0% found this document useful (0 votes)
9 views59 pages

Exit Exam

The document covers various topics related to network security, project management, and routing and switching, providing essential definitions, concepts, and best practices. Key areas include network security principles, project management phases, and differences between IPv4 and IPv6. It serves as a comprehensive guide for understanding critical IT concepts and practices.

Uploaded by

taif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views59 pages

Exit Exam

The document covers various topics related to network security, project management, and routing and switching, providing essential definitions, concepts, and best practices. Key areas include network security principles, project management phases, and differences between IPv4 and IPv6. It serves as a comprehensive guide for understanding critical IT concepts and practices.

Uploaded by

taif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

Contents

Network Security ........................................................................................................................................ 2


Project Management.................................................................................................................................... 9
Routing and Switching ............................................................................................................................... 13
Wireless Network ....................................................................................................................................... 18
Hardware .................................................................................................................................................... 23
Office........................................................................................................................................................... 25
Windows ..................................................................................................................................................... 27
Java Questions ............................................................................................................................................ 29
C++ Questions ............................................................................................................................................. 30
Database Questions ................................................................................................................................... 31
Digital Logic Design (DLD) Questions ......................................................................................................... 32
System Administration 2 .......................................................................................................................... 34
Advance Switching ..................................................................................................................................... 38
Linux ............................................................................................................................................................ 43
Network Fundamental ............................................................................................................................... 46
System Administration (Windows Server) ................................................................................................ 48
‫ اسالمي ثقافت‬................................................................................................................................................... 50
Online Skills ................................................................................................................................................ 52
Computer Fundamentals ........................................................................................................................... 55

M. Akbar Momand
Dalwa 24, 2024

Page 1 of 59
Network Security
1. What is network security, and why is it important?
Network security involves implementing policies, technologies, and practices to protect the
integrity, confidentiality, and availability of data and systems on a network. It is essential to
safeguard sensitive information, prevent unauthorized access, and ensure seamless business
operations.
2. What are the primary goals of network security?
The primary goals are:
Confidentiality: Protecting data from unauthorized access.
Integrity: Ensuring data is not altered during transmission.
Availability: Ensuring authorized users can access resources when needed.

3. What are the most common types of network attacks?


Denial-of-Service (DoS): Overloading a network to disrupt its services.
Man-in-the-Middle (MitM): Intercepting communication between two parties.
Phishing: Trick users into providing sensitive data.
Ransomware: Encrypting data and demanding payment for its release.
4. What is the AAA framework in network security?
Answer:
AAA stands for Authentication, Authorization, and Accounting.
Authentication: Verifies user identity (e.g., passwords, biometrics).
Authorization: Grants access based on user roles and permissions.
Accounting: Tracks user activities for auditing and monitoring.

5. How does a firewall enhance network security?


Answer:
A firewall acts as a barrier between trusted internal networks and untrusted external networks,
monitoring and filtering incoming and outgoing traffic based on predefined security rules. It
prevents unauthorized access and mitigates potential threats.

6. What are the types of firewalls?

Page 2 of 59
Answer:
Packet-filtering firewalls: Analyze packets based on IP, port, and protocol.
Stateful inspection firewalls: Monitor active connections and their states.
Next-generation firewalls (NGFWs): Offer advanced features like deep packet inspection and
application filtering.

7. What is a Virtual Private Network (VPN)?


Answer:
A VPN is a secure connection established over a public network (like the internet) that encrypts
data, ensuring secure communication between remote users and the organization's private
network.

8. What is port scanning, and why is it used?


Answer:
Port scanning identifies open ports on a device or network. While administrators use it for
vulnerability assessment, attackers use it to find entry points for exploitation.

9. What are the advantages of using a VPN?


Answer:
Secures remote work by encrypting traffic.
Protects data over public Wi-Fi.
Hides IP addresses for online privacy.
Allows secure access to geo-restricted resources.

10. What is an Intrusion Detection System (IDS)?


Answer:
An IDS is a network security tool that monitors network traffic for suspicious activity or policy
violations. It alerts administrators when potential threats are detected.

11. What are the types of IDS?


Answer:

Page 3 of 59
Host-based IDS (HIDS): Monitors a specific device or host.
Network-based IDS (NIDS): Monitors network traffic for malicious patterns.

12. What is an Intrusion Prevention System (IPS)?


An IPS is a proactive security tool that not only detects suspicious activity but also takes
automated actions to block or prevent the attack in real-time.

13. What is the difference between IDS and IPS?


IDS: Monitors and alerts about threats but does not take action.
IPS: Monitors, detects, and actively blocks threats in real-time.

14. What are the common methods used in network attacks?


Brute-force attacks: Trying every possible combination to guess passwords.
SQL Injection: Exploiting database vulnerabilities via malicious queries.
Social Engineering: Manipulating individuals to reveal confidential data.

15. How does multi-factor authentication (MFA) improve network security?


MFA enhances security by requiring users to provide multiple forms of verification (e.g.,
password + fingerprint or password + one-time code). It reduces the risk of unauthorized access
even if one factor is compromised.
16. What is the role of a DMZ (Demilitarized Zone) in network security?

A DMZ is a buffer zone that hosts public-facing services (e.g., web servers) while isolating them
from the internal network. It minimizes the risk of external threats reaching sensitive systems.
17. How do modern firewalls handle encrypted traffic?
Modern firewalls use features like SSL/TLS decryption to inspect encrypted traffic for threats.
They temporarily decrypt packets, analyze their content, and re-encrypt them before forwarding.
18. What are some best practices for securing VPNs?
Use strong encryption protocols (e.g., AES-256, IPSec).
Implement MFA for VPN access.
Regularly update VPN software.
Monitor VPN logs for unusual activities.
Page 4 of 59
19. What are common challenges in intrusion detection systems (IDS)?
False positives: Legitimate traffic flagged as malicious.
False negatives: Threats not detected by the IDS.
High volume of alerts requiring manual analysis.
20. How can organizations defend against network attacks?
Regularly update and patch systems.
Implement firewalls and IDS/IPS systems.
Train employees on cybersecurity awareness.
Conduct regular security audits and penetration testing.

Routing & Switching 2

1. What is IGRP, and why is it used in networking?


Answer:
IGRP (Interior Gateway Routing Protocol) is a distance-vector routing protocol developed by
Cisco. It is used to route data within an autonomous system, offering features like multiple
metrics (bandwidth, delay, reliability, and load) to select the best path.

2. What are the limitations of IGRP?


Answer:
Slower convergence compared to modern protocols.
Limited scalability due to its flat routing structure.
Uses more bandwidth because of frequent updates.
Superseded by EIGRP, which is more efficient.

3. What is EIGRP, and how does it differ from IGRP?


Answer:
EIGRP (Enhanced Interior Gateway Routing Protocol) is an advanced version of IGRP that uses
Page 5 of 59
the Diffusing Update Algorithm (DUAL) for fast convergence and loop prevention. Unlike
IGRP, EIGRP supports classless routing, partial updates, and reduced bandwidth usage.

4. What are the key features of EIGRP?


Answer:
DUAL algorithm: Ensures loop-free and quick convergence.
Classless routing: Supports subnet masks.
Supports VLSM (Variable Length Subnet Masking).
Efficient updates: Sends only changes, not entire tables.
Multiple protocol support: Can route IP, IPv6, and AppleTalk.

5. What is OSPF, and why is it considered a link-state protocol?


Answer:
OSPF (Open Shortest Path First) is a link-state routing protocol used for dynamic routing within
an autonomous system. It calculates the shortest path to destinations using the Dijkstra algorithm
and updates routers only when there are topology changes, reducing overhead.

6. What are the advantages of using OSPF over distance-vector protocols?


Answer:
Fast convergence: Updates propagate quickly.
Supports hierarchical design: Uses areas to scale large networks.
Classless routing: Allows variable-length subnet masks.
Reduces bandwidth usage: Updates sent only when topology changes occur.

7. How does OSPF use areas to organize a network?


Answer:
OSPF organizes networks into areas to improve scalability.
Backbone area (Area 0): Central hub connecting all other areas.
Non-backbone areas: Connect to the backbone for inter-area communication.
This structure limits the scope of updates and reduces routing table size.

Page 6 of 59
8. What is a VLAN, and how does it enhance network performance?
Answer:
A VLAN (Virtual Local Area Network) logically segments a physical network into isolated
networks based on devices' roles or departments. This reduces broadcast domains, enhances
security, and improves performance by isolating traffic.

9. What are the benefits of using VLANs in a network?


Answer:
Reduces broadcast traffic.
Enhances network security by isolating sensitive data.
Simplifies network management by grouping devices logically.
Increases flexibility for device relocation within a network.

10. What is VTP, and how does it simplify VLAN management?


Answer:
VTP (VLAN Trunking Protocol) is a Cisco protocol that automates the distribution and
synchronization of VLAN configurations across switches in a domain. It reduces manual
configuration errors and ensures consistent VLAN setup.

11. What are the VTP modes, and what does each mode do?
Answer:
Server mode: Creates, modifies, and propagates VLAN configurations.
Client mode: Receives VLAN updates but cannot create or modify VLANs.
Transparent mode: Forwards VTP updates but does not process or synchronize them.

12. What is Frame Relay, and how does it work?


Answer:
Frame Relay is a packet-switched WAN protocol used for connecting multiple sites. It transmits
variable-length frames over virtual circuits (PVCs or SVCs) and is efficient for bursty traffic.

13. What are the key components of Frame Relay?

Page 7 of 59
Answer:
Data Link Connection Identifier (DLCI): Identifies virtual circuits.
PVCs (Permanent Virtual Circuits): Persistent logical connections.
FRAD (Frame Relay Access Device): Connects end devices to the Frame Relay network.

14. What is the difference between DLCI and PVC in Frame Relay?
Answer:
DLCI: A unique identifier for virtual circuits on a Frame Relay network.
PVC: A permanent logical connection identified by a DLCI, always available for data
transmission.

15. What is the role of a Designated Router (DR) in OSPF?


Answer:
In multi-access networks, the DR reduces overhead by acting as a central point for exchanging
routing information. Other routers send updates to the DR, which then distributes them to the rest
of the network.

16. What is the administrative distance of EIGRP, and why is it important?


Answer:
The default administrative distance of EIGRP is:
90 for internal routes.
170 for external routes.
Administrative distance determines the trustworthiness of a route when multiple protocols
provide the same destination route.

17. What are the disadvantages of Frame Relay?


Answer:
Limited bandwidth for high-speed networks.
No built-in encryption, making it less secure.
Relies on the provider's infrastructure, leading to potential delays.

