1. Describe Operating system. What are the core function of OS ?
Ans: An operating system (OS) is the essential software that manages a computer's
hardware and software resources and provides common services for other programs.
The core function of OS are:
• Process management: This involves creating and deleting processes (running
programs), allocating resources to them, and ensuring they don't interfere with
each other.
• Memory management: The OS keeps track of used and available memory,
allocating it to different programs as needed and preventing memory leaks.
• Device management: This involves controlling access to devices like printers,
scanners, and disk drives, ensuring they function properly and communicate with
programs.
• File management: The OS creates, deletes, and organizes files and folders,
manages access permissions, and provides tools for navigating the file system.
2. What are different types of OS ? Describe any three in Short.
Ans: The different types of OS are:
• Microsoft Windows: Microsoft Windows is a versatile and powerful operating
system that's suitable for a wide range of users, from home users to businesses.
Microsoft windows was founded by Bill Gates and Paul Allen on April 4, 1975.
• Apple Mac OS: macOS is a user-friendly, stable, and secure operating system
that shines in creative workflows and offers seamless integration with other Apple
devices. Mac OS was founded by Steve Jobs in 1985.
• UNIX/Linux: Linux was developed by Linus Torvalds in 1991, and it is designed
as an open-source operating system. Linux is a versatile and powerful operating
system that offers flexibility, customization, and a strong community
3. What is Kernal? Write the function of Kernal.
Ans: A Kernal is a vital component of OS that manages computer operations. It acts as
bridge between the hardware and applications, and control devices, memory, process
management, input/output communication, and interrupt handling
Its Functions are:
• Access Computer resource: It is responsible for managing all computer
resources such as CPU, memory, files, processes, etc. It acts as a bridge
between the user and the resources of the system.
• Resource Management: It facilitates or initiates the interaction between
components of hardware and software.
• Memory Management: It manages RAM memory so that all running
processes and programs can work effectively and efficiently.
• Device Management: The peripheral devices connected in the system are
used by the processes. So, the allocation of these devices is managed by the
Kernel.
4. What is file system? Difference between NTFs and FAT32.
Ans: File system is a structure that an operating system uses to organize and
manage files on a storage device.
NTFs FAT32
NTFs comes with very complex FAT32 has a very simple structure.
structure. FAT32 has a maximum file size of 4
NTFs has a maximum file size of 16 TB. GB.
Its comes with both-network type and It comes with only network-type
local securities. security.
NTFs has a comparatively higher FAT32 has a lower accessing speed.
accessing speed than the other file
system.
5. Define network topology and its types with suitable diagrams.
Ans: The Physical and logical arrangement of connections and nodes in a network.
Its types are:
1. Bus Topology
2. Ring Topology
3. Tree Topology
4. Star Topology
5. Mesh Topology
6. Why HUB is called dumb and switch is smart ?
Ans: HUB is called dumb because it works on a broadcast domain, which means that
all devices connected to it receive all of the traffic that is sent on the network, even if
it is not intended for them. This can lead to performance problems and security risks.
SWITCH is called smart because it uses MAC addressing to learn which devices are
connected to it and where they are located. This allows the switch to send traffic
directly to the intended device, which improves performance and security.
7. What is multiuser, multitasking and multiprocessing system ?
Ans: system that allows multiple users to access and interact with it simultaneously.
Each user has their own environment, including running applications, files, and
settings, without interference from others.
Multitasking is the act of performing multiple tasks at once. It can include switching
between tasks, performing tasks in quick succession, or having multiple tasks going
at once.
A system that utilizes multiple processors or cores to execute tasks simultaneously.
This enables true multitasking, where multiple instructions can be processed at the
same time.
8. What do you mean by instruction sets? Difference between RISC and CISC.
Ans: An instruction set is a set of instructions that a computer's CPU can understand
and execute. It's like a language that the CPU uses to communicate with the rest of
the computer.
RISC CISC
It is a Reduced Instruction Set Computer. It is a Complex Instruction Set Computer.
