100 Network Intervive
100 Network Intervive
Ans: The blue screen of death will display the stoop or fatal error
message which indicates the windows have become unstable and stops
immediately.
Ans
Domain name is the address of your website that people type in the
browser URL bar to visit your website. In simple terms, if your website was
a house, then your domain name will be its address.
It is typically used to debug a system that has crashed, won't boot, or is unstable
after installing a new update, device driver, or piece of software. .
PING is stand for Pocket internet grouper which is use to check physical Ip
connectivity between two or more device. Ping sends out an ICMP echo
request to which it expects an ICMP echo reply response.
The Windows Command Prompt tool can also help you get your public IP
address. Here’s how to find your external IP address with Command
Prompt.
Retry the web page by pressing F5, clicking/tapping the refresh/reload button, or trying the URL
from the address bar again.
You can clear Cache memory and try again to open that website.
Ans: First and foremost, you need to check the cable connection and
electricity supply first, and if you find no problem with them, finally you
should report the problem to the IT department of the company.
Solid State Drive (SSD) is a non-volatile storage device that stores and
retrieves data constantly on solid-state flash memory. However, this data
is stored on interconnected flash instead memory chips of platters, which
makes them faster than HDDs. It provides better performance compared
to HDD.
Ans: RAM and ROM both are the internal memories of the computer.
Where RAM is a temporary memory, ROM is a permanent memory of the
computer. There are many differences between RAM and ROM, but the
basic difference is that RAM is a read-write memory and the ROM is a read
only memory.
single mode fibres is also known as a single mode optical fibres ,uni mode fibres ,mono
mode optical fibres and single mode optical waveguide. the highest capacity for commercial
distances, such as within a building or on a campus. Multi-mode links can be used for data rates
up to 800 Gbit/s.
also know bounded media. There are three type of transmission media.
communication. Mainly coaxial cables are used as network and broadband cable.
These cables have high bandwidths and transmission capacity. The middle core
is responsible for the data transferring whereas the copper mesh prevents from
cable ethernet networks. Twisted pair is a type of wiring in which two conductors of single circuit
are twisted together for the purpose of cancelling out electromagnetic interference from external
Unshielded twisted pair cable. UTP cable are mostly used for LAN
network. they can used for low-speed data, high speed data audio and building automation and
control system. utp cable is can be use in both the horizontal and backbone cabling subsystem.
The main disadvantage with UTP is bandwidth we cannot achieve high bandwidth with UTP
cable.
This cable is best suitable for high noise and disturbance areas.
3: Fiber optic cables are delicate and can be more prone to damage
than traditional copper cables. They may break or bend if
mishandled during installation or maintenance. This fragility makes
them less suitable for certain environments, such as those with
heavy machinery or high levels of physical disturbance.
4.Installation and Equipment Costs: The initial cost of installing a
fibres optic network can be higher compared to traditional copper
networks. Specialized equipment and skilled technicians are required
for installation, which can contribute to increased expenses.
CSMA: It is a media access control used to control the data flow so that
data integrity is maintained, i.e., the packets do not get lost. There are
two alternative ways of handling the problems that occur when two nodes
send the messages simultaneously.
At the start point and end point of main cable terminator are
building.
will be retransmitted to next node .in ring topology data flow in one
direction.it is not terminated end and each node connected to another not
1) What is a Link?
A link refers to the connectivity between two devices. It includes the
type of cables and protocols used for one device to be able to
communicate with the other.
Serial Transmission:
In Serial Transmission, data-bit flows from one computer to another
computer in bi-direction. In this transmission, one-bit flows at one
clock pulse. In Serial Transmission, 8 bits are transferred at a time
having a start and stop bit.
Parallel Transmission:
In Parallel Transmission, many bits are flow together simultaneously
from one computer to another computer. Parallel Transmission is
faster than serial transmission to transmit the bits. Parallel
transmission is used for short distance.
4) What is a LAN?
LAN network
LAN stands for Local Area Network. It refers to the connection between
computers and other network devices that are located within a small
physical location.
5) What is a node?
A node refers to a point or joint where a connection takes place. It can
be a computer or device that is part of a network. Two or more nodes
are needed to form a network connection.
15) What is the job of the Network Layer under the OSI
reference model?
The Network layer is responsible for data routing, packet switching, and
control of network congestion. Routers operate under this layer.
WAN network
WAN stands for Wide Area Network. It is an interconnection of
computers and devices that are geographically dispersed. It connects
networks that are located in different regions and countries.
Disadvantages:
57) What happens when you use cables longer than the
prescribed length?
Cables that are too long would result in signal loss. It means that data
transmission and reception would be affected because the signal
degrades over length.
Client-server problems
Application conflicts
Error in configuration
Protocol mismatch
Security issues
User policy and rights issues
P2P Network
Peer to peer (P2P) are networks that do not rely on a server. All PCs on
this network act as individual workstations.
Hub Switch
A hub operates on the physical layer. A switch operates on the data link layer.