Page 8 of 59
18. How does OSPF ensure link reliability in a network?
Answer:
OSPF uses hello packets to monitor neighbor relationships and detects link failures quickly. It
recalculates routes using the Dijkstra algorithm to find an alternative path.

19. What are the main differences between VLANs and VTP?
Answer:
VLANs: Create logical network segments to isolate traffic.
VTP: Manages and propagates VLAN information across switches in a domain.

20. What is the split-horizon rule in EIGRP and IGRP?


Answer:
The split-horizon rule prevents routing loops by ensuring a router does not advertise a route back
on the interface from which it was learned

Project Management
1. What is IT Project Management?
Answer:
IT project management is the application of knowledge, skills, tools, and techniques to plan,
execute, monitor, and complete IT-specific projects. It involves managing project scope, budget,
timeline, and resources to achieve predefined goals.

2. What are the primary phases of IT project management?


Answer:
The primary phases are:
Initiation: Defining the project goals and scope.
Planning: Creating a roadmap for achieving project objectives.
Execution: Implementing the project plan.
Monitoring and Controlling: Tracking progress and making adjustments.
Closure: Finalizing the project and evaluating success.

3. Why is stakeholder management important in IT projects?

Page 9 of 59
Answer:
Stakeholder management ensures that the needs and expectations of individuals or groups
affected by the project are addressed. This fosters collaboration, reduces conflicts, and increases
the likelihood of project success.

4. What is a Work Breakdown Structure (WBS)?


A WBS is a hierarchical decomposition of the project into smaller, manageable tasks. It helps in
organizing work and ensures that no important tasks are overlooked.

5. How do you define project scope in IT projects?


Answer:
Project scope defines the boundaries, deliverables, and objectives of a project. It ensures clarity
on what is included and excluded to avoid scope creep.

6. What is the role of a project manager in IT projects?


Answer:
A project manager oversees project planning, execution, and delivery. Their responsibilities
include resource allocation, risk management, stakeholder communication, and ensuring the
project meets its objectives.

7. What is Agile project management?


Answer:
Agile project management is an iterative approach that focuses on delivering value in small,
manageable increments. It promotes flexibility, collaboration, and continuous improvement.

8. How is Scrum related to Agile?


Answer:
Scrum is a framework within Agile that uses short development cycles called sprints to deliver
project increments. It involves specific roles like Scrum Master, Product Owner, and
Development Team.

9. What is a Gantt Chart, and how is it used in IT projects?


Answer:
A Gantt Chart is a visual tool that represents a project’s timeline. It shows tasks, their durations,
and dependencies, aiding in tracking progress and scheduling.
Page 10 of 59
10. What is risk management in IT project management?
Answer:
Risk management involves identifying, assessing, and mitigating potential risks that could affect
a project’s success. It ensures that threats are minimized and opportunities are maximized.

11. What are project deliverables?


Answer:
Project deliverables are tangible or intangible outcomes produced during a project. Examples in
IT include software applications, system documentation, or a new network setup.

12. What is the Critical Path Method (CPM)?


Answer:
CPM is a technique used to determine the longest sequence of dependent tasks in a project. It
identifies critical tasks that must be completed on time to avoid delays.

13. What are the key metrics for IT project success?


Answer:
Key metrics include:
On-time delivery.
Staying within budget.
Meeting project requirements.
Stakeholder satisfaction.

14. What is change management in IT projects?


Answer:
Change management is the process of controlling and managing changes to project scope,
schedule, or resources. It ensures changes are implemented with minimal disruption.

15. How do IT projects handle resource management?

Page 11 of 59
Answer:
Resource management involves planning, allocating, and monitoring resources such as
personnel, hardware, software, and budget to ensure project efficiency.

16. What is the importance of communication in IT projects?


Answer:
Effective communication ensures all team members and stakeholders are aligned. It minimizes
misunderstandings, enhances collaboration, and keeps the project on track.

17. What is the role of testing in IT projects?


Answer:
Testing ensures the quality and functionality of deliverables. It helps identify bugs, improve
performance, and verify that requirements are met.

18. What is a project charter, and why is it important?


Answer:
A project charter is a formal document that authorizes a project. It outlines objectives,
stakeholders, and high-level requirements, serving as a reference throughout the project.

19. What are the common challenges in IT project management?


Answer:
Common challenges include scope creep, budget overruns, unrealistic timelines, resource
constraints, and resistance to change.

20. How is success evaluated in IT projects?


Answer:
Success is evaluated based on meeting the defined goals, staying within budget, adhering to
timelines, ensuring quality deliverables, and achieving stakeholder satisfaction.

Page 12 of 59
Routing and Switching
1. What is IP Addressing?
Answer:
IP addressing is the method of assigning a unique identifier (IP address) to each device on a
network. An IP address enables devices to communicate with each other over the internet or
local networks. It consists of a network portion and a host portion.

2. What is the difference between IPv4 and IPv6?


Answer:
IPv4: Uses 32-bit addresses, which provide around 4.3 billion unique addresses.
IPv6: Uses 128-bit addresses, providing a vastly larger address space, making it more scalable
for modern networks.

3. What is CIDR (Classless Inter-Domain Routing)?


Answer:
CIDR is a method for allocating IP addresses and routing IP packets. It replaces traditional
classful addressing and uses a format like 192.168.1.0/24, where /24 indicates the subnet mask,
allowing for more flexible and efficient IP address usage.

4. What is Cisco IOS (Internetwork Operating System)?


Answer:
Cisco IOS is the software used on Cisco network devices, such as routers and switches. It
provides a command-line interface (CLI) to configure and manage network devices, handling
tasks such as routing, switching, and security.

5. What are the different modes in Cisco IOS?


Answer:
User EXEC Mode: Basic read-only access to the device.
Privileged EXEC Mode: Access to advanced commands.
Global Configuration Mode: Where you configure device settings.
Interface Configuration Mode: For configuring specific interfaces.

Page 13 of 59
6. How do you configure an IP address on a Cisco router?
Answer:
To configure an IP address on a Cisco router, access the device in Global Configuration Mode
and use the following commands:
Router> enable
Router# configure terminal
Router(config)# interface GigabitEthernet0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# no shutdown

7. What is VLAN (Virtual Local Area Network)?


Answer:
VLAN is a logical partition of a physical network, allowing devices to be grouped together
regardless of their physical location. It improves security, reduces broadcast domains, and makes
network management easier.

8. What is the purpose of VLAN tagging?


Answer:
VLAN tagging allows switches to distinguish between traffic from different VLANs on the same
physical network. It is done using the IEEE 802.1Q standard, where a VLAN ID is added to
Ethernet frames.

9. How do you configure VLAN on a Cisco switch?


Answer:
To configure a VLAN on a Cisco switch, enter the following commands:
Switch> enable
Switch# configure terminal
Switch(config)# vlan 10
Switch(config-vlan)# name Sales
Switch(config-vlan)# exit

10. What is Spanning Tree Protocol (STP)?


Page 14 of 59
Answer:
STP is a network protocol that prevents loops in Ethernet networks by creating a loop-free
topology. It works by electing a root bridge and blocking redundant paths. If the primary path
fails, STP activates a backup path.

11. What is the role of the Root Bridge in STP?


Answer:
The Root Bridge is the central switch in the STP topology. It acts as the reference point for all
path calculations, and all other switches calculate their best paths to the Root Bridge.

12. What is the difference between RSTP (Rapid Spanning Tree Protocol) and STP?
Answer:
RSTP is an enhanced version of STP that provides faster convergence times. While STP can take
up to 50 seconds to converge, RSTP can do so in a few seconds, making the network more
resilient.

13. What is the purpose of a Default Route in routing?


Answer:
A default route is used when a router does not have a specific route in its routing table for a
destination. It acts as a catch-all route, directing packets to a specified gateway when no other
match exists.

14. How do you configure Static Routing?


Answer:
Static routing involves manually configuring the routes on the router. For example, to add a
static route on a Cisco router:
Router> enable
Router# configure terminal
Router(config)# ip route 192.168.2.0 255.255.255.0 192.168.1.1

15. What is the difference between Static Routing and Dynamic Routing?
Answer:
Static Routing: Routes are manually configured and do not change unless manually updated.

Page 15 of 59
Dynamic Routing: Uses protocols to automatically adjust routes based on network changes (e.g.,
RIP, OSPF).

16. What is RIP (Routing Information Protocol)?


Answer:
RIP is a distance-vector routing protocol that uses hop count as a metric to determine the best
path. It is simple and used for small networks but has limitations such as a maximum hop count
of 15.

17. How do you configure RIP on a Cisco router?


Answer:
To configure RIP on a Cisco router, follow these steps:
Router> enable
Router# configure terminal
Router(config)# router rip
Router(config-router)# version 2
Router(config-router)# network 192.168.1.0
Router(config-router)# network 10.0.0.0

18. What is the maximum hop count in RIP, and why is it important?
Answer:
The maximum hop count in RIP is 15, which limits the protocol to smaller networks. A hop
count of 16 is considered unreachable, making RIP unsuitable for large or complex networks.

19. What is the purpose of the RIP "split horizon" rule?


Answer:
The split horizon rule in RIP prevents a router from advertising a route back to the interface from
which it learned the route. This helps prevent routing loops.

20. What are the main advantages and limitations of RIP?


Advantages: Simple to configure, suitable for small networks, and widely supported.

Page 16 of 59
Limitations: Slow convergence, limited scalability (due to hop count limit), and no support for
Variable Length Subnet Masking (VLSM).

Page 17 of 59
Wireless Network
1. What is a Wireless Network?
Answer:
A wireless network allows devices to communicate and share data without the use of physical
cables. It uses radio frequency (RF) signals to transmit data over the air, providing flexibility and
mobility to users.

2. What are the main components of a wireless network?


Answer:
The main components of a wireless network include:
Access Points (APs): Devices that allow wireless devices to connect to a network.
Wireless Clients: Devices such as laptops, smartphones, and tablets that access the network
wirelessly.
Wireless Router: A router that provides wireless connectivity to a network.
Wireless LAN Controller (WLC): A device used to manage and configure multiple access points
in larger networks.

3. What is the difference between Wi-Fi and a cellular network?


Answer:
Wi-Fi: A local wireless network technology used for connecting devices to the internet or a LAN
over short to medium distances.
Cellular Network: A wide-area network (WAN) that provides mobile connectivity for devices
over larger geographical areas, typically managed by mobile service providers.