It emphasizes on software to optimize the It emphasizes on hardware to optimize the
instruction set. instruction set.
It is a hard wired unit of programming in Microprogramming unit in CISC Processor.
the RISC Processor. It requires a single register set to store the
It requires multiple register sets to store instruction.
the instruction. CISC has complex decoding of instruction.
RISC has simple decoding of instruction.
9. Differentiate between hyper-transport and hyper-threading.
Ans:
10. What is server? Describe different roles of server.
Ans: A server is a computer program or device that provides a service to another
computer program and its user, also known as the client.
The different roles of server are:
• File Services: A file server is a computer responsible for storing and managing
data files so that other computers on the same network can access the files.
• Print Services: A print server is a software application, network device, or
computer that manages print requests and makes printer queue status
information available to end users and network administrators.
• Application Server: Application server is a program that resides on the
serverside, and it’s a server programmer providing business logic behind any
application.
• Database Server: A database server keeps the data in a central location that
can be regularly backed up. It also allows users and applications to centrally
access the data across the network.
11. What is client server model? Describe with suitable diagram.
Ans: The client-server model is a fundamental concept in computing, shaping how
resources and services are shared and accessed within a network. Imagine a
bustling restaurant: the client is the diner placing an order, while the server is the
chef in the kitchen preparing the food.
12. Explain peer to peer model with respective diagram
Ans: The peer-to-peer (P2P) model stands in contrast to the traditional client-server
model, offering a fundamentally different way for devices to interact and share
resources. Imagine a network where everyone is both a "guest" and a "host,"
contributing resources and accessing each other's data directly, without a central
authority.
13. What is run level? Mention different run level with their meaning.
Ans: Run levels are predefined states or configurations in which a Unix or Unix-like
operating system operates. Each run level has a specific set of services, processes,
and configurations associated with it.
• Run Level 0 (Halt): The system is halted, i.e., powered off or shut down.
• Run Level 1 (Single-user mode): This run level is often used for system
maintenance. It provides a minimal environment with only essential services
running, allowing a single user to troubleshoot or repair the system.
• Run Level 2 (Multi-user mode with text-based console login): This run level
provides multiple user support but without graphical user interface (GUI)
capabilities.
• Run Level 3 (Multi-user mode with text-based console login): Similar to run level
2, this level provides a multi-user environment with text-based console login but
with additional services.
• Run Level 4 (Unused): This run level is not officially defined and is often unused.
Some distributions use it for custom purposes.
• Run Level 5 (Multi-user mode with GUI): This run level includes the graphical
user interface along with all the services from run level 3. It is the default run
level for many desktop installations.
• Run Level 6 (Reboot): The system is rebooted.
14. What is hypervisor? and explain type of hypervisors with examples.
Ans: A hypervisor is like a virtual apartment building that manages multiple virtual
apartments. It takes the physical resources of your computer – the CPU, memory, and
storage and divides them up into smaller pieces that can be used by each virtual
apartment.
The types of hypervisor are:
• Type 1 Hypervisor : A type 1 hypervisor is layer of software installed
directly on top of a physical server and its underlying hardware. Type 1
hypervisor provides performance and stability since it does not run inside
windows or any other operating system. instead it is simple OS designed
to run virtual machines.
• Type 2 Hypervisor: Type 2 hypervisor run inside the physical host
machine's os. unlike Type 1 Hypervisor that run directly on the hardware,
Type 2 hypervisor have one software layer in between. Type 2 hypervisor
are typically found in environment with small number of servers.
15. Define LAN and WAN with respective diagrams.
Ans: local area network, is a group of connected computing devices within a localized
area that usually share a centralized Internet connection.
A wide area network (WAN) is a geographically distributed private telecommunications
network that interconnects multiple local area networks (LANs).