Hubs perform frame flooding that can be It performs broadcast, then the unicast a
unicast, multicast, or broadcast. needed.
Just a singular domain of collision is
Varied ports have separate collision dom
present in a hub.
The transmission mode is Half-duplex The transmission mode is Full duplex
Hubs operate as a Layer 1 device per the Network switches help you to operate at
OSI model. OSI model.
To connect a network of personal
computers should be joined through a Allow connecting multiple devices and po
central hub.
Uses electrical signal orbits Uses frame & packet
Does not offer Spanning-Tree Multiple Spanning-Tree is possible
Collisions occur mostly in setups using
No collisions occur in a full-duplex switch
hubs.
Hub is a passive device A switch is an active device
Switches use CAM (Content Accessible Me
A network hub can’t store MAC addresses. be accessed by ASIC (Application Specific
Chips).
Not an intelligent device Intelligent device
Its speed is up to 10 Mbps 10/100 Mbps, 1 Gbps, 10 Gbps
Does not use software Has software for administration
74) When you move the NIC cards from one PC to another
PC, does the MAC address gets transferred as well?
Yes, that’s because MAC addresses are hard-wired into the NIC circuitry,
not the PC. This also means that a PC can have a different MAC address
when another one replaced the NIC card.
Partial Mesh Topology: In this type of topology, most of the devices are
connected almost similarly as full topology. The only difference is that
few devices are connected with just two or three devices.
TCP UDP
It is a connection-oriented protocol. It is a connectionless protocol.
UDP messages contain packets t
TCP reads data as streams of bytes, and the
one by one. It also checks for int
message is transmitted to segment boundaries.
arrival time.
TCP messages make their way across the Internet It is not connection-based, so on
from one computer to another. send lots of packets to another.
UDP protocol has no fixed order
TCP rearranges data packets in the specific order.
packets are independent of each
The speed for TCP is slower. UDP is faster as error recovery is
Header size is 20 bytes The header size is 8 bytes.
TCP is heavy-weight. TCP needs three packets to
UDP is lightweight. There are no
set up a socket connection before any user data
connections, ordering of messag
can be sent.
TCP does error checking and also makes error UDP performs error checking, bu
recovery. erroneous packets.
Acknowledgment segments No Acknowledgment segments
Using handshake protocol like SYN, SYN-ACK, ACK No handshake (so connectionles
TCP is reliable as it guarantees delivery of data to The delivery of data to the destin
the destination router. guaranteed in UDP.
TCP offers extensive error checking mechanisms
UDP has just a single error check
because it provides flow control and
that is used for checksums.
acknowledgment of data.
Satellites
Computer Memory
Modems
PlasmaCAM
Open connectors
Shielding wire
Embedded Processor
125) What are the benefits of the Hamming code?
Here, are important benefits of Hamming code
MAC IP address
The MAC address stands for Media Access Control
IP address stands for Internet Pr
Address.
It consists of a 48-bit address. It consists of a 32-bit address.
MAC address works at the link layer of the OSI IP address works at the network
model. model.
It is referred to as a physical address. It is referred to as a logical addre
You can retrieve the MAC address of any device You can retrieve the MAC addres
using ARP protocol. RARP protocol.
Classes are not used in MAC address. In IP, IPv4 uses A, B, C, D, and E c
Analog Digital
An analog signal is a continuous signal that Digital signals are time separated sig
represents physical measurements. generated using digital modulation.
It is denoted by sine waves It is denoted by square waves.
It uses a continuous range of values that help The Digital signal uses discrete 0 and
you to represent information. information.
The analog signal bandwidth is low The digital signal bandwidth is high
Analog hardware never offers flexible Digital hardware offers flexibility in
implementation. implementation.
It is suited for audio and video transmission. It is suited for Computing and digita
The Analog signal doesn’t offer any fixed range. Digital signal has a finite number, i.e
MAN network
A Metropolitan Area Network or MAN is consisting of a computer
network across an entire city, college campus, or a small region. This
type of network is large than a LAN, which is mostly limited to a single
building or site. Depending upon the type of configuration, this type of
network allows you to cover an area from several miles to tens of miles.
The Domain Name System is the second type supporting program that is
used by other programs such as to find the IP address of an e-mail
recipient.
1. Physical Layer
2. Datalink Layer
o It is used for transferring the data from one node to another node.
o It receives the data from the network layer and converts the data
into data frames and then attach the physical address to these
frames which are sent to the physical layer.
o It enables the error-free transfer of data from one node to another
node.
Functions of Data-link layer:
o Frame synchronization: Data-link layer converts the data into
frames, and it ensures that the destination must recognize the
starting and ending of each frame.
o Flow control: Data-link layer controls the data flow within the
network.
o Error control: It detects and corrects the error occurred during the
transmission from source to destination.
o Addressing: Data-link layer attach the physical address with the
data frames so that the individual machines can be easily identified.
o Link management: Data-link layer manages the initiation,
maintenance and, termination of the link between the source and
destination for the effective exchange of data.