4. What are the most common wireless standards?


Answer:
The most common wireless standards include:
802.11a: Operates at 5 GHz with speeds up to 54 Mbps.
802.11b: Operates at 2.4 GHz with speeds up to 11 Mbps.
802.11g: Operates at 2.4 GHz with speeds up to 54 Mbps.
802.11n: Operates at 2.4 GHz or 5 GHz, supporting speeds up to 600 Mbps.
802.11ac: Operates at 5 GHz, supporting speeds up to several gigabits per second.
Page 18 of 59
802.11ax (Wi-Fi 6): The latest standard, offering better speed, capacity, and efficiency.

5. What is the difference between 2.4 GHz and 5 GHz frequency bands?
Answer:
2.4 GHz: Offers longer range but is more susceptible to interference from other devices like
microwaves, Bluetooth, and cordless phones.
5 GHz: Provides higher speeds and less interference but has a shorter range compared to 2.4
GHz.

6. What is the significance of IEEE 802.11 standards?


Answer:
IEEE 802.11 standards define the protocols for implementing wireless local area networks
(WLANs). These standards specify the technical aspects such as frequency bands, security
methods, and data transmission speeds for Wi-Fi networks.

7. What are the benefits of using Wi-Fi 6 (802.11ax)?


Answer:
Wi-Fi 6 offers:
Increased speed (up to 9.6 Gbps).
Better performance in dense environments with many devices.
Improved efficiency using technologies like OFDMA and MU-MIMO.
Lower latency and better battery life for connected devices.

8. What are the key wireless technologies used in modern networks?


Answer:
Key wireless technologies include:
Wi-Fi: A widely used wireless networking technology based on IEEE 802.11 standards.
Bluetooth: A short-range wireless technology used for connecting devices like headsets and
keyboards.
Zigbee: A low-power, short-range wireless technology used in IoT applications.
NFC (Near Field Communication): Used for very short-range communication, such as mobile
payments.
Page 19 of 59
9. What is the role of an Access Point in a wireless network?
Answer:
An Access Point (AP) is a device that connects wireless devices to the wired network. It
broadcasts the SSID, allowing wireless clients to connect and transmit data to the network.

10. What are the different wireless topologies?


Answer:
Wireless network topologies include:
Ad-hoc mode: Devices connect directly to each other without an AP.
Infrastructure mode: Devices connect to the network through an AP.
Mesh network: Multiple APs work together to extend network coverage over a large area.

11. What is interference in wireless networks?


Answer:
Interference refers to any unwanted signal or disruption that negatively affects the quality of the
wireless signal. It can be caused by other wireless devices, physical obstacles, or environmental
factors.

12. What are the common sources of interference in wireless networks?


Answer:
Common sources of interference include:
Microwave ovens
Bluetooth devices
Cordless phones
Walls and thick materials
Other Wi-Fi networks (co-channel or adjacent-channel interference)

13. How can interference be minimized in wireless networks?


Answer:
Interference can be minimized by:

Page 20 of 59
Using the 5 GHz band (less congested).
Adjusting the placement of Access Points to avoid physical obstructions.
Choosing non-overlapping channels for Wi-Fi networks.
Using advanced technologies like beamforming to direct signals.

14. What is the impact of interference on wireless network performance?


Answer:
Interference can lead to decreased network performance, including reduced data transfer speeds,
higher latency, dropped connections, and packet loss. Proper planning and troubleshooting can
help mitigate these issues.

15. What is wireless network security?


Answer:
Wireless network security involves the use of encryption, authentication, and access controls to
protect the integrity and confidentiality of data transmitted over wireless networks, preventing
unauthorized access.

16. What are the common wireless security protocols?


Answer:
The common wireless security protocols are:
WEP (Wired Equivalent Privacy): An outdated and insecure protocol.
WPA (Wi-Fi Protected Access): Improved security but still has some vulnerabilities.
WPA2: A stronger security protocol using AES encryption.
WPA3: The latest security protocol with enhanced encryption and protection.

17. What is WPA3, and how does it improve security?


Answer:
WPA3 is the latest Wi-Fi security protocol, offering improved encryption, stronger protection
against brute-force attacks, and more robust security for public networks. It introduces features
like Simultaneous Authentication of Equals (SAE) for better password protection.

18. What is the purpose of an SSID in a wireless network?

Page 21 of 59
Answer:
An SSID (Service Set Identifier) is a unique name that identifies a wireless network. It is used by
wireless devices to locate and connect to the correct network.

19. What is MAC filtering in wireless security?


Answer:
MAC filtering is a security feature that restricts access to a wireless network based on the MAC
address of the device. Only devices with a specified MAC address are allowed to connect to the
network.

20. What is the role of a firewall in securing a wireless network?


Answer:
A firewall helps protect a wireless network from unauthorized access and attacks by monitoring
and controlling incoming and outgoing network traffic. It can block malicious traffic and prevent
external threats from compromising the network.

Page 22 of 59
Hardware
What is an input device?
An input device is hardware that allows users to enter data and commands into a computer for
processing.
Give three examples of input devices and their functions.
Keyboard (used for typing and entering commands), Mouse (used for pointing and clicking on
graphical interfaces), and Scanner (used for digitizing printed documents or images).
How does a touchpad differ from a mouse?
A touchpad is a built-in input device found in laptops, allowing users to control the cursor using
finger gestures, while a mouse is an external device that requires a surface to operate.
What is the function of a barcode scanner?
A barcode scanner reads barcodes from products or documents and converts them into digital
data for inventory or identification purposes.
What is an output device?
An output device is hardware that displays, prints, or transmits processed data from a computer
to the user.
What are three common types of output devices?
Monitor (displays visual output), Printer (produces hard copies of documents), and Speakers
(output sound from a computer).
What is the difference between an LED and an LCD monitor?
LED (Light Emitting Diode) monitors use light-emitting diodes for better brightness and energy
efficiency, while LCD (Liquid Crystal Display) monitors use fluorescent backlighting.
How does a laser printer work?
A laser printer uses a laser beam to create an electrostatic image on a drum, which attracts toner
powder and transfers it onto paper, producing high-quality prints.
What is a system unit in a computer?
The system unit is the main part of a computer that houses the motherboard, processor, memory,
power supply, and storage devices.
What are the main components inside a system unit?
The motherboard, central processing unit (CPU), memory (RAM), power supply unit (PSU),
hard drive (HDD/SSD), and cooling fans.
What is the function of the motherboard?

Page 23 of 59
The motherboard connects and allows communication between all hardware components,
including the processor, memory, and peripheral devices.
How does a power supply unit (PSU) work?
A PSU converts electrical power from an outlet into the appropriate voltage and current required
to power the computer’s internal components.
What is a processor (CPU)?
The CPU (Central Processing Unit) is the brain of the computer that performs calculations,
executes instructions, and processes data.
What are the main components of a CPU?
Arithmetic Logic Unit (ALU) (performs calculations), Control Unit (CU) (manages instruction
execution), and Registers (store temporary data).
What is the difference between a dual-core and a quad-core processor?
A dual-core processor has two processing units, while a quad-core processor has four, allowing
for better multitasking and performance.
What is the difference between primary and secondary memory?
Primary memory (RAM, cache) is fast and volatile, while secondary memory (HDD, SSD) is
non-volatile and stores data permanently.
What is computer memory?
Computer memory stores data and instructions temporarily or permanently for processing and
execution by the CPU.
What is the difference between RAM and ROM?
RAM (Random Access Memory) is temporary, volatile memory used for running applications,
while ROM (Read-Only Memory) is non-volatile memory that stores essential firmware or BIOS
settings.
What is an instruction cycle in a CPU?
An instruction cycle is the process in which the CPU fetches, decodes, executes, and stores
instructions.
Why is cache memory important?
Cache memory is a small, high-speed memory located close to the CPU, storing frequently used
data and instructions to improve processing speed.

Page 24 of 59
Office
What is Microsoft Word?
Microsoft Word is a word processing application used to create, edit, format, and print text
documents.
What is the purpose of the Ribbon in MS Word?
The Ribbon is a toolbar at the top of MS Word that contains tabs and commands for formatting,
inserting, and editing documents.
How can you insert a table in Word?
Go to the Insert tab → Click Table → Choose the number of rows and columns.
What is the function of the ‘Find and Replace’ feature?
It allows users to quickly locate specific words or phrases and replace them with new text.
How do you insert a header or footer in Word?
Go to the Insert tab → Click Header or Footer → Choose a style and enter text.
What is the difference between ‘Save’ and ‘Save As’?
Save updates the existing document, while Save As allows saving the document with a new
name or format.
How do you add page numbers to a document?
Go to the Insert tab → Click Page Number → Choose a position and style.
What is a template in MS Word?
A template is a pre-designed document layout that users can customize to create new documents
quickly.
How do you change the page orientation in Word?
Go to the Layout tab → Click Orientation → Select Portrait or Landscape.
What are the different types of breaks in MS Word?
Page Break (moves text to a new page), Section Break (divides the document into sections with
different formatting), and Column Break (moves text to the next column).
What is Microsoft Excel used for?
Microsoft Excel is a spreadsheet program used for data organization, calculations, graphing, and
financial analysis.
What is a cell in Excel?
A cell is the intersection of a row and a column in a worksheet, where data is entered.
Page 25 of 59
What is the difference between a workbook and a worksheet?
A workbook is an Excel file containing multiple worksheets (individual spreadsheets).
How do you apply a formula in Excel?
Click on a cell → Type = followed by the formula (e.g., =SUM(A1:A5)) → Press Enter.
What is the AutoSum function used for?
AutoSum automatically calculates the sum of selected numbers using the SUM function.
How do you freeze rows and columns in Excel?
Go to the View tab → Click Freeze Panes → Choose Freeze Top Row or Freeze First Column.
What is the difference between relative and absolute cell references?
Relative reference (A1) changes when copied, while absolute reference ($A$1) remains fixed.
What is Conditional Formatting?
Conditional Formatting changes the appearance of cells based on specific conditions, such as
highlighting values above a certain number.
How do you create a chart in Excel?
Select data → Go to the Insert tab → Click Chart → Choose a chart type.
What is the purpose of PivotTables in Excel?
PivotTables summarize large amounts of data, allowing users to analyze and organize
information efficiently.

Page 26 of 59
Windows
What is Windows 10?
Windows 10 is an operating system developed by Microsoft, designed for PCs, laptops, tablets,
and other devices.
What is the purpose of the Start Menu in Windows 10?
The Start Menu provides quick access to installed applications, settings, and frequently used
files.
What are the different editions of Windows 10?
Windows 10 Home, Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education.
What is Cortana in Windows 10?
Cortana is Microsoft’s built-in virtual assistant that helps users with voice commands, reminders,
and searches.
How do you check system specifications in Windows 10?
Right-click This PC → Click Properties → View system details like processor, RAM, and
Windows version.
What is File Explorer in Windows 10?
File Explorer is the built-in tool for managing files, folders, and drives on a computer.
How do you create a new folder in Windows 10?
Right-click on the desktop or inside a folder → Click New → Select Folder → Enter a name.
What is the purpose of the Recycle Bin?
The Recycle Bin temporarily stores deleted files, allowing users to restore them if needed.
How do you empty the Recycle Bin?
Right-click the Recycle Bin icon → Click Empty Recycle Bin → Confirm deletion.
How do you adjust display settings in Windows 10?
Right-click on the desktop → Click Display settings → Adjust resolution, brightness, and other
display preferences.
What is the purpose of Task Manager?
Task Manager monitors running applications, processes, system performance, and allows users
to close unresponsive programs.
How do you open Task Manager?
Press Ctrl + Shift + Esc or Ctrl + Alt + Delete and select Task Manager.
Page 27 of 59
What is the Action Center in Windows 10?
The Action Center is a notification panel that provides quick access to system alerts and settings
like Wi-Fi, Bluetooth, and Focus Assist.
How do you take a screenshot in Windows 10?
Press PrtScn (Print Screen) to capture the whole screen or Win + Shift + S to select a portion of
the screen.
What is the purpose of Virtual Desktops in Windows 10?
Virtual Desktops allow users to create multiple workspaces to organize different tasks separately.
What is Windows Defender?
Windows Defender is the built-in antivirus and security system that protects against malware,
viruses, and cyber threats.
How do you update Windows 10?
Go to Settings → Update & Security → Windows Update → Click Check for updates.
What is BitLocker in Windows 10?
BitLocker is an encryption tool that secures files and data on a drive from unauthorized access.
How do you reset Windows 10 to factory settings?
Go to Settings → Update & Security → Recovery → Reset this PC → Choose Keep my files or
Remove everything.
What is Safe Mode in Windows 10?
Safe Mode is a diagnostic startup mode that helps troubleshoot system issues by loading only
essential drivers and services.

Page 28 of 59
Java Questions

What is the difference between JDK, JRE, and JVM?


Explain the OOP principles: Inheritance, Polymorphism, Encapsulation, and Abstraction.
What is the purpose of the final keyword in Java?
How does garbage collection work in Java?
What are access modifiers in Java? Explain each with examples.
Explain the concept of constructors in Java. How are they different from methods?
What is the difference between ArrayList and LinkedList in Java?
How is exception handling implemented in Java? Provide examples using try, catch, finally, and
throw.
What are the differences between HashMap and TreeMap?
Explain the concept of Java streams. How are they used for processing collections?
What are lambda expressions in Java? Provide an example.
What is the difference between String, StringBuilder, and StringBuffer?
What is a singleton class, and how is it implemented in Java?
What is the difference between Thread class and Runnable interface?
What is the difference between Comparable and Comparator interfaces?
Programming (15 Questions)
Write a program to find the sum of digits of a number.
Write a program to print the multiplication table of a number.
Write a program to count the number of vowels and consonants in a string.
Write a program to find the second-largest number in an array.
Write a program to check if two strings are anagrams of each other.
Write a program to implement a simple calculator using a switch statement.
Write a program to check whether a given year is a leap year.
Write a program to calculate the sum of an array using streams.
Write a program to merge two sorted arrays into one sorted array.
Write a program to reverse a linked list.

Page 29 of 59
Write a program to check if a number is Armstrong or not.
Write a program to implement a stack using an array.
Write a program to create and traverse a binary search tree.
Write a program to demonstrate method overloading and overriding.
Write a program to implement a priority queue in Java.

C++ Questions
Conceptual (15 Questions)
What are the basic differences between C++ and C?
Explain the concept of classes and objects in C++.
What is the purpose of a virtual function in C++?
What is the difference between public, private, and protected access specifiers?
What are templates in C++? How are they used for generic programming?
Explain the concept of operator overloading with an example.
What is a friend function in C++? Provide an example.
Explain the difference between shallow copy and deep copy in C++.
What is the purpose of the this pointer in C++?
Explain the concept of namespaces in C++. Why are they used?
What is the role of the new and delete operators in dynamic memory allocation?
What is polymorphism in C++? How is it implemented?
What are inline functions, and when should they be used?
What is the difference between stack memory and heap memory?
Explain the concept of multiple inheritance and its issues in C++.

Programming (15 Questions)

Write a program to find the GCD and LCM of two numbers.


Write a program to count the frequency of elements in an array.
Write a program to reverse a number using loops.
Page 30 of 59
Write a program to implement a queue using an array.
Write a program to find the transpose of a matrix.
Write a program to perform binary search on an array.
Write a program to check if a number is a palindrome.
Write a program to calculate the sum of diagonal elements of a matrix.
Write a program to implement the bubble sort algorithm.
Write a program to find the factorial of a number using recursion.
Write a program to implement a doubly linked list.
Write a program to solve the Tower of Hanoi problem.
Write a program to find the largest element in a matrix.
Write a program to implement a simple calculator using functions.
Write a program to merge two linked lists into one sorted list.

Database Questions

Conceptual (20 Questions)


What is a database schema?
Explain the ACID properties of a database.
What is the difference between clustered and non-clustered indexes?
What is a stored procedure? How is it different from a function?
What is the purpose of a database trigger?
What are the advantages of using a database over flat files?
What is a view in SQL? How is it created?
What is the difference between GROUP BY and ORDER BY?
What are aggregate functions in SQL? Provide examples.
Explain the concept of foreign key constraints.
What are the differences between relational and non-relational databases?
What is the difference between HAVING and WHERE clauses?
What is indexing, and how does it improve query performance?
Page 31 of 59
Explain the difference between OLTP and OLAP.
What is a composite key in a database?
What are subqueries, and how are they used in SQL?
What are transactions in databases, and how are they managed?
Explain the concept of database sharding.
What are materialized views, and how are they different from regular views?
What is the difference between horizontal and vertical scaling in databases?
Practical SQL Queries (10 Questions)
Write a query to find the top 5 highest-paid employees.
Write a query to delete duplicate rows from a table.
Write a query to fetch the second-highest salary in a table.
Write a query to list all employees who joined in the last 6 months.
Write a query to display the total salary for each department.
Write a query to find all employees whose names start with the letter 'A'.
Write a query to update the salary of all employees by 10%.
Write a query to create a table with constraints for primary key and foreign key.
Write a query to count the number of employees in each job role.
Write a query to fetch all orders placed in the last 30 days.

Digital Logic Design (DLD) Questions


Conceptual (20 Questions)
What is the difference between analog and digital signals?
Explain the purpose of Boolean algebra in digital design.
What is a logic gate? Name the basic types and their functions.
Explain the difference between combinational and sequential circuits.
What is the role of a flip-flop in digital circuits?
Explain the working of a 4:1 multiplexer.
What is a half-adder? Derive its truth table.
Page 32 of 59
Explain the concept of a shift register.
What is a ring counter? How does it work?
What is the difference between synchronous and asynchronous circuits?
What is the purpose of a decoder?
Explain the differences between RAM and ROM.
What is a programmable logic device (PLD)?
Explain the purpose of a clock signal in sequential circuits.
What is propagation delay in digital circuits?
Explain how a binary-to-decimal converter works.
What are the advantages of using CMOS technology in digital systems?
What is a tri-state buffer, and where is it used?
Explain the concept of fan-in and fan-out in digital circuits.
What are hazard conditions in digital design?
Practical (10 Questions)
Simplify the Boolean expression
𝐹(𝐴,𝐵,𝐶) = 𝐴′𝐵 + 𝐴𝐵′𝐶 +𝐴𝐵𝐶
Design a 3-bit binary counter using flip-flops.
Implement a full subtractor circuit and derive its truth table.
Design a 4-bit shift register and explain its working.
Design a circuit for a 2-to-4 decoder using basic gates.
Construct a truth table for a 3-input XOR gate.
Simplify the following K-map:
F(A,B,C,D)=∑m(0,1,3,7,9,11,15).
Implement a JK flip-flop using D flip-flops.
Design a 2-bit magnitude comparator circuit.
Draw the circuit diagram of a 4-bit ripple carry adder.

Page 33 of 59
System Administration 2
1. What is Linux Operating System?
Linux is an open-source operating system (OS). An operating system is the software that directly
manages a system's hardware and resources, like CPU, memory, and storage.

2. What do you understand by a shell?


Shell is a command-line interpreter that translates user-entered commands into kernel
understandable language.

3. Name commonly used shells on a typical Linux system.


There are mainly two kinds of Linux shells- C-shell and Bourne shell. Their derivatives are as
follows:
C-shell: TENEX C-Shell, Z-Shell
Bourne shell: Korn Shell, POSIX Shell, Bourne-Again Shell

4. How many kernels and shells are available in the UNIX environment?
There can be multiple shells available, but there is only one kernel in the UNIX environment.

5. What do you understand by GUI scripting?


GUI or Graphical User Interface controls a computer and its applications. GUI scripting mostly
depends on the operating system and supports different applications.

6. What is the Linux filesystem?


The Linux filesystem is the file system used by the Linux kernel. It is a hierarchical file system,
with a root directory at the top, and subdirectories below.

7. What are some of the main features of a Linux filesystem?


Some of the main features of a Linux filesystem include the ability to support multiple users, the
ability to support multiple file types, and the ability to be easily expanded.
8. What is the command to display the network configuration in Linux?
To display the network configuration, open a terminal window and type the following command:

Page 34 of 59
Ifconfig
9. What is a DNS server?
A DNS server is a server that stores DNS records and is responsible for resolving DNS queries.

10. Explain the main difference between Linux and Windows DNS servers?
Windows DNS servers support Active Directory integration, while Linux DNS servers do not.
This means that Windows DNS servers can be used to provide DNS services for an Active
Directory domain, while Linux DNS servers cannot. Additionally, Windows DNS servers
support a wider range of record types than Linux DNS servers.

11. What is DNS?


DNS stand for Domain Name System/Service. It’s used to resolve FQDN (Fully qualified
domain name) to IP address and vice versa such as www.example.com to 184.59.51.27 and vice
versa.
12: How many types of zones in DNS?
There are three types of Zones in DNS:
1. Primary Zone
2. Secondary Zone
3. Stub Zone

13: How many lookups zone in DNS?


There are two lookup zone in DNS:
1. Forward lookup zone
2. Reverse lookup zone

14: What is forward lookup zone?


Forward lookup zone helps to resolve name (www.example.com) to IP address (61.95.235.79). A
record creates in forward lookup zone.

15: What is Reverse lookup zone?

Page 35 of 59
Reverse lookup zone helps to resolve IP Address (104.211.37.48) to name (www.example.com).
PTR record creates in Reverse Lookup Zone.

16: How many records in DNS server?


There are six records in DNS Server:
1. A, AAA Record
2. PTR Record
3. CName/Alias Record
4. SRV Record
5. SOA Record
6. MX Record

17: What is the Name server and how to identify it?


Nameserver is a server on the internet to handle queries regarding the location of a domain
name's various services. They allow using domains instead of IP addresses.
18. What is DHCP?
Dynamic Host Configuration Protocol: assigns IPs to the clients requested dynamically or
automatically
19. What is a Scope?
Range of IP Addresses.
20. What is an IP Lease?
Ans: DHCP server clients an IP to the client for a period of 8 days. This offer is called IP Lease.
21. What is the default duration of a lease?
8 Days.
22. What is IP Reservation?
Resolving a particular dynamic IP for a particularly system.
23. What is exclusion?
Omitting assigning from the range selected IPs.
24. Which command is used for releasing an IP address?
Ipconfig /release is the command used for releasing an IP address.
Page 36 of 59
25. What command is used to renew an IP address?
Ipconfig /renew is the command used for renew an IP address.

26. What do you mean by Apache Web Server?


Apache web server is the HTTP web server that is open source, and it is used for hosting the
website.
27.What is the port of HTTP and https of Apache?
The port of HTTP is 80, and https is 443 in Apache.
28. What is a file server?
A file server is a computer system that stores files and makes them available to users over a
network. A file server can be a dedicated computer system or a computer system that provides
other services, such as a web server or database server.
29. What types of files can be stored on a file server?
A file server can store any type of file, but it is typically used to store files that are frequently
accessed by multiple users on a network. This might include shared documents, images, videos,
or other types of files.
30. How do you access a file on a file server?
In order to access a file on a file server, you will need to use a file transfer protocol (FTP) client.
This will allow you to connect to the server and download the file that you are looking for.
31. What are the main components of a file server?
The main components of a file server are the file system, which is responsible for organizing and
storing the files, and the server software, which is responsible for managing access to the files
and providing other services such as security and backup.
32. What operating systems support file servers?
All major operating systems support file servers. This includes Windows, Linux, and macOS.
33. What are the defaults ports used in Linux ftp server?
Ans: Port 20 – This is the data transfer port. All the all-subsequent data transfers between the
client and server are done using this port.
34 What is the configuration file of vsftpd?
‘/etc/vsftp/vsftpd.conf’
35 How to restart the service of ftp server in Linux?
Service vsftpd restart or /etc/init.d/vsftpd restart

Page 37 of 59
36. How to check the installed software(rpm’s) on red hat Linux?
Answer: rpm -qa package name (or) rpm -qa |grep package name*
37. How to install specific software package using rpm command on red hat Linux?
Answer: rpm –ivh package name
38.What is yum?
Answer: yum is yellow update manager which is a front-end tool for package management.
All the rpm commands activity can be carried out using yum command in automated way.
Yum mechanism will automatically resolve the dependencies unlike rpm commands.
39.How to install packages using yum?
yum install package name
40.How to update the package using yum?
yum update package_ name

Advance Switching
1: what is Multi-Layer Switch?
Multi-layer switches are devices that can perform both switching and routing operations.

2: what is the characteristic of Layer 3 Switch?


1. You have multiple internet ports and no WAN interface.
2. When devices are connected to a subnet, it acts as a switch, and when devices are connected to
different subnets, it acts as a router.
3. It has a simple switching algorithm for routing.
4. works at layers 2 and 3 of the OSI model.
3: what is stacking ability in Multi-Layer Switch?
Some network switches are able to connect to other switches and act together as a unit. This
upgrade is called Stack and it is useful to increase the speed and capacity of the network.
4: what is network design in switching?
Network design means the planning and design of the hardware structure of a network, which is
designed and checked by designers, engineers and IT managers of a network before
implementation.
5. Explain the main difference between layer 3 switch and router?
Layer 3 switches perform better than routers in routing between VLANs. High performance
routers are usually more expensive than layer 3 switches. Layer 3 switches have more ports than
routers.

Page 38 of 59
6: how many types of hierarchical network design?
There are three types of hierarchical network design
Access layer
Distribution layer
Core layer
7: what is core layer in network design?
This layer performs requested operations in large networks. This layer is also called backbone.
8: Explain Modular network design?
Network design based on the Cisco Enterprise Architecture model separates large networks into
functional parts known as modules.
The ability to divide the network into modules allows the network design to be flexible and
makes network adaptation and troubleshooting easy.
9: what is SSH?
SSH is a protocol for secure remote access to a machine over untrusted networks.
Uses Encryption.
SSH is not a shell-like Unix Bourn shell and C shell
10: Explain TELNET?
TELNET allows the user to log on to a remote computer. After logging on, user can use the
services available on the remote computer and transfer the results back to the local computer.
11: what is etherchannel?
The ability to bundle ports together to achieve higher bandwidth is described as link aggregation.
Aggregation ports on Ethernet switches is referenced under EtherChannel configuration and
operation.
12: number of types to configure etherchannel?
Manual (static etherchannel)
PAgP (Port Aggregation protocol)
LACP (Link Aggregation Control Protocol)
13: different between PAgP and LACP?
PAgP: Cisco proprietary
LACP: Open standard

Page 39 of 59
14: what is etherchannel load-balancing
EtherChannel loads shares (load balances) across all the physical ports in the EtherChannel
group.
15: What is STP?
Spanning Tree Protocol (STP) is a switching protocol that prevents layer 2 loops created by the
redundant links. STP enables switches to become well-informed of each other so that they can
negotiate a Loop-Free path through the network.

16: How Spanning Tree Protocol (STP) works?


STP chooses one of the switches in the network as a Root Bridge, which will be used as a
reference point. Then calculates all the redundant paths to that root bridge, picks one path which
is best to forward frames, and blocks other redundant paths.
17: What are the different port states in STP?
Disabled, listening, Learning, forwarding, blocking.
18: What are BPDU messages?
All the switches switch over information to select the root bridge and for configuration of the
network. This is done through the messages called Bridge Protocol Data Unit (BPDU). Each
switch compares the parameters in the BPDU messages that it sends to one neighbor switch with
the one that it receives from another neighbor switch.
19: What is the Bridge ID?
Bridge ID is 8 bytes long. It includes both the priority and the MAC address of the device. In the
STP domain, this bridge ID is used to elect the root bridge.
20: What is Root Port?
After the Root bridge is elected, every other Switch i.e. Non-Root bridge in the STP domain
must select its single port to reach the Root bridge. The port with the lowest Root path cost is
assigned as the root port. It is always in the forwarding state.
Only Non-Root bridges have a Root port and Root bridge will never have a root port.
21. What is VLAN?
A VLAN is a virtual LAN. It is a logical grouping of devices on a network, usually based on
function, department, or location. Devices in the same VLAN can communicate with each other
as if they were on the same physical network.
22. How does a VLAN work?
VLANs are created by adding switches to a network and then assigning each switch to a different
VLAN. This allows for each VLAN to be isolated from the others, which can help improve
security and performance.
23. What’s the purpose of port-based VLANs?
Page 40 of 59
Port-based VLANs are used to segment a network into different logical sub-networks. This
allows for better security and organization of the network, as well as easier management
23. what is trunking?
Trunking is a method for consolidating multiple network links into a single link. This is often
done to increase bandwidth or to provide redundancy. Trunking can be used with any type of
network link, but is most commonly seen with Ethernet links.

24. What is the maximum number of VLANs allowed per switch?


The maximum number of VLANs allowed per switch is 4096.
25. What is native VLAN?
A native VLAN is a VLAN that is configured on a switch port without any extra configuration.
All untagged traffic that comes in on a port will be automatically placed into the native VLAN
for that port.
26. What is the default priority level used by STP when assigning root bridges?
The default priority level used by STP when assigning root bridges is 0.
27. What is double tagging?
Double tagging is the process of adding a second tag to a packet as it moves between different
VLANs. This allows the packet to be identified as belonging to a specific VLAN, even as it
travels through a network that contains multiple VLANs. Double tagging can be used to improve
security and to help ensure that packets are routed correctly.
28. Why would you use a router on a stick for inter-VLAN routing?
With a router on a stick, you only need a single router and a single physical connection to the
network in order to route traffic between multiple VLANs.
29. What’s the purpose of port-based VLANs?
Port-based VLANs are used to segment a network into different logical sub-networks. This
allows for better security and organization of the network, as well as easier management.
29. What’s the best way to create a new VLAN on a Cisco switch?
The best way to create a new VLAN on a Cisco switch is to use the “VLAN” command. This
will create a new VLAN with the specified ID.
30. What is Inter-VLAN Routing?
A VLAN is a broadcast domain and computers connected to different VLANs will not be able to
communicate without a routing device.
Devices such as routers and layer 3 will perform this operation.
Page 41 of 59
Regardless of the device, the practice of routing traffic from one VLAN to another is called
Inter-VLAN Routing.
31.Types of Inter-VLAN Routing?
Traditional Inter-VLAN Routing.
Router-on-a-Stick Inter-VLAN Routing.
Switch -based Inter-VLAN Routing

32.What is Traditional Inter-VLAN Routing?


This approach requires routers with multiple physical interfaces to route between VLANs.
Each interface must be connected to a separate subnet.
33.What is Router-on-a-Stick Inter-VLAN Routing?
Router-on-a-stick is a type of modular router, where a single physical interface performs the
routing alone between multiple VLANs on the network.
34.Explain Redundancy in Network?
The more important is the connection between the network and networks. A router in the
network acts as a network gateway for external communication, and if it fails, it becomes
impossible to connect the network to other networks.
35.What is HSRP?
HSRP Stand for Host Standby Router Protocol.
With HSRP, two or more devices support a virtual router with a MAC address and unique IP
address.
36. Can you explain the difference between Layer 2 and Layer 3 VLANs?
Layer 2 VLANs are created by adding switch ports to a VLAN. This type of VLAN is used when
devices need to communicate with each other on the same network. Layer 3 VLANs are created
by adding router ports to a VLAN. This type of VLAN is used when devices need to
communicate with each other on different networks.

Page 42 of 59
Linux
1. what is Linux?
Linux is a Unix-like, free open-source operating system, developed by Linus Torvalds. Mainly it
is designed for systems, servers, embedded devices, mobile devices, and mainframes.

2. Explain the basic features of the Linux OS.


Open source, Free of cost, no need of antivirus, more secure, support any vendor hardware, Fast
communication, Easy troubleshooting, Linux systems are extremely stable, Linux can even run-
on oldest hardware.
3. Name some Linux Distros
There are various Linux distros but the following are the most commonly used:
Ubuntu
Debian
CentOS
Fedora
RedHat

4. What are the major differences between Linux and Windows?


Both offer some of the graphics capabilities and include some networking capabilities. But Linux
networking is excellent.
Linux is multi-user, but Microsoft Windows doesn’t support it.

5. Define the basic components of Linux.


Majorly there are five basic components of Linux:
Kernel
Shell
GUI
Application Program
System utilities

Page 43 of 59
6. Elaborate all the file permission in Linux.
There are three types of file permissions in Linux:
Read: Users open and read files with this permission.
Write: Users can open and modify the files.
Execute: Users can run the file.

7. What is the Linux Kernel? Is it legal to edit it?


It is known as a low-level software system. The Linux kernel tracks the resources and provides a
user interface. This OS is released under GPL (General Public License). Hence every project is
released under it. So, you can edit the Linux kernel legally.

8. Explain LILO
LILO, i.e., Linux Loader and is a Linux Boot loader. It loads the Linux operating system into
memory and starts the execution. Most operating systems like Windows and macOS come with a
bootloader.

9. What is a root account?


The root is like the user’s name or system administrator account in Linux. The root account
provides complete system control, which an ordinary user cannot do.

10. Describe CLI and GUI in Linux.


CLI, i.e., command line interface. It takes input as a command and runs the tasks of the system.
The term GUI refers to the Graphical User Interface or the human-computer interface. It uses
icons, images, menus, and windows, which can be manipulated through the mouse.

11. What is Swap Space?


Linux uses swap space to expand RAM. Linux uses this extra space to hold concurrently running
programs temporarily.

12. How do you list files in a directory using the Linux command line?

Page 44 of 59
You can list files in a directory on the Linux command line by using the ls command. This
command will show all the files and directories within the specified location.

13. What’s the command to create a new directory in Linux?


A new directory in Linux can be created using the mkdir command,
#mkdir directory-name
14. How do you change the permissions of a file in Linux?
You can change a file’s permissions in Linux using the chmod command.

15. What command could you use to display the contents of a text file in the Linux terminal?
The contents of a text file in the Linux terminal can be displayed by using the cat command
followed by the file name. For example, cat file.txt will show the content of “file.txt”.

16. How could you search for a specific string within a file using the Linux command line?
You can search for a specific string within a file using the grep command in the Linux command
line.

17. How do you display the current working directory in Linux?


To display the current working directory in Linux, you can use the "pwd" command.

18. What is the command to copy a file in Linux?


To copy a file in Linux, you can use the "cp" command. For example,
cp myfile.txt myfolder/

19. How do you move a file to a different directory in Linux?


To move a file to a different directory in Linux, you can use the "mv" command.
mv myfile.txt myfolder/

20. What is the command to remove a file in Linux?


To remove a file in Linux, you can use the "rm" command. For example,
Page 45 of 59
rm myfile.txt

Network Fundamental

1: What is a network?
A network is a collection of two or more devices connected by communication channels that
allow them to share data and resources.
2: What is a switch?
A switch is a network device that connects multiple devices or networks together. It provides the
ability to share data or resources between them.
3: What is a router?
A router is a networking device that forwards data packets between computer networks. Routers
are used to connect networks of different sizes, such as local area networks (LANs) and wide
area networks (WANs).
4: What is a gateway?
A gateway is a network node that connects two networks using different communication
protocols. It acts as a bridge between two networks and enables data and information to be
exchanged between them.
5: What is a firewall?
A firewall is a security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules.
6: What is a subnet?
A subnet is a logical subdivision of an IP network. It is typically used to divide an IP network
into two or smaller networks.
7: What is a broadcast domain?
A broadcast domain is a logical division of a computer network in which all nodes can reach
each other by broadcast at the data link layer.
8: What is a collision domain?
A collision domain is a network segment in which data packets can collide with each other when
they are sent on a shared network segment.
9: What is a LAN?

Page 46 of 59
A LAN (Local Area Network) is a network of computers and other devices that are connected to
each other and share resources within a relatively small area, such as a home, office, school, or
building.
10: What is a WAN?
A WAN (Wide Area Network) is a type of computer network that covers large geographic areas
such as countries, states, or provinces.
11: What is an IP address?
An IP address (Internet Protocol address) is a numerical label assigned to each device connected
to a computer network that uses the Internet Protocol for communication.
12: What is a subnet mask?
A subnet mask is a number that separates the host portion of an IP address from the network
portion.
13: What is a default gateway?
A default gateway is a device on a network that acts as an access point or gateway for other
devices in the network to communicate with the wider Internet.
14: What is a port?
A port is a communication endpoint used in networks for sending and receiving data. It is a
logical construct that acts as a portal for allowing communication to and from a computer.
15: What is a packet?

A packet is a unit of data sent over a network. It contains a header that includes source and
destination addresses and other data, such as sequencing information and error-checking data.
16: What is a protocol?
A protocol is a set of rules and conventions that govern the communication between two or more
devices on a network, such as computers, routers, and servers.
17: What is a topology?

Physical structure of a network is called topology. As a general rule, it is a way of describing the
connectivity of a network, including the physical and logical connections between the nodes of
the network.
18: What is a hub?
Technically, a hub is a networking device that allows multiple devices to connect to a single
network.
19: What is a NIC?

Page 47 of 59
The term NIC stands for Network Interface Card, which is technically a computer hardware
component that allows a computer to connect to a network.
20: What is a MAC address?
A MAC (Media Access Control) address is a unique identifier assigned to a network interface
controller (NIC) for communications on the physical network segment.

System Administration (Windows Server)

1. What is Windows Server?


windows Server is a brand name for a group of server operating systems released by Microsoft.
2. What is the purpose of having AD?
Answer: Active directory is a directory service that identifies all resources on a network and
makes that information available to users and services. The Main purpose of AD is to control and
authenticate network resources.
3. Explain about sysvol folder?
Answer: The sysvol folder stores the server’s copy of the domain’s public files. The contents
such as group policy, users, and groups of the sysvol folder are replicated to all domain
controllers in the domain. The sysvol folder must be located on an NTFS volume.
4.Differentiate between NTFS & FAT.
Answer: NTFS is the current file system used by Windows. It offers features like security
permissions, quotas and many other features that help Windows.
FAT32 is the older Microsoft filesystem, FAT32 offers maximum FILE (not folder) size of 4GB,
which is kind of small these days, especially in regards to HD video.
5. Explain Functions of Active Directory?
Answer: AD enables centralization in a domain environment. The Main purpose of AD is to
control and authenticate network resources.
6. What is MBR?
Short form Master Boot Record, a small program that is executed when a computer boots up.
Typically, the MBR resides on the first sector of the hard disk.
7. What is DHCP?
DHCP Stands for Dynamic host configuration protocol. DHCP is a protocol used for automatic
configuration IP address in client computers connected to IP networks.
8. What is DHCP Scope?

Page 48 of 59
A range of IP address that the DHCP server can assign to clients that are on one subnet.
9. What is a DHCP lease?
Answer: A DHCP lease is the amount of time that the DHCP server grants to the DHCP client
permission to use a particular IP address. A typical server allows its administrator to set the lease
time.
10. What is DORA Process in DHCP Server?
DORA Stand for Discover, Offer, request and acknowledgement. it is used to assign IP address
automatically to client systems.
11. What is Authorizing DHCP Servers in Active Directory?
If a DHCP server is to operate within an Active Directory domain (and is not running on a
domain controller) it must first be authorized to Active directory.
12. Define DNS.
Domain Name System, DNS is an Internet service that translates domain names into IP
addresses. Two types of lookups in DNS. Forward lookup: it converts Domain name to IP
address. Reverse lookup: it converts IP address to Domain name.
13. What is the port Number of DNS?
Use UDP protocol and port number – 53.
14. What is NSlookup?
Answer: Nslookup.exe is a command-line administrative tool for testing and troubleshooting
DNS servers.
15. What Is Group Policy.
Group Policy is a feature of the Microsoft Windows NT family of operating systems that control
the working environment of user accounts and computer accounts. Group Policy provides the
centralized management and configuration of operating systems, applications, and users’ settings
in an Active Directory environment.
16. Where are group policies stored?
C:\Windows\System32\GroupPolicy.
17. Where is the Active Directory stored?
The AD data base is stored in c:\windows\ntds\NTDS.DIT.
18. What is a web server?
A web server is a computer system that hosts websites. When a user tries to access a website,
their computer will contact the web server and request the files that make up the website. The

Page 49 of 59
‫‪web server will then send these files to the user’s computer, which will allow them to view the‬‬
‫‪website.‬‬
‫?‪19. What is a file server‬‬
‫‪A file server is a computer system that stores files and makes them available to users over a‬‬
‫‪network. A file server can be a dedicated computer system or a computer system that provides‬‬
‫‪other services, such as a web server or database server.‬‬
‫?‪20. What is FTP server‬‬
‫‪FTP, or File Transfer Protocol, is a standard network protocol used for the transfer of computer‬‬
‫‪files between a client and server on a computer network. It is commonly used to upload and‬‬
‫‪download files from web servers, such as HTML pages and‬‬

‫اسالمي ثقافت‬
‫‪ :۱‬سوال ‪ :‬داسالم ټولنیز نظام تعریف کړئ؟‬
‫ځواب ‪ :‬داسالم په رڼا کې ټولنیز نظام دهغې شرعي اصولو مجموعه ده چې اسالم دیوی ټولنې د ټولنیز ژوند لپاره وضع‬
‫کړي اوپر اساس یی د دوی ترمنځ اړیکې ټینګوي‪.‬‬
‫‪ ۲‬سوال ‪ :‬داسالم دټولنیز نظام ځانګړتیاوې ولیکئ؟‬
‫ځواب ‪۱:‬داسالم ټولنیز نظام دهللا ج له لورې رالیږل شوی نظام دی‪ ۲.‬داسالم ټولنیز نظام دیو رب بنده ګی ته انسان رابولي‪.‬‬
‫‪ ۳‬داسالم ټولنیز نظام د ټولو افرادو ترمنځ مساوات په نظر کې نیسي‪.‬‬
‫‪.٤‬داسالم ټولنیز نظام د یوبل مرستی ته انسان رابولي‪.‬‬
‫‪۳‬سوال ‪ :‬تقوا څه ته ویل کیږی ؟‬
‫ځواب ‪ :‬تقوادی ته ویل کیږی چې یو بنده دهللا تعالی د قهر او غذاب څخه د ځان ساتنی په خاطر د هغه د حکم له مخالفت‬
‫څخه ځان ساتي او اوامرو ته یی غاړه ګدي ‪.‬‬
‫‪۴‬سوال ‪ :‬داسالم ټولنیز نظام بنسټونه ولیکئ؟‬
‫ځواب ‪ .۱ :‬اسالمي عقیده ‪ .۲‬تقواء ‪ .۳‬ټولنیز عدالت ‪.‬‬
‫‪ ۵‬سوال ‪ :‬داسالم ټولنیز نظام اهداف ولیکئ ؟‬
‫ځواب ‪ ۱ :‬سکون او ډاډ نه ډک چاپیریال رامنځته کوي ‪ ۲ .‬دافرادو ترمنځ د مینې او محبت نه ډکه فضاء رامنځته کوي ‪۳ .‬‬
‫دافرادو ترمنځ د رحمت خپرول ‪ ۴ .‬د حق اقامه کول ‪ ۵ .‬دافرادو ترمنځ د ټولنیز تکافل رامنځته کول ‪.‬‬
‫‪ ۶‬سوال ‪ :‬مسلمانه ټولنه تعریف کړئ ؟‬
‫ځواب ‪ :‬مسلمانه ټولنه هغه خدای پرسته انسانی با اخالقه او متوازینه ټولنه ده چې افراد یی د اسالمی عقیدی‪ ،‬دینی ورور‬
‫ګلوی‪ ،‬مینی محبت‪ ،‬عدل او رحمت په رڼا کې ژوند تیروي ‪.‬‬
‫‪ ۷‬سوال ‪ :‬دمسلمانی ټولنې مواصفات ولیکئ ؟‬
‫ځواب ‪ ۱ :‬د ژوند په ټولو برخو کې دینی احکامو ته التزام ‪ ۲‬امر بالمعروف او نهی عن المنکر دنده ترسره کول ‪ ۳ .‬په‬
‫کریمو اخالقو التزام ‪ ۴ .‬له غیر مسلمو سره غوره چلند ‪ ۵.‬د امن ساتنه ‪.‬‬
‫‪ ۸‬سوال ‪ :‬د الندی ایات شریف ژباړه ولیکئ؟‬
‫ٱَّلل َال یُغ َِی ُر َما ِبقَوۡم َحتَّى یُغ َِی ُروا َما ِبأَنفُ ِس ِهمۡۡ‪۱۱ ..........‬‬
‫ِإ َّن َّ َ‬
‫ځواب ‪ :‬ژباړه حقیت دادی چې هللا ج د هیڅ قوم حالت نه بدلوی ترڅو پوری چې هغوی خپل صفات نه وی بدل کړی ‪.‬‬

‫‪ ۹‬سوال ‪ :‬نکاح تعریف کړی ؟‬


‫ځواب ‪ :‬نکاح د نارینه او ښځی ترمنځ هغه ابدي تړون دی چې له دواړو ترمنځ ګډ ژوند راوګرځوي او د دواړو خواوو‬
‫حقوق یو پربل الزموي‪.‬‬
‫‪ ۱۰‬سوال ‪:‬دنکاح لپاره د میرمن دانتخاب غوره صفات ولیکئ ؟‬

‫‪Page 50 of 59‬‬
‫ځواب ‪ ۱ :‬دینداري ‪ ۲‬د نسب غوره والی ‪ ۳‬ښکال او د میړه طاعت ‪ ۴‬اوالد راوړل ‪ ۵‬پیغلتوب ‪.‬‬
‫‪ :۱۱‬سوال ‪ :‬خطبه تعریف کړی ؟‬
‫ځواب ‪ :‬خطبه د خ په زیر سره د یوی میرمنې یا دهغې کورنی ته دنکاح وړاندیز ته وویل کیږي چې شرعي موانع ونه لری‪.‬‬
‫‪ ۱۲‬سوال ‪ :‬محرمات په څو ډوله دي نومونه یي ولیکئ ؟‬
‫ځواب ‪ :‬محرمات په دوه ډوله دي ‪ ۱‬دایمي محرمات ‪ ۲‬موقتي محرمات ‪.‬‬
‫‪ ۱۳‬سوال ‪ :‬دالندی ایات ژباړه ولیکئ ‪:‬‬
‫ت‬ ‫ُ‬ ‫َ‬ ‫ُ‬ ‫ُ‬ ‫َ‬ ‫ُ‬ ‫ُ‬
‫ع َّمتكمۡ َو َخلتكمۡ َوبَنَاتُ ٱلۡأخِ َوبَنَاتُ ٱلۡأخۡ ِ‬ ‫علَيۡ ُكمۡ أ ُ َّم َهت ُ ُكمۡ َوبَنَاتكمۡ َوأخ ََوتكمۡ َو َ‬
‫ُ‬ ‫ُ‬ ‫َ‬ ‫ُ‬ ‫ُ‬ ‫‪ُ ……. ۲۳‬ح ِر َمتۡ َ‬
‫ځواب ‪ :‬ژباړه پر تاسو حرام کړی شوی دی ستاسی میندی ‪،‬لوړنی ‪،‬خویندی ‪،‬تریندی‪،‬توړی ګاني ‪،‬وریری او خورزی‪.‬‬
‫‪ ۱۴‬سوال ‪ :‬له فروعو څخه څوک هدف دی ؟‬
‫ځواب ‪:‬له فروعو څخه هدف لور ‪،‬لمسئ ‪،‬کړوسئ اوداسی نور دی‪....‬‬
‫‪ ۱۵‬سوال ‪ :‬مصاحرت څه ته ویل کیږی ؟‬
‫ځواب ‪ :‬دنکاح په سبب رامنتځه شوی خپلوالۍ ته مصاحرت ویل کیږي ‪.‬‬
‫‪ ۱۶‬سوال ‪ :‬دحنفي فقهاوو په نزد د نکاح ارکان کوم دی ویي لیکئ ؟‬
‫ځواب ‪ :‬دحنفي فقهاوو په نزد د نکاح ارکان دوه دی‪ ۱ :‬ایجاب ‪ ۲‬قبول ‪.‬‬
‫‪ ۱۷‬سوال ‪ :‬دنکاح شرایط په څو ډوله ویشل کیږي؟‬
‫ځواب ‪ :‬دنکاح شرایط په څلورو ډولو ویشل کیږی ‪.‬‬
‫‪ ۱۸‬سوال ‪ :‬په میرمین د میړه حقوق کوم دی ویي لیکئ ؟‬
‫ځواب ‪ ۱ :‬شریعت په چوکات کې د میړه احترام او اطاعت کول لکه رسول هللا ص فرمایلی دی هر هغه میرمن چې مړه شی‬
‫او میړه ورڅخه حوښ او حوشحاله وی جنت ته به داخلیږی ‪.‬‬
‫‪ ۱۹‬سوال ‪ :‬دتولد څخه مخکی د اوالد حقوق ولیکئ ؟‬
‫ځواب ‪۱ :‬دیو ښه مور انتخاب ‪ ۲‬په ازدواجی ژوند کې د سنتو اتباع او صالح اوالد غوښتنه ‪ ۳‬د جنین له سقط څخه ځان ساتل‬
‫‪۲۰.‬سوال ‪ :‬په موقت ډول د کومو میرمنو سره نکاح حرامه ده ؟‬
‫ځواب ‪۱ :‬دوه محرمی ښځی په یوځای نکاح کول ‪ ۲‬د عدت په حالت کې د خپلی طالقی کړی ښځي خور په نکاح کول ‪۳‬‬
‫میړوښی ښځی په نکاح کول ‪ ۴ .‬د معتدی ښځې نکاح ‪ ۵‬په درې طالقو طالقه شوی ښځه ‪.‬‬
‫‪ ۲۱‬سوال ‪ :‬طالق تعریف کړی ؟‬
‫ځواب ‪ :‬طالق په لغت کې خوشې کول ته ویل کیږي اوپه فقهي اصطالح کې سمدستی یا په راتلونکي وخت کې دنکاح د قید‬
‫له منځه وړلو ته طالق ویل کیږي ‪.‬‬
‫‪ ۲۲‬سوال ‪ :‬د طالق د مخنیوي الرې چارې ولیکئ ؟‬
‫ځواب ‪ ۱ :‬توصیه ‪ ۲‬دبسترې بیلتون ‪ ۳‬د تادیب لپاره وهل ‪ ۴‬تحکیم ‪ ۵‬دیو رجعي طالق واقع کیدل ‪.‬‬
‫‪ ۲۳‬سوال ‪ :‬په اعتبار د اغیز صریحي او کنایي طالق په څو ډوله دی ؟‬
‫ځواب ‪ :‬په دوه ډوله دی‪ ۱ :‬رجعي طالق ‪ ۲‬بایین طالق ‪.‬‬
‫‪ :۲۴‬سوال ‪ :‬ایالء تعریف کړئ ؟‬
‫ځواب ‪ :‬ایالء هغه قسم ته ویل کیږی چې یوسړی یی د څلورو میاشتو یا زیات وخت لپاره خپلی ښځې ته د نه ورنږدې کیدو‬
‫په خاطر یاد کړي‪.‬‬
‫‪ ۲۵‬سوال ‪:‬دقسم کفاره څه شی ده ویی لیکئ؟‬
‫ځواب ‪ :‬د قسم کفاره په لمړی قدم کې د غالم ازدول دي او که توان یی نه وي بیا لسو مسکینانو ته دوه وخته ډوډی ورکول‬
‫دي که دایي هم په توان کې نه وی بیا درې ورځې روژی نیول دی ‪.‬‬
‫‪ ۲۶‬سوال ‪ :‬خلع تعریف کړئ؟‬
‫ځواب ‪ :‬خلع د احنافو په نیزد د نکاح د ملکیت له منځه وړل دي چې د ښځې تراجازی موقوف وي ‪.‬‬
‫‪ ۲۷‬سوال ‪ :‬لعان تعریف کړی ؟‬
‫ځواب‪ :‬لعان شړلو ته ویل کیږی اوپه اصطالح کې د قسم سره مل څلور ځل ګواهي ده چې میړه او میرمن یی د قاضی په‬
‫وړاندې ترسره کوي په هغه وخت کې چې میړه خپله ښځه په زنا تورنه او یایي له نسب څخه انکار وکړي ‪.‬‬
‫‪ ۲۸‬سوال ‪ :‬دکومو عیبونو په ثابتیدلو سره ښځه کولی شي له میړه څخه دبیلتون غوښتنه وکړي؟‬
‫ځواب ‪ ۱ :‬د تناسلي الې نشتوالی ‪ ۲‬د جنسي قوت نشتوالی ‪ ۳‬لیونتوب ‪ ۴‬جذام ‪ ۵‬ابرص یا برګی مرض ‪.‬‬
‫‪Page 51 of 59‬‬
‫‪۲۹‬سوال‪ :‬دظهار شرطونه ولیکئ؟‬
‫ځواب ‪ :‬د ظهار شرطونه دوه دي‪ ۱ :‬ظهار کوونکې باید بالغ ‪،‬عاقل او مسلمان وي ‪ ۲‬ښځه باید په حقیقي یا حکمي توګه د‬
‫سړي په نکاح کې وی ‪.‬‬
‫‪ ۳۰‬سوال ‪ :‬ګاونډیان په څوډولونو ویشل شوی دي ؟‬
‫ځواب ‪ :‬ګاونډیان په درې ډولونو ویشل شوي دي ‪ ۱‬یو حق لرونکی ‪ ۲‬دوه حقه لرونکی ‪ ۳‬دری حقه لرونکی ‪.‬‬
‫‪ ۳۱‬سوال ‪ :‬د ټولنیز مسؤلیت عناصر ولیکئ ؟‬
‫ځواب ‪ :‬د ټولنیز مسؤلیت عناصر درې دی ‪ ۱‬پر ټولنیزو چاروکې اهتمام اود بیوزلو الس نیوی ‪ ۲‬پوهه ‪ ۳‬مشارکت ‪.‬‬
‫‪ ۳۲‬سوال ‪ :‬د ګډ ژوند (معاشرات ) اداب ولیکئ ؟‬
‫ځواب ‪ ۱ :‬ښه اخالق ‪ ۲‬بښنه کول ‪ ۳‬له اختالف کولو څخه ځان ساتل ‪ ۴‬حسد نه کول ‪ ۵‬دیوبل په غم او خوښی کې ځان‬
‫شریک ګڼل ‪.‬‬
‫‪ ۳۳‬سوال ‪ :‬د خوراک او څښاک اداب ولیکئ ؟‬
‫ځواب ‪ :‬له خوراک څخه د مخه السونه مینځل ‪ ۲‬په بسم هللا د خوراک او څښاک پیل کول ‪ ۳‬له خپلې مخې څخه خوراک کول‬
‫‪ ۴‬په ښي الس خوراک کول ‪ ۵‬د خوراک په وخت درې ګوتې استعمالول ‪.‬‬
‫‪ ۳۴‬سوال ‪ :‬مفقود څه شي ته ویل کیږي او حکم یی ولیکئ؟‬
‫ځواب ‪ :‬هغه سړی چې له کور څخه تری تم ورک شی‪ ،‬د مړي او ژوندي معلومات یی نه کیږي د مفقود په نوم یادیږي‪ ،‬نو‬
‫تر څو چې د مفقود سړي مړی یقیني نه وي ښځه تری نشی جال کیدای‪.‬‬
‫‪ ۳۵‬سوال ‪ :‬دلعان حکم ولیکې ؟‬
‫ځواب ‪ :‬په لعان سره بیلتون ابدي حرمت منځته رواړي ‪.‬‬
‫‪ ۳۶‬سوال ‪ :‬د اوالد په بشارت د خوشحالی کولو لپاره یو قرآني ایات ولیکئ ؟‬
‫ظ َّل َوجۡهُهۥُ ُمسۡ َو ّٗدا َوه َُو َكظِ یم ‪٥۸‬‬ ‫ځواب ‪َ :‬و ِإذَا بُش َِر أ َ َحدُهُم بِٱلۡأُنثَى َ‬
‫سا ٓ َء َما یَحۡ ُك ُمونَ ‪٥۹‬‬ ‫بۡ أَ َال َ‬ ‫علَى هُون أَمۡ یَدُ ُّ‬
‫سهۥُ فِي ٱلتُّ َرا ِ‬ ‫س ٓوءِ َما بُش َِر بِ ِهۦۡٓ ۡ أَیُمۡ ِس ُكهۥُ َ‬‫یَت ََو َرى مِ نَ ٱلۡقَوۡ ِم مِ ن ُ‬
‫‪ ۳۷‬سوال ‪ :‬دمور او پالر حقوق ولیکئ ؟‬
‫ځواب ‪ ۱ :‬د مور او پالر احترام او خدمت کول ‪ ۲‬د هغوی له خوښی پرته په سفر نه تلل ‪ ۳‬په عاجزی او نرمی ورسره‬
‫خبرې کول ‪ ۴‬د مور او پالر څخه مخکې په الره نه تلل ‪ ۵‬مور او پالر په نامه نه رابلل ‪.‬‬
‫‪ ۳۸‬سوال ‪ :‬د مور او پالر د حقوقو په باره کې یو قرآني ایات ولیکئ ؟‬
‫سنًاۡ ِإ َّما َیبۡلُغ ََّن عِندَكَ ٱلۡ ِك َب َر أَ َحدُهُ َما ٓ أَوۡ ك َِالهُ َما فَ َال تَقُل‬ ‫ال ِإیَّاهُ َو ِبٱلۡ َو ِلدَيۡ ِن ِإحۡ َ‬ ‫ضى َربُّكَ أ َ َّال تَعۡبُد ُٓوا ِإ َّ ٓ‬
‫ځواب ‪َ ۞ :‬وقَ َ‬
‫لَّ ُه َما ٓ أُف َو َال ت َنۡهَرۡهُ َما َوقُل ل ُه َما قَوۡ ّٗال ك َِر ّٗیما ‪۲۳‬‬
‫َّ‬
‫‪ ۳۹‬سوال ‪ :‬دایمي محرمات تعریف کړئ ؟‬
‫ځواب ‪ :‬دایمي محرامات هغه ښځې دي چې د حرام والي سبب یی دایمي او ترمرګه زوال نلري‪.‬‬
‫‪ ۴۰‬سوال ‪ :‬نسبي محرمات په څو ډوله دي ویی لیکئ ؟‬
‫ځواب ‪ :‬نسبي محرمات په څلور ډوله دي ‪ ۱‬اوصول‪ ۲ .‬فروع‪ ۳ .‬د والدینو فروع‪ ۴ .‬د نیکونو او نیاګانو فروع‪.‬‬

‫‪Online Skills‬‬

‫?‪1. What is the WWW‬‬


‫‪The WWW stands for the World Wide Web. It is a system of interconnected documents‬‬
‫‪and resources that can be accessed over the internet. When you use a web browser, like‬‬
‫‪Chrome or Firefox, to visit websites, you are using the WWW.‬‬

‫?‪2. What is a website‬‬


‫‪A website is a collection of web pages that are connected and accessible through the‬‬
‫‪internet. It contains information, images, videos, and other types of content. Websites are‬‬

‫‪Page 52 of 59‬‬
created for different purposes, such as sharing information, selling products, or providing
services.

3. What is a web browser, and name some popular web browsers?


A web browser is a computer program that allows you to access and view websites on the
internet. It translates the code of web pages into a format that you can see and interact
with. Some popular web browsers are Google Chrome, Mozilla Firefox, Microsoft Edge,
and Safari.

4. What are the differences between the web and the internet?
The internet is a global network of computers that are connected to each other. It allows
people to share information and communicate with each other. On the other hand, the
web is a part of the internet that consists of websites and web pages. The web uses
specific protocols and technologies to access and display information over the internet.

5. How does a web browser work?


When you type a website address or click on a link in a web browser, it sends a request to
a web server that hosts the website. The server then sends back the requested web page,
which the browser displays on your screen. The browser interprets the code of the web
page, including HTML, CSS, and JavaScript, to show you text, images, videos, and
interactive elements.

6. Write the usages of the internet.


The internet has many uses and benefits. Here are some common usages:

a) Communication: You can send emails, chat with friends, make video calls, and
connect with people around the world through social media platforms.
b) Information and research: You can search for information on any topic, read news
articles, access online libraries, and find educational resources.
c) Entertainment: You can watch videos, listen to music, play online games, and
stream movies and TV shows.
d) Online shopping: You can buy products and services from websites, compare
prices, and have items delivered to your doorstep.
e) Online banking and finance: You can manage your bank accounts, pay bills,
transfer money, and invest in stocks and cryptocurrencies.
f) Education and e-learning: You can take online courses, participate in virtual
classrooms, and access educational materials.
g) Social networking: You can connect with friends, share updates and photos, join
online communities, and express yourself through platforms like Facebook,
Instagram, and Twitter.
7. What is a hyperlink?
A hyperlink, often called a link, is a clickable element on a web page that connects to
another web page or a different section of the same page. It is usually displayed as text or
an image with an underline or a different color. When you click on a hyperlink, it takes
Page 53 of 59
you to the linked web page or location, allowing you to navigate between different
websites and web pages.

8. What is private browsing?


Private browsing, also known as incognito mode or privacy mode, is a feature available
in some web browsers. When you use private browsing, the browser does not store your
browsing history, cookies, or other information locally on your computer. It helps
maintain privacy by not leaving traces of your online activities on the device you're
using.

9. What is a search engine?


A search engine is a tool or website that allows you to search for information on the
internet. It has a vast index of web pages and uses algorithms to match your search
queries with relevant results. Popular search engines include Google, Bing, Yahoo, and
DuckDuckGo. You can enter keywords or phrases into the search engine, and it will
provide a list of web pages related to your search.

10. What is email, and write its advantages and disadvantages?


Email, short for electronic mail, is a way of sending and receiving messages
electronically over the internet. It allows you to exchange text, files, and multimedia
content with others who have an email address. Here are some advantages and
disadvantages of email:
Advantages:
a) Fast and efficient communication: Emails can be sent and received quickly,
enabling near-instantaneous communication with people around the world.
b) Convenience: You can access and manage your emails from various devices like
computers, smartphones, and tablets.
c) Cost-effective: Sending emails is usually free, making it a cost-effective way of
communication compared to traditional mail or phone calls.
d) Attachments: You can easily send and receive files, documents, photos, and
videos as email attachments.
e) Organization: Emails can be organized into folