -- or key parts of it -- into the computer's random access
memory (RAM) from a hard disk or diskette drive (the boot device).
The 4 functions of BIOS
BIOS identifies, configures, tests and connects computer hardware to the OS immediately after a computer is turned on. The combination of these steps is called the boot
process. These tasks are each carried out by BIOS' four main functions:
Power-on self-test (POST). This tests the hardware of the computer before loading the OS.
Bootstrap loader. This locates the OS.
Software/drivers. This locates the software and drivers that interface with the OS once running.
Complementary metal-oxide semiconductor (See-mos) setup. This is a configuration program that enable users to alter hardware and system settings. CMOS is
the name of BIOS' non-volatile memory.
Accessing BIOS
With BIOS, the OS and its applications are freed from having to understand exact details, such as computer hardware addresses, about the attached I/O devices. When device
details change, only the BIOS program needs to be changed. Sometimes, this change can be made during system setup.
Users can access BIOS and configure it through BIOS Setup Utility. Accessing BIOS Setup Utility varies somewhat depending on the computer being used. However, the following
steps generally enable users to access and configure BIOS through Setup Utility:
Reset or power off the computer.
When the computer turns back on, look for a message that says "entering setup" or something similar. Accompanying that message will be a key that the user should press to
enter system configuration. Here's an example message a user might see: "Press [key] to enter BIOS setup." Some keys often used as prompts are Del, Tab, Esc and any of the
function keys (F1-F12).
Upon seeing the prompt, quickly press the key specified.
Once in BIOS Setup Utility, users can change hardware settings, manage memory settings, change the boot order or boot device, and reset the BIOS password, among other
configuration tasks.
BIOS security
BIOS security is a somewhat overlooked component of cybersecurity; however, it should still be managed to prevent hackers from executing malicious code on the OS. Security
group Cylance, in 2017, showed how modern BIOS security flaws could enable ransomware programs inside a motherboard's UEFI and exploit other PC BIOS vulnerabilities.
Another unique exploit involving the manipulation of BIOS was Plundervolt. Plundervolt could be used to mess with a computer's power supply at the time data was being
written to memory, causing errors that lead to security gaps. Intel released a BIOS patch to defend against it.
CMOS- complementary metal-oxide-semiconductor
What Is See-MOSS and What Is It For?
See-moss (short for complementary metal-oxide-semiconductor) is the term usually used to describe the small amount of memory on a computer motherboard that stores the
BIOS settings. Some of these BIOS settings include the system time and date as well as hardware settings.
Clearing CMOS, which means to reset the BIOS settings to their default levels. This is a really easy task that's a great troubleshooting step for many types of computer problems.
For example, maybe your computer is freezing up during the POST, in which case clearing the CMOS to reset the BIOS settings to factory default levels, might be the easiest
solution. Or maybe you need to clear CMOS to reset misconfigured BIOS settings to fix certain hardware-related error messages, such as Code 29 errors.
Other CMOS errors revolve around low battery voltage, CMOS checksum, battery failure, and read error.
How BIOS and CMOS Work Together?
The BIOS is a computer chip on the motherboard like CMOS except that its purpose is to communicate between the processor and other hardware components like the hard
drive, USB ports, sound card, video card, and more. A computer without a BIOS wouldn't understand how these pieces of the computer work together. The BIOS firmware is also
what performs the Power On Self Test to test those pieces of hardware, and what ultimately runs the boot loader to launch the operating system .
What Is a CMOS Battery?
The CMOS is usually powered by a coin-sized CR2032 cell battery, referred to as the CMOS battery. Most CMOS batteries will last the lifetime of a motherboard, up to 10 years in
most cases, but will sometimes need to be replaced depending on how the device is being used.
Incorrect or slow system date and time, and loss of BIOS settings, are major signs of a dead or dying CMOS battery. Replacing them is as easy as swapping out the dead one for a
new one.