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
The presentation layer of the OSI model is responsible for translating, encrypting,
and compressing data within the model. It is responsible for integrating all data
formats into acceptable and compatible formats.
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Layer
46) What is the difference between TCP/IP model and the OSI
model?
Following are the differences between the TCP/IP model and OSI model:
TCP/IP model developed the OSI model developed the model first
protocols first and then and then protocols.
model.
Workgroup Domain
There are two methods for starting a system in safe mode. Close any open
programs and restart the computer. Press F8 several times as the OS begins
to boot. This will open a popup with the option to start in safe mode along
with several other booting options.
The run command can also be used to complete the task. To invoke the Run
command, simultaneously press the Windows key and R. Enter MSConfig into
the window after typing it. The safe boot options will be displayed in a
window. Restart the machine after selecting the basic setting. Your computer
will boot up in safe mode.
It is a feature of Windows Active Directory that gives the user and the user
accounts more control. They provide efficient access to all network users. It is
also used to provide a user's security and network rules.
You can use it to manage certain operations like stopping the user from
logging out, executing a command, accessing the control panel, etc.
Bit by bit, data travels through this transmission One byte of data is transmitted through
in both directions. line at a time.
It connects the data in series using a D-shaped There are 17 signal lines and 8 ground
9-pin cable. the 25-pin port
It is an external port, much like a USB port. Firewire ports enable a quick
connection between a computer and a peripheral device. It has a 400 MBPS
data transfer rate. It is simple to recognize and frequently seen in external
storage devices, coupled with video and audio equipment.
Unless the device is compatible with USB 3.0, always choose Firewire when
you have a device that supports both USB and Firewire. Split connections and
ad hoc networks can both be established using it. However, because of USB
3.0, Firewire ports are no longer often used.
The following are some of the primary duties of a desktop support engineer:
This error screen appears on the computer after a fatal system error or a
system crash, such as:
Yes. Launch the Run window after logging in with the administrator account.
In it, type the diskmgmt.msc command. A new window will open up after you
hit enter. To switch to the Dynamic hard disc option, right-click the Basic hard
disc option.
This enables the PCs to join a network with a unique IP address each time.
18. Is a Default Gateway truly required?
You only utilize the default gateway address when attempting to connect to a
computer on a different network. You will encounter an error notice if you
attempt to connect to other networks without it.
This folder is for offline storage. It's a personal or online storage folder.
Only the Microsoft Exchange server is Although it is not advised, PST files can
supported by OST. utilized with an Exchange configuration
These files provide offline users with the ability These features are not available for the
to browse, read, compose, and reply to emails.
The user has two options when this mistake occurs: either they can fix it
themselves, or they may report it to Microsoft. Launch the Run command,
and type services.msc into it, then press Enter to start fixing the problem
yourself. Locate the Windows updating option in the new window and use the
right-click menu to pick properties.
Enter "enable" in the start-up blank, then click "start." Once you click OK, the
problem will be fixed.
22. What is the best technique to connect to the client from the server when it is
in a different place?
It is possible to connect to the client from a different location than the server
using the MSTSC command or Remote Desktop Connection. You can use
another person's computer as if you were sitting right next to it, but you need
to either know the distant computer's IP address or be on the same network.
Start the Run Window and enter the command mstsc /v: COMPUTER /f, where
V stands for the remote computer and f stands for full screen. Next, click.
You can alternatively type mstsc and press Input to launch the Remote
Desktop dialogue box, where you can enter the computer's name or IP
address to log in.
Tree Forest
In a forest, there is a transitive and bidirectional One or more trees in a forest don't crea
bond of trust between every tree. continuous namespace.
A forest can be made up of just one tree, and For the purposes of building trust relati
each tree there can exist independently. trees in a forest constitute a hierarchy.
This error frequently happens when the computer tries to boot from a flash
drive or hard drive that isn't a bootable source. This error can occasionally
also be brought on by corrupt files, loose IDE connectors, obsolete BIOS,
corrupt hard drives, and issues with OS upgrades.
26. What is the child domain and what makes it unique from a tree domain?
A network domain's child domains are logically A tree domain is a collection of domains
grouped together under their parent domain. make up the structure of an active dire
After the computer reboots, your system will join the domain.
That's it. The following time you restart the computer, you will immediately
log in to the selected account's desktop.
It is difficult to determine the difference between the Ethernet cable and the
Crossover cable because they both have similar appearances. They have the
same number of pins and a similar design since they are intended to be used
in the same port. They are distinct, though, and have colored labels on their
pins that are set up differently.
Yes. Go to the mail option in the control panel after opening it. Click to open
the personal folder after opening the data file there and selecting it. To take
a backup of your emails, copy.pst and paste it where you need to.
The entire backup size will therefore be given in These outperform a full backup in spee
bytes. flexibility.
35.
36. Can 50 PCs with the same configuration have the same OS installed?
Yes, you can use the Windows Deployment Service to accomplish this. WDS
enables users to complete a network-based Windows OS installation. It
lessens the expense and difficulty of performing manual OS installations on
several computers.