16. Explain the difference between Internet, Intranet and Extranet.
Ans:
Internet Intranet Extranet
Internet is open to the public, Intranets use the same Extranets are configured to
but the other two are heavily technology used by the allow employees and
censored. Internet, including HTTP over customers to access the
It is owned by no one. TCP/IP, web servers, and web private network over the
Everyone who is linked has clients. Internet.
access to it. intranets do not allow public To prevent unauthorized
Its goal is to provide access to private servers. access to the private network,
information all across the This is typically accomplished extranet designers must use a
world. by using an Internet firewall. technology such as virtual
Its goal is to communicate private networking.
information within the VPNs rely on encryption
company. software, usernames, and
passwords to ensure that
communication occurs
privately, and only among
authorized users.
Its goal is to allow members
and external members to
share information.
17. What is disk partitionin? Difference between MBR and GPT.
Ans: Disk partitioning is the creation of one or more regions on secondary storage, so
that each region can be managed separately.
MBR GPT
MBR (Master Boot Record) is a type of GPT is crucial to comprehend whether to
partition used to set up a hard disc. construct a new division or convert an old one.
MBR is the most common format and is GPT is a newer type that works with UEFI
compatible with BIOS systems. systems.
MBR may accommodate up to four primary or GPT can accommodate an infinite number of
three primary partitions plus one extended partitions.
partition If the system is UEFI, we can use either MBR
If the system is BIOS, we can use Master or GPT.
Board Record.
18. Explain about windows registry.
Ans: The Windows Registry is a database that stores configuration settings and low-
level settings for the Microsoft Windows operating system and applications. It also
contains information about the software and hardware installed on the system. The
registry was introduced with Windows 95 and centralized and standardized
configuration storage. Before Windows 95, configuration information was stored in text
files, which were easy for users to accidentally delete and lacked a standardized
structure.
19. Define virtual memory, device drivers and registry editor.
Ans: Virtual memory: A memory management technique that allows operating systems
to use more memory than the physical RAM installed on a computer.
Device Drivers: A software application that allows one hardware device to interact with
another hardware device.
Registry Editor: The Windows Registry Editor (regedit) is a graphical tool that allows
authorized users to view and modify the Windows registry. It displays registry data in a
hierarchical format to help administrators and programmers find keys, subkeys, and
values
20. What is windows server and what are its types.
Ans: Windows Server is a line of operating systems developed by Microsoft for use on
servers. Server is a computer that is meant to be a dedicated service provider, Client is
a computer that requests services.
Its types are:
• Windows Server 2022 Datacenter Edition is the most comprehensive edition
designed for enterprises that own highly virtualized data-centers or act as cloud
providers
• Windows Server 2022 Standard Edition is the full-featured edition designed for
medium-sized businesses that own servers on-premises.
• Windows Server 2022 Datacenter: Azure Edition this is intended only for
running in the Microsoft cloud.
21. What are the primary subsystems that makes server hardware? Explain all.
Ans:
• Processor: The central processing unit is responsible for executing instructions
and performing calculations. Servers often have multiple CPUs or CPU cores to
handle heavy workloads.
• Memory: RAM is the main type of memory in a computing system. RAM holds
the software instructions and data needed by the processor, along with any
output from the processor, such as data to be moved to a storage device.
• Storage: The hard disc, one technology for data storage on server hardware, is
read, written to, and positioned by his hardware. The hard disc drive (HDD),
which was created by IBM in 1953, has changed over time from being the size of
a refrigerator to the typical 2.5-inch and 3.5-inch form factors (J.Bigelow, 2023).
• Network: Servers are intended for client-server computing architectures and
depend on at least one network connection to maintain communication between
the server and a data center LAN. A server’s network connection is created
through the addition of a network adapter that can be included as a chip and
physical port plug on the motherboard, as well as a separate network adapter
plugged into an available motherboard expansion slot, such as a PCIe slot.
22. What is networking and what are its types.
Ans: networking, is the practice of transporting and exchanging data between nodes
over a shared medium in an information system.
23. Explain RAID with its different levels.
Ans: RAID (Redundant Array of Independent Disks) is a data storage virtualization
technology that combines multiple disk drive components into a single logical unit for
increased data redundancy and performance. RAID levels are different configurations of
RAID that provide different levels of data protection and performance.
Some of the most common RAID levels include:
• RAID 0 (Stripping): RAID 0 stripes data across multiple disks, improving
performance by spreading data access across multiple disks. However, it does
not provide any data redundancy, and if any disk fails, all data is lost.
• RAID 1 (Mirroring): RAID 1 mirrors data across multiple disks, ensuring that data
is always available on at least two disks. This provides data redundancy, but it
also reduces performance because half of the storage space is used for
redundant copies of data.
• RAID 5 (Striping with Parity): RAID 5 stripes data across multiple disks and
calculates parity data that can be used to recover data from a single disk failure.
It provides data redundancy without sacrificing as much storage space as RAID
• RAID 6 (Striping with Double Parity): RAID 6 stripes data across multiple disks
and calculates two parity blocks that can be used to recover data from up to two
disk failures. It provides more data redundancy than RAID 5, but it also has a
slight performance penalty.
24. Explain Remote Access with its advantages and disadvantages.
Ans: Remote access is the ability to access a system or network, whether it's a personal
device or office server, without being physically present. With a remote access
connection, employees can access the corporate remote access server and log in to
the network with their regular user account.
Its advantages:
• Easily monitor, control and maintain devices connected to the network.
• Quickly troubleshoot using the remote access.
• Effortlessly access the files on connected devices, servers or network.
• Define the access rights to files and folders for different categories of users.
Its Disadvantages
• Can be costly to implement
• Risk of health information being inappropriately viewed ie. hackers, public.
• Additional security features and protocols required.
25. What is Active Directory? What could be the main features to consider while
choosing the Network Operating System?
Ans: Active Directory (AD) is Microsoft's proprietary directory service. It runs on
Windows Server and enables administrators to manage permissions and access to
network resources.
26. What are the three responsibilities of IDA (Identity and Access)?
Ans: Identify
Authenticate
Authorize
27. Explain tree and forest.
Ans: Forest can be explained as a collection of multiple trees which is shared by the
common global catalogue, logical structure, directory schema, and directory
configuration.
The tree can be defined as the collection of one or more domains that allow the sharing
of resources globally. It comprises of single domain or multiple domain in the contiguous
namespaces.
28. Explain any five components of AD infrastructure.
Ans:
29. Explain three components of Mail Services.
30. List the three latest versions of Windows Server 2022 and contrast which one would
you recommend for a cloud-based service provider.
31. What do you understand by Media types? Explain with its types.
Ans: The actual path over which an electrical signal travels as it moves from one
component to another.
The types of media types are:
• Twisted-pair cable: Twisted-pair cable is a type of cabling that is used for
telephone communications and most modern Ethernet networks. A pair of wires
forms a circuit that can transmit data. The pairs are twisted to provide protection
against crosstalk, the noise generated by adjacent pairs.
• UPT Cable: UTP cable is a medium that is composed of pairs of wires. UTP
cable is used in a variety of networks. Each of the eight individual copper wires in
UTP cable \is covered by an insulating material. UTP cable relies solely on the
cancellation effect produced by the twisted wire pairs to limit signal degradation
caused by electromagnetic interference (EMI) and radio frequency interference
(RFI).
• STP Cable: STP is similar to unshielded twisted pair (UTP); however, it contains
an extra foil wrapping or copper braid jacket to help shield the cable signals from
interference. STP cables are costlier when compared to UTP, but has the
advantage of being capable of supporting higher transmission rates across
longer distances.
• 10 GB Ethernet Cable: 10Gb Ethernet is needed to connect routers, 10G
switches, and servers in data centers and enterprises, and for long-distance and
high-bandwidth trunks to enable area networks based on Ethernet and fiber. It
supports connectivity in a wide range of network application