While most motherboards have a spot for a CMOS battery, some smaller computers, like many tablets and laptops, have a small external compartment for the CMOS battery that
connects to the motherboard via two small wires.
Some devices that use CMOS include microprocessors, microcontrollers, and static RAM (SRAM). It's important to understand that CMOS and BIOS are not interchangeable terms
for the same thing. While they work together for a specific function within the computer but they are two entirely different components. When the computer is first starting up,
there's an option to boot into BIOS or CMOS.
Opening the CMOS setup is how you can change the settings it's storing, like the date and time and how the different computer components are first started up. You can also use
CMOS setup to disable/enable some hardware devices. CMOS chips are desirable for battery-powered devices like laptops because they use less power than other types of chips.
Although they use both negative polarity circuits and positive polarity circuits (NMOS and PMOS), only one circuit type is powered on at a time. The Mac equivalent to CMOS is
PRAM, which stands for Parameter RAM. You can also reset your Mac's PRAM.
WHAT IS POST?
A Power-On Self-Test (POST) is an operation initiated by a computer after it has been turned on but before it boots up the OS. The computer's
firmware -- BIOS, Unified Extensible Firmware Interface (UEFI) or another system -- carries out this operation by running a diagnostic testing
sequence to determine if the computer's essential hardware is working properly.
What is NO POST? (Power On Self-Test)
A No POST situation means that when you turn on your computer, it doesn't pass the initial checks that make sure all hardware is functioning
properly. Essentially, the computer doesn't get to the point where it starts loading the operating system. This can be due to various hardware
issues like faulty components, loose connections, or even power supply problems.
Common Causes
Power Supply Issues: Faulty power supply or loose connections.
Hardware Failures: Problems with RAM, CPU, motherboard, or graphics card.
Loose Connections: Internal components not properly connected.
BIOS/CMOS Issues: Corrupted BIOS or CMOS settings.
Overheating: Components overheating due to poor ventilation.
Potential Fixes
Check Power Connections: Ensure all power cables are securely connected and the power outlet is working.
Inspect Hardware: Open the computer case and check for loose components. Reset RAM sticks, graphics cards, and cables.
Listen for Beep Codes: If your computer beeps on startup, refer to the motherboard manual for specific beep codes that can help diagnose the
issue.
Reset BIOS/CMOS: Remove the CMOS battery for a few minutes and then reinsert it. Alternatively, use the jumper on the motherboard to reset
BIOS settings.
Cool Down: Allow the computer to cool down if it was overheating, and ensure proper ventilation.
What is firmware?
Firmware is essentially the software that's permanently embedded into a hardware device. It serves as the control program that directs the
device’s functions. It’s the behind-the scenes hero making sure your gadgets work properly.
Types of Firmware: -
Firmware comes in various types based on their functionality and where they are used. Here are the main types:
Low-Level Firmware
Permanent and Unchangeable: Stored in non-volatile memory like ROM or OTP (One-Time Programmable) memory.
Example: Embedded firmware in a microcontroller for basic hardware control.
High-Level Firmware
Updatable and Flexible: Stored in flash memory, can be updated to improve functionality or fix bugs.
Example: Firmware in smartphones or laptops that can receive updates.
Subsystem Firmware
Independent Components: Controls specific subsystems within a larger system.
Example: Firmware in a printer's controller or a network card.
Some of the related and common main reasons or causes for Blue Screen of Death are:
Hardware malfunctioning can cause this error
Faulty memory
Improper written device drives
Components getting overheated
Hardware crossing the limits of specifications
Lack of memory protection
Overcrowded memory
Errors in the software of the system
Not updating the hardware program can cause stop errors
Improper installation of any hardware program
Hardware changes that you made didn’t register which can cause blue screen
Issues regarding power supplies
Blue Screen of Death in Windows 9X era can be caused due to bugs or incompatible DLLs in the kernel operating system.
Comparison
Primary Memory Secondary Memory
Parameters
Primary memory is the main memory and
Storage validity Secondary memory is the external memory and stores data permanently.
stores data temporarily.
Access The CPU can directly access the data. The CPU cannot directly access the data.
Primary memory is volatile. It loses data in Secondary memory is non-volatile; data is stored even during a power
Volatility
case of a power outage. failure.
Data is stored inside costly semiconductor Data is stored on external hardware devices like hard drives, floppy disks,
Storage
chips. etc.
They do not have such a classification. Secondary memories are
Division It can be divided into RAM and ROM
permanent storage devices like CDs, DVDs, etc.
Speed Faster Slower
It saves the data that the computer is currently
Stored data It can save various types of data in various formats and huge sizes.
using.
Primary and Secondary storage Devices: -
What are primary storage devices?
Primary storage devices are the media that hold memory for a shorter period of time when the computer is running. Such devices have lower
access time but faster time. RAM and cache are two examples of primary storage devices. It is also known as main memory, primary memory,
internal memory and main storage.
Primary storage devices, also known as main memory or primary memory, are the essential components of a computer that store data and
instructions temporarily while the system is running.
Here are the key types:
1. RAM (Random Access Memory)
Volatile Memory: Loses its content when power is off.
High Speed: Faster than secondary storage devices.
Temporary Storage: Holds data that the CPU needs right now.
2. Cache Memory
Ultra-Fast Memory: Even faster than RAM.
Located Close to the CPU: Stores frequently accessed data and instructions to speed up processing.
3. ROM (Read-Only Memory)
Non-Volatile Memory: Retains data even when power is off.
Permanent Storage: Stores essential instructions for booting up the computer (BIOS).
What is OS Installation?
Installing an OS, or operating system, is essentially setting up the software that manages all the hardware and other software on your computer. I
t's like giving your computer its personality and set of instructions on how to run everything. This process involves getting the OS software onto y
our machine, configuring it, and getting everything ready for use. It's a pretty critical step because it sets the foundation for all the other software
you'll be using.
A VPN, or Virtual Private Network, is a service that helps protect your online privacy and security.
It does a few things:
Encryption: It encrypts your internet traffic, which means your data is turned into a code that is unreadable without a decryption key. This
protects your information from hackers and other malicious entities.
Masking IP Address: A VPN masks your IP address, making your online actions practically untraceable. This is especially useful for accessing
content that might be geo-restricted.
Secure Connection: It creates a secure connection between your device and the VPN server. This means your browsing activity is protected even
when you're using public Wi-Fi.
WHAT IS FIREWALL?
A firewall is a network security device designed to monitor, filter, and control incoming and outgoing network traffic based on predetermined
security rules. The primary purpose of a firewall is to establish a barrier between a trusted internal network and untrusted external networks.
Define Antivirus:- Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer.
Antivirus VPN
Firewall is implemented in both hardware and software. Antivirus is implemented in software only.
Firewall Antivirus
Firewall deals with external threats only. Antivirus deals with both external threats and internal threats.
In firewall counter attacks are possible such as IP Spoofing and routing In antivirus no counter attacks are possible after removing the
attacks. malware.
Firewall works on monitoring and filtering. Antivirus works on Scanning of infected files and software.
Firewall checks the threat from incoming packets. Antivirus checks the threat from malicious software.
Firewall saves the system from all kinds of threats to the system. Antivirus saves the system only from viruses.
Firewall’s programming is complex than antivirus. Antivirus’s programming is simpler as comparison to firewall.
What is Virtualization?
Virtualization is technology that you can use to create virtual representations of servers, storage, networks, and other physical
machines. Virtual software mimics the functions of physical hardware to run multiple virtual machines simultaneously on a single
physical machine. Businesses use virtualization to use their hardware resources efficiently and get greater returns from their
investment. It also powers cloud computing services that help organizations manage infrastructure more efficiently.
Why is virtualization important?
By using virtualization, you can interact with any hardware resource with greater flexibility. Physical servers consume electricity, take
up storage space, and need maintenance. You are often limited by physical proximity and network design if you want to access
them. Virtualization removes all these limitations by abstracting physical hardware functionality into software. You can manage,
maintain, and use your hardware infrastructure like an application on the web.
Virtualization example
Consider a company that needs servers for three functions:
Store business email securely
Run a customer-facing application
Run internal business applications
Each of these functions has different configuration requirements:
The email application requires more storage capacity and a Windows operating system.
The customer-facing application requires a Linux operating system and high processing power to handle large volumes of website
traffic.
The internal business application requires iOS and more internal memory (RAM).
WHAT IS IP address?
An IP address (Internet Protocol address) is a unique string of numbers separated by periods or colons that identifi
es each device using the Internet Protocol to communicate over a network.
An IP address represents an Internet Protocol address. A unique address that identifies the device over the network. It is almost like a set of rules
governing the structure of data sent over the Internet or through a local network. An IP address helps the Internet to distinguish between
different routers, computers, and websites. It serves as a specific machine identifier in a specific network and helps to improve visual
communication between source and destination.
IP address structure: IP addresses are displayed as a set of four digits- the default address may be 192.158.1.38. Each number on the set may
range from 0 to 255. Therefore, the total IP address range ranges from 0.0.0.0 to 255.255.255.255.
IP address is basically divided into two parts: X1. X2. X3. X4
1. [X1. X2. X3] is the Network ID
2. [X4] is the Host ID
Network ID–
It is the part of the left-hand IP address that identifies the specific network where the device is located. In the normal home network, where the
device has an IP address 192.168.1.32, the 192.168.1 part of the address will be the network ID. It is customary to fill in the last part that is not
zero, so we can say that the device’s network ID is 192.168.1.0.
Hosting ID–
The host ID is part of the IP address that was not taken by the network ID. Identifies a specific device (in the TCP / IP world, we call devices
“host”) in that network. Continuing with our example of the IP address 192.168.1.32, the host ID will be 32- the unique host ID on the
192.168.1.0 network.
Version of IP address:
Currently there are 2 versions of IP addresses are in use i.e IPV4 and IPV6
IPV4 (Internet Protocol Version 4): It is the first version of Internet Protocol address. The address size of IPV4 is 32 bit number. In this Internet
Protocol Security (IPSec) with respect to network security is optional. It is having 4,294,967,296 number of address still we are seeing a shortage
in network addresses as the use of network & virtual devices are increasing rapidly.
IPV6 (Internet Protocol Version 6): It is the recent version of Internet Protocol address. The address size of IPV6 is 128 bit number. In this
Internet Protocol Security (IPSec) with respect to network security is mandatory. It allows 3.4 x 10^38 unique IP addresses which seems to be
more than sufficient to support trillions of internet devices present now or coming in future.
IP Address Types:
There are 4 types of IP Addresses- Public, Private, Fixed, and Dynamic. Among them, public and private addresses are derived from their local
network location, which should be used within the network while public IP is used offline.
Public IP address–
A public IP address is an Internet Protocol address, encrypted by various servers/devices. That’s when you connect these devices with your
internet connection. This is the same IP address we show on our homepage. So why the second page? Well, not all people speak the IP language.
We want to make it as easy as possible for everyone to get the information they need. Some even call this their external IP address. A public
Internet Protocol address is an Internet Protocol address accessed over the Internet. Like the postal address used to deliver mail to your home,
the public Internet Protocol address is a different international Internet Protocol address assigned to a computer device. The web server, email
server, and any server device that has direct access to the Internet are those who will enter the public Internet Protocol address. Internet
Address Protocol is unique worldwide and is only supplied with a unique device.
Private IP address–
Everything that connects to your Internet network has a private IP address. This includes computers, smartphones, and tablets but also any
Bluetooth-enabled devices such as speakers, printers, or smart TVs. With the growing internet of things, the number of private IP addresses you
have at home is likely to increase. Your router needs a way to identify these things separately, and most things need a way to get to know each
other. Therefore, your router generates private IP addresses that are unique identifiers for each device that separates the network.
Static IP Address–
A static IP address is an invalid IP address. Conversely, a dynamic IP address will be provided by the Dynamic Host Configuration Protocol (DHCP)
server, which can change. The Static IP address does not change but can be changed as part of normal network management.
Static IP addresses are incompatible, given once, remain the same over the years. This type of IP also helps you get more information about the
device.
Dynamic IP address–
It means constant change. A dynamic IP address changes from time to time and is not always the same. If you have a live cable or DSL service,
you may have a strong IP address. Internet Service Providers provide customers with dynamic IP addresses because they are too expensive.
Instead of one permanent IP address, your IP address is taken out of the address pool and assigned to you. After a few days, weeks, or sometimes
even months, that number is returned to the lake and given a new number. Most ISPs will not provide a static IP address to customers who live
there and when they do, they are usually more expensive. Dynamic IP addresses are annoying, but with the right software, you can navigate
easily and for free.
Types of Website IP address:
Website IP address is of two types- Dedicated IP Address and Shared IP Address. Let us discuss the two.
Dedicated IP address–
A dedicated IP address is one that is unique for each website. This address is not used by any other domain. A dedicated IP address is beneficial in
many ways. It provides increased speed when the traffic load is high and brings in increased security. But dedicated IPs are costly as compared to
shared IPs.
Shared IP address–
A shared IP address is one that is not unique. It is shared between multiple domains. A shared IP address is enough for most users because
common configurations don’t require a dedicated IP.
IP Address Classification Based on Operational Characteristics:
According to operational characteristics, IP address is classified as follows:
Broadcast addressing–
The term ‘Broadcast’ means to transmit audio or video over a network. A broadcast packet is sent to all users of a local network at once. They do
not have to be explicitly named as recipients. The users of a network can open the data packets and then interpret the information, carry out the
instructions or discard it. This service is available in IPv4. The IP address commonly used for broadcasting is 255.255.255.255
Unicast addressing–
This address identifies a unique node on the network. Unicast is nothing but one-to-one data transmission from one point in the network to
another. It is the most common form of IP addressing. This method can be used for both sending and receiving data. It is available in IPv4 and
IPv6.
Multicast IP addresses–
These IP addresses mainly help to establish one-to-many communication. Multicast IP routing protocols are used to distribute data to multiple
recipients. The class D addresses (224.0.0.0 to 239.255.255.255) define the multicast group.
Anycast addressing–
In anycast addressing the data, a packet is not transmitted to all the receivers on the network. When a data packet is allocated to an anycast
address, it is delivered to the closest interface that has this anycast address.
Define USB:- Universal serial bus (USB) is defined as a standard that mentions the specifications used by cables, ports, and protocols that enable
simple and universally accepted connectivity between a host and peripheral device.
Types of USB Ports: - USB ports have evolved over the years to meet different needs and devices: -
. Here are the main types:
USB-A
Most common type: Found on computers, power banks, and many other devices.
Standard connector: Used for connecting peripherals like keyboards, mice, and flash drives.
USB-B
Less common: Typically used for larger devices like printers and external hard drives.
Square connector: Usually not found on consumer electronics.
Micro-USB
Common on older smartphones and tablets: Smaller than USB-A and USB-B.
Standard for mobile devices: Used for charging and data transfer.
Mini-USB
Older mobile devices: Smaller than USB-A but larger than Micro-USB.
Less common now: Mostly replaced by Micro-USB and USB-C.
USB-C
Latest standard: Found on modern smartphones, laptops, and tablets.
Versatile connector: Can be used for charging, data transfer, and video output.
Reversible: Can be plugged in either way up.
Lightning
Apple-specific: Used exclusively for iPhones, iPads, and iPods.
Compact and reversible: Similar to USB-C in functionality.
Type-C
Future-proof: Designed to replace older USB types with a single, universal port.
High-speed data transfer: Supports faster data rates and higher power delivery.
USB 3.1
USB 3.1 is like USB on steroids! It offers faster data transfer rates and improved power delivery compared to its predecessors. Here are the highlig
hts:
Key Features of USB 3.1
Data Transfer Speed: Up to 10 Gbps, which is twice the speed of USB 3.0.
Power Delivery: Better power efficiency, can deliver more power for charging devices.
Backward Compatibility: Works with USB 3.0 and 2.0 devices.
Enhanced User Experience: Less latency, smoother performance.
It's a massive upgrade, especially for data-heavy tasks like transferring large files or connecting high-performance peripherals. Using it with a Typ
e-C connector makes it even more versatile.
Extra Information: -
OS Virtualization
With the help of OS virtualization nothing is pre-installed or permanently loaded on the local device and no-hard disk is needed. Everything
runs from the network using a kind of virtual disk. This virtual disk is actually a disk image file stored on a remote server, SAN (Storage Area
Network) or NAS (Non-volatile Attached Storage). The client will be connected by the network to this virtual disk and will boot with the
Operating System installed on the virtual disk.
How does OS Virtualization works?
Components needed for using OS Virtualization in the infrastructure are given below:
The first component is the OS Virtualization server. This server is the center point in the OS Virtualization infrastructure. The server manages
the streaming of the information on the virtual disks for the client and also determines which client will be connected to which virtual disk
(using a database, this information is stored). Also the server can host the storage for the virtual disk locally or the server is connected to the
virtual disks via a SAN (Storage Area Network). In high availability environments there can be more OS Virtualization servers to create no
redundancy and load balancing. The server also ensures that the client will be unique within the infrastructure.
Secondly, there is a client which will contact the server to get connected to the virtual disk and asks for components stored on the virtual disk
for running the operating system.
The available supporting components are database for storing the configuration and settings for the server, a streaming service for the virtual
disk content, a (optional) TFTP service and a (also optional) PXE boot service for connecting the client to the OS Virtualization servers.
As it is already mentioned that the virtual disk contains an image of a physical disk from the system that will reflect to the configuration and
the settings of those systems which will be using the virtual disk. When the virtual disk is created then that disk needs to be assigned to the
client that will be using this disk for starting. The connection between the client and the disk is made through the administrative tool and
saved within the database. When a client has a assigned disk, the machine can be started with the virtual disk using the following process as
Conclusion
Mainly Virtualization means, running multiple operating systems on a single machine but sharing all the hardware resources. And it helps us to
provide the pool of IT resources so that we can share these IT resources in order get benefits in the business.
Hard Disk Drive HDD
A hard disk drive (HDD) is an internal or external computer component that stores data, such as the operating system, applications, and user files.
HDDs are “non-volatile” storage devices, meaning they retain stored data even when power isn't being supplied.
How does a hard drive work?
An HDD includes two main elements; a spinning platter and an actuator arm.
The platter is a circular magnetic disk containing tracks and sectors that retain data.
The actuator arm moves across the platter to read and write data.
The platter spins (hence the name) on a spindle to help speed up the read/write process as the actuator arm moves across it.
The data sectors are spread out randomly (also known as fragmented) across the platter.
What is an SSD? (Solid State Drive)
An SSD, or solid-state drive, is a type of storage device used in computers. This non-volatile storage media stores persistent data on solid-state
flash memory. SSDs replace traditional hard disk drives (HDDs) in computers and perform the same basic functions as a hard drive. But SSDs are
significantly faster in comparison. With an SSD, the device's operating system will boot up more rapidly, programs will load quicker and files can
be saved faster.