With WDS, you won't need any physical support like Windows DVDs or USB
drives to format any number of new computers—just plug in the Ethernet.
Both the server and clients must have a boot OS image and network bootable
NIC configurations. The OS will be installed on all PCs by restarting the
system.
Yes, desktop support is a good career choice for many people. This is an ideal
job to get into big tech. It acts as a stepping stone to getting into the
technical side.
Analyze the job description: Be sure to take note of the primary focus
areas of the position you applied for along with the firm you are researching.
Make a list of the reasons why you believe you can perform these specific
tasks after thoroughly reading the job description.
Customize your answers: When asked about a particular skill set, avoid
using the same response for every company you apply to. Instead, prepare a
list of how your skills might help the company and the position for which you
are interviewing.
Windows has a feature called Safe Mode that may be used to scan the OS
and clean it of any adware. It is also used to configure applications and
troubleshoot driver issues. In contrast to normal mode, it enables you to run
diagnostics and uninstall unwanted apps from the OS.
Question 2: A user reports that their printer is not working. Upon inspection,
you find that the printer is not connected to the computer. What steps would
you take to resolve the issue?
Answer: I would first check that the printer is powered on and properly connected to
the computer. If it is not connected, I would connect it and try to print a test page to
ensure that the printer is working. If the printer is still not working, I would check the
printer drivers and reinstall them if necessary. I would also ensure that the correct
printer is selected in the print dialog box.
Question 3: A user reports that they cannot access the internet. What steps
would you take to resolve the issue?
Answer: I would first check that the computer is connected to the internet and that
there are no issues with the network. If the network is working, I would check the
browser settings to ensure that the user is not using a proxy server. If that doesn’t
resolve the issue, I would check the DNS settings and flush the DNS cache. I would
also check the firewall settings to ensure that they are not blocking internet access.
Question 4: A user reports that they are unable to access a shared drive on the
network. What steps would you take to resolve the issue?
Answer: I would first check that the user has the necessary permissions to access
the shared drive. If the user has the correct permissions, I would check that the
shared drive is properly connected and that there are no network issues. I would also
ensure that the user is using the correct username and password to access the
drive. If necessary, I would map the shared drive to the user’s computer to make it
easier to access.
Question 5: A user reports that their computer is not turning on. What steps
would you take to resolve the issue?
Answer: I would first check that the computer is properly plugged in and that there
are no issues with the power outlet. If the computer is still not turning on, I would
check the power supply and ensure that it is working properly. If the power supply is
functioning correctly, I would check the motherboard and RAM to ensure that there
are no hardware issues. If necessary, I would replace any faulty hardware
components.
Question 6: A user reports that their computer is infected with malware. What
steps would you take to resolve the issue?
Answer: I would first disconnect the computer from the network to prevent the
further spread of the malware. I would then run a malware scan using an antivirus
program and remove any detected threats. If the malware is persistent, I would boot
the computer into Safe Mode and run another scan. I would also ensure that the user
is educated on safe browsing practices to prevent future infections.
Answer: I would first try to determine the error message displayed on the blue
screen. If it is a known error, I would look up the solution online and follow the
recommended steps. If it is an unknown error, I would try to determine if any recent
changes were made to the computer, such as software updates or new hardware
installations. I would also check the computer’s hardware components, such as the
RAM or hard drive, to ensure that there are no issues. If necessary, I would perform
a system restore or reinstall the operating system.
Question 8: A user reports that they are unable to open a specific application.
What steps would you take to resolve the issue?
Answer: I would first try to determine if the application is installed correctly and up-
to-date. If it is, I would try to repair the application using the built-in repair tool or
reinstall it if necessary. I would also check the computer’s security settings to ensure
that the application is not being blocked by a firewall or antivirus program. If
necessary, I would contact the application’s support team for further assistance.
Answer: I would first ensure that the computer’s fans are functioning correctly and
are not blocked by dust or debris. If the fans are working properly, I would check the
computer’s temperature using a software tool and monitor it while the computer is in
use. If the temperature is consistently high, I would recommend the user to clean the
computer’s internals or replace any faulty components, such as the CPU or GPU.
Question 10: A user reports that they are unable to send or receive emails.
What steps would you take to resolve the issue?
Answer: I would first check that the user’s email account is properly configured in
their email client and that there are no issues with the email server. If the email client
is properly configured and the server is working correctly, I would check the user’s
internet connection and firewall settings to ensure that they are not blocking email
traffic. If necessary, I would contact the email provider for further assistance.
Question 11: A user reports that their computer is running very slow. What
steps would you take to resolve the issue?
Answer: I would first check the computer’s performance using a software tool and
identify any resource-intensive applications or processes. I would then try to optimize
the computer’s performance by closing unnecessary applications, disabling startup
programs, and performing disk cleanup. If necessary, I would upgrade the
computer’s hardware components, such as the RAM or hard drive.
Question 12: A user reports that they are unable to connect to the internet.
What steps would you take to resolve the issue?
Answer: I would first check the user’s internet connection and verify that their
network adapter is functioning correctly. I would then check the computer’s IP
address and DNS settings and ensure that they are properly configured. If
necessary, I would reset the network settings, update the network adapter driver, or
contact the internet service provider for further assistance.
Question 13: A user reports that they are unable to print from their computer.
What steps would you take to resolve the issue?
Answer: I would first check that the printer is properly connected to the computer
and that its drivers are up-to-date. I would then check the printer’s queue and ensure
that there are no print jobs stuck in the queue. If necessary, I would clear the queue
and restart the print spooler service. If the issue persists, I would check the printer’s
hardware components, such as the ink cartridges or paper trays.
Question 14: A user reports that they are unable to access a specific website.
What steps would you take to resolve the issue?
Answer: I would first check that the user’s internet connection is working correctly
and that there are no issues with the website’s server. I would then check the user’s
browser settings and ensure that the website is not blocked by a firewall or antivirus
program. If necessary, I would clear the browser’s cache and cookies or try
accessing the website using a different browser.
Question 15: A user reports that their computer is displaying a “low disk
space” warning. What steps would you take to resolve the issue?
Answer: I would first check the computer’s storage capacity and identify any large or
unnecessary files that can be deleted. I would then perform a disk cleanup to clear
temporary files and free up space. If necessary, I would transfer files to an external
hard drive or upgrade the computer’s storage capacity.
Question 16: A user reports that they are unable to access a shared folder on
the network. What steps would you take to resolve the issue?
Answer: I would first check the user’s network connection and verify that they are
authorized to access the shared folder. I would then check the computer hosting of
the shared folder and ensure that it is properly configured and accessible. If
necessary, I would check the network’s firewall settings or contact the network
administrator for further assistance.
Question 17: A user reports that they are unable to hear sound from their
computer. What steps would you take to resolve the issue?
Answer: I would first check the computer’s volume settings and ensure that the
speakers or headphones are properly connected. I would then check the computer’s
sound drivers and ensure that they are up-to-date. If necessary, I would troubleshoot
the audio hardware components, such as the speakers or sound card.
Question 18: A user reports that their computer is displaying a “no boot
device” error. What steps would you take to resolve the issue?
Answer: I would first check the computer’s boot order in the BIOS and ensure that
the correct device is selected as the primary boot device. I would then check the
computer’s hard drive and ensure that it is properly connected and detected by the
BIOS. If necessary, I would try to repair the computer’s startup files using a Windows
recovery tool or reinstall the operating system.
Question 19: A user reports that their computer is not responding to any input.
What steps would you take to resolve the issue?
Answer: I would first check if the computer is frozen by trying to open the task
manager using the keyboard shortcut or by pressing CTRL + ALT + DELETE. If the
task manager opens, I would check the performance and identify any resource-
intensive applications or processes. If the computer is completely unresponsive, I
would try to force shut down the computer using the power button and perform a
system restore or repair.
Answer: I would first check the computer’s event log and identify any errors or
warnings related to the restart. I would then check the computer’s hardware
components, such as the RAM or power supply, and ensure that they are properly
connected and functioning correctly. If necessary, I would update the computer’s
drivers and perform a virus scan to identify any malware that may be causing the
issue.
Question 21: A user reports that they are unable to log in to their computer.
What steps would you take to resolve the issue?
Answer: I would first verify that the user is entering the correct username and
password. If the login credentials are correct, I would check the computer’s network
connection and ensure that it is properly configured. If necessary, I would try to log in
using a different account or perform a password reset.
Question 22: A user reports that their computer is displaying a blue screen
error. What steps would you take to resolve the issue?
Answer: I would first check the error code displayed on the blue screen and
research it online to identify the cause. I would then check the computer’s hardware
components, such as the RAM or hard drive, and ensure that they are properly
connected and functioning correctly. If necessary, I would try to update the
computer’s drivers or perform a system restore to a previous working state.
Question 23: A user reports that their computer is running very slow. What
steps would you take to resolve the issue?
Answer: I would first check the computer’s resource usage using the task manager
and identify any resource-intensive applications or processes. I would then perform a
virus scan and remove any malware that may be causing the issue. If necessary, I
would try to upgrade the computer’s hardware components, such as the RAM or
hard drive, or optimize the computer’s settings to improve performance.
Question 24: A user reports that they are unable to access a particular
website. What steps would you take to resolve the issue?
Answer: I would first check if the website is accessible from other devices on the
same network. If the website is inaccessible on all devices, I would check the
computer’s network connection and ensure that it is properly configured. If
necessary, I would try to flush the computer’s DNS cache or reset the computer’s
network settings. If the issue persists, I would contact the website’s administrator or
internet service provider for further assistance.
Question 25: A user reports that they are unable to print from their computer.
What steps would you take to resolve the issue?
Answer: I would first check if the printer is properly connected to the computer and
turned on. I would then check the printer’s status in the control panel and ensure that
it is set as the default printer. If necessary, I would try to reinstall the printer drivers
or perform a printer self-test to identify any hardware issues.
An ‘A’ record, also known as a host record, is used to map a domain name to an IP
address. It allows DNS servers to locate a website or other services using its IP
address. An ‘MX’ record, also known as a mail exchanger record, is used to specify
the mail server responsible for accepting email messages on behalf of a domain. It
allows email to be delivered to the correct mail server.
The IPCONFIG command displays the IP address, subnet mask, and default
gateway for a network adapter on a computer. It can also be used to release and
renew DHCP leases and flush the DNS resolver cache.
28. If switches are not available, how can two computers be connected?
If switches are not available, two computers can be connected using a crossover
cable. A crossover cable is a type of Ethernet cable that allows two devices to
communicate directly without the need for a switch.
30. How would you restore data if your system is infected with a virus?
To restore data after a virus infection, you would need to install a new hard drive with
the latest anti-virus software and an operating system with all the latest updates.
Next, connect the infected hard drive as a secondary drive and scan it with the anti-
virus software to remove the virus. Finally, copy the files from the infected hard drive
to the new hard drive.
31. How do you assist users in setting up and configuring new hardware and software?
When assisting with new hardware setup, I would carefully follow the manufacturer’s
instructions and ensure all connections are made correctly. For software
installations, I will either use a standardized image with pre-installed software or
guide the user through the installation process step by step, ensuring they
understand each stage of the setup.
I would first check if there is power to the system and if the power cable is securely
plugged in. If there’s power, then I would look for any error messages or beeps
during boot-up, indicating hardware issues. If no errors are visible, then I would boot
the system into safe mode to identify if a software or driver issue is causing the
problem. Based on my observations, will proceed with appropriate repairs or
escalate the issue if needed.
35. What is the distinction between a RAS server and a VPN server?
The Ping command is a network troubleshooting tool that sends an ICMP Echo
Request message to a target device and waits for an ICMP Echo Reply message. It
measures the round-trip time for packets to travel from the source device to the
target device and back, allowing network administrators to test network connectivity
and identify network problems.
38. What exactly do you mean when you say clustering? What are the advantages?
OU stands for Organizational Unit and it’s a container in Active Directory used to
hold users, groups, and machines. It is the smallest unit where a group policy can be
applied by an administrator.
43. What is the definition of group policy and what is it used for?
Group policy is used to set security and network settings for users on a network. It
provides an expedited access for all users and allows for the control of some
functions such as preventing users from shutting down the system, accessing the
control panel, or running certain commands.
44. In terms of Active Directory, what is the difference between policy, rights, and permission?
Policy is used in Active Directory to refer to settings at the site, domain, and OU
levels. Rights are given to users and groups, while permissions are granted to
network resources like files, folders, and printers.
DC stands for Domain Controller, which is a server that verifies security information
like user ID and password. ADC stands for Additional Domain Controller, which is a
backup for the domain controller.
46. What is the main difference between a Domain Controller and an Additional Domain
Controller in Active Directory?
The main difference between a DC and ADC is that the former has all five
operational roles, while the latter only has three.
47. What are the operational roles of a Domain Controller and an Additional Domain Controller
in Active Directory?
DC has the following operational roles: Master of Domain Naming, Master Schema,
Master RID, Emulator for PDC, and Master of Infrastructure. ADC has the following
operational roles: Emulator for PDC, Master RID, and Master of Infrastructure.
A Default Gateway is the IP address of the network router. Whenever a user wants
to connect to a different network or cannot find their own, their inquiry will be sent to
the Default Gateway.
49. What are the steps to create a backup of emails in Microsoft Outlook?
To create a backup in MS Outlook, go to the Control Panel, select the Mail option,
open the data file, pick Personal Folder, and click Open Folder. Then, copy the .pst
file and paste it to the desired backup location.
The BUS speed is the rate of communication between the microprocessor and the
RAM.
Active Directory partitions are divided into three categories: Schema partition,
Configuration partition, and Domain partition.
A Gateway uses a different network architecture than a Router, which uses the same
one.
SCSI stands for Small Computer System Interface, which is a standard interface that
enables personal computers to communicate with peripheral devices like printers,
CD-ROM drives, disc drives, and tape drives. Data transfer rates are typically fast
with SCSI.
56. How are IP addresses categorized, and what are their respective ranges?
There are five classes of IP addresses, namely Class A, B, C, D, and E. The ranges
for each class are as follows: Class A – 0 to 126 (127 is reserved for loopback);
Class B – 128 to 191; Class C – 192 to 223; Class D – 224 to 239; and Class E –
240 to 255.
FIXMBR is a repair program that fixes the Master Boot Record of the Partition Boot
Sector.
SID stands for Security Identifier, which is a unique ID assigned to each computer
entity.
Incremental backups only back up data that has changed since the last backup,
while differential backups select only files that have changed since the previous
backup. Incremental backups back up the changed data corresponding to each file,
whereas differential backups back up the entire changed file.
60. How does a server operating system differ from a desktop operating system?
BSOD stands for Blue Screen Of Death, which occurs when the operating system or
hardware fails, resulting in a blue screen with a code. Restarting the computer
usually resolves the issue, but starting the computer in safe mode can also help.
63. What is the PTR record, and how is it related to the ‘A’ record?
PTR (Program Trouble Record) is the reverse lookup record that checks if a server
name is associated with an IP address. It is also known as a pointer record or
Reverse DNS record. The ‘A’ record is the forward lookup record that checks if a
name is associated with an IP address.
SMTP (Simple Mail Transfer Protocol) is used for sending mail, while POP (Post
Office Protocol) is used for receiving mail.
68. What is the purpose of Domain Name System (DNS) and how does it work?
DNS, or Domain Name System, is responsible for translating domain names into IP
addresses and vice versa. It serves as a translator for computers by allowing them to
communicate using numerical IP addresses instead of domain names. For example,
when you type “hotmail.com” into your browser, DNS will convert it into an IP
address that your computer can use to access the website.
69. What is a Blue Screen of Death (BSOD) and how can you troubleshoot it?
A Blue Screen of Death (BSOD) is a system error that causes your computer to
crash and display a blue screen with an error message. To troubleshoot a BSOD,
start by checking your computer’s RAM and booting into safe mode. It’s also
recommended to run an antivirus scan and update your drivers with software
approved by the motherboard or suggested by the manufacturer.
70. How can you convert a basic disk into a dynamic disk?
To convert a basic disk to a dynamic disk, open the Run dialog box and type
“diskmgmt.msc”. From there, select the basic disk you want to convert, right-click on
it, and choose the “Convert to Dynamic Disk” option.
71. What is the process for creating a Windows system service file?
Enabling Windows File Protection ensures that altering or deleting a system file that
does not have a file lock will result in Windows restoring the original file from a
cached folder containing backup copies of these files.
72. What is the difference between desktop support and help desk?
Desktop support involves on-site troubleshooting, while help desk support involves
remote troubleshooting for issues reported via phone or email.
Right-click on the desktop, go to properties > appearance > effects, choose the
option to use a larger font, then click OK to apply the changes.
74. What is TFT?
75. What is an IP range on the networking side? How can Outlook problems be fixed? How can
LDAP be set up in Outlook?
76. What is the best way to make desktop icons smaller or larger?
Right-click on the desktop, go to properties > appearance > advanced > scroll down
to “desktop” and click on “icons,” then increase the font size of the icons.
78. What is the most dependable method to access a client in a different location from the
server?
79. What is the best way to install a pre-existing printer on a user’s computer?
Navigate to the control panel, then to the add hardware wizard. Insert the software
CD if required, otherwise, the system will install it automatically. Restart the
computer.
80. How can you reboot directly to your desktop without having to login every time?
Right-click on “My Computer” and select “Manage” > go to “Users and Groups” >
right-click on the user name and select “Set Password” > enter a password and click
OK. The computer will then boot directly to the desktop.
81. How can you check if the print spool is running, where is it located, and where does it store
spooled print jobs?
The print spool is a critical service in Windows that allows for printing on a local or
network printer. It can be checked by going to “Services” in the Control Panel. The
spooler files are located in the “system32\spool\PRINTERS” folder, and spooled print
jobs are stored in this folder as well.
A FireWire port is a type of serial port that uses FireWire technology to transfer data
quickly between electronic devices. It can be used to connect a variety of different
devices, such as scanners to a computer system, and has a transmission rate of up
to 400Mbps.
87. How can you export the OST mailbox as PST files?
To export the OST mailbox as PST files, select the “Files” option in Outlook, navigate
to “Open & Export” and click “Import and Export”. Next, select “Export a file” and click
“Next”. Then, click on “Microsoft Exchange Server” and click “Next” again. Select the
folder that you want to export and click “Next”. Browse to select a location to save
the new PST file, choose the options for duplicate items, and click “Finish”.
88. How can you use Archiving to save OST files as PST?
To use Archiving to save OST files as PST, launch Outlook and select “Advanced
Options” from the file menu. Click on “AutoArchive Settings” and select the frequency
for running auto-archiving. Pick the folder for saving the archived files and provide
the options for archiving. Click “OK” to complete the process.
NTLDR error is an issue that commonly occurs when a computer attempts to boot
from a non-bootable flash drive or hard drive. It can also be caused by corrupt and
misconfigured hard drives, OS upgrade problems, obsolete BIOS, loose IDE
connectors, and corrupt files.
To fix an NTLDR error, restart the system and check if the issue was a fluke. If the
error persists, check your optical disk and floppy drive, disconnect any external drive,
and check the settings of all drives in the BIOS to make sure they are correct.
Restore the important system files from the original Windows CD, replace or repair
the boot.ini file, write a new Windows partition boot sector, repair the master boot
record for Windows, reset all power cables and internal data, update the BIOS of
your motherboard, repair the installation of your OS, or perform a clean installation of
the OS.
To correct the issue of a system that constantly restarts, there are a few options.
First, turn off the auto-restart feature by pressing the F8 key when the Windows logo
appears after turning on the computer. From the boot menu that displays on the
screen, select safe mode and open the Run Window. Then type sysdm.cp and click
OK. In the advanced tab of the Startup and Recovery section’s settings, uncheck the
Automatically Restart option box under System Failure and click OK to save
changes. Finally, delete problematic registry entries.
92. How can I bypass the login screen and go straight to my desktop on Windows?
To bypass the login screen and go straight to the desktop on Windows, launch the
Run Window and type netplwiz for Windows 10 or control userpasswords2 for other
versions of Windows. In the User Accounts window, go to the Users Tab and
uncheck the box beside “Users Must Enter A User Name And Password To Use This
Computer” option. Choose the account to log in automatically on reboot, enter the
username and password, and click OK. The system will log in to the desktop of the
chosen account directly on the next restart.
To add a system to a domain, go to the control panel, select system and security,
and click on the system. Then, go to Computer name, domain, and workgroup
settings and select change settings. In the Computer Name tab, select change, and
then click on Domain under the Member Of option. Type in the domain name that
you want the system to join, click OK, and then restart the system.
94. What is the difference between a RAS and a VPN Server?
RAS and VPN Servers are two different remote connection methods. RAS is an
industry-standard remote connection method that is meant for small networks, while
VPN is designed for medium and large-sized networks. RAS can be expensive,
unstable, and difficult to deal with, while VPN is extremely economical, stable, and
hassle-free to deal with.
A parallel port is a female connector with 25 pins that transmits data in parallel. It
sends data in 8-bit increments and is faster than a serial port.
A serial port is a male connector with 9 or 25 pins that sends data in a sequential
format. It transfers data one bit at a time, making it slower than a parallel port. Its
purpose is to provide a method of transferring data between devices one bit at a
time.
To change folder permissions, you can use Group Policy or do it locally with
Administrator Privileges. Go to the folder properties, select the Security tab, and click
on the Edit button. A pop-up will appear, allowing you to add users and grant them
Read, Write, Execute, or Full permissions.
A Switch and a Hub have several key differences. While a Hub connects multiple
computers to a single network, a Switch divides the same network into multiple
segments. In addition, with a Hub, all computers linked to it receive data packets
simultaneously, causing latency issues. In contrast, a Switch can control this by
sending data packets only to the computers that have requested them.
To recover data from a virus-infected computer, remove the hard drive and connect it
as a slave to a computer with the latest virus definitions, Microsoft patches, and
drivers. Scan the disk for viruses, remove them, and then extract the necessary data.
Transport layer provides end to end connection to ensure that packet arrive in sequence and without
error.
What is DNS?
DNS stand for domain name system is a Decentralized naming system and used by computer system
and other device over the internet .it is translating the domain name into Ip address and Ip address
into domain name.
While it is provided by DHCP (Dynamic Host Configuration Protocol). dynamic IP addresses static
changes at any time.
What is Hamming code?
It is a set of error-correction codes that can be used to detect and correct the errors that can occur
when the data is moved or stored from the sender to the receiver.
What is Checksum?
It is more reliable than other modes of error detection, it uses a checksum generator on the sender
side and a checksum checker on the receiver side
What is subnetting?
Subnetting is technique which in computer network to divide a single network in to multiple smaller
networks is known as subnetting. The purpose of subnetting is partition a large network in to smaller
network that is more effective subnet which can improve network performance security and
organization
TCP (Transmission Control Protocol) is one of the main protocols of the Internet protocol suite. It lies
between the Application and Network Layers which are used in providing reliable delivery services. It
is a connection-oriented protocol for communications that helps in the exchange of messages
between different devices over a network. The Internet Protocol (IP), which establishes the
technique for sending data packets between computers, works with TCP.
Advantages of TCP
It can reduce the speed of data based on the speed of the receiver.
Disadvantages of TCP
It is slower than UDP and it takes more bandwidth.
It does not load the whole page if a single data of the page is missing.
Advantages of UDP
It does not require any connection for sending or receiving data.
UDP can deliver data if all the components of the data are not complete.
Disadvantages of UDP
Types of Domains
There are various kinds of domain:
Inverse domain: if we want to know what is the domain name of the website. Ip to domain name
mapping. So DNS can provide both the mapping for example to find the IP addresses of
geeksforgeeks.org then we have to type
It is less flexible
Information is saved on the Microsoft server
There is a limitation to the number of emails that can be sent per day
Financial Management – Prasanna Chandra
Cost issues
Q4
Q 4. What is the file extension for an MS Outlook
file?
Ans. The extension for an MS Outlook file is ‘.pst’.
Q5
Q 5. Does MS Outlook have an option to manage and
schedule a timetable?
Ans. Yes, MS Outlook does have an option of Calendar, where the user can save
dates and schedule meetings and have easy access to them.
Q 5. How many type of version available in outlook ?
Version Specification
Ctrl+2 Go to calendar
Ctrl+M Check for new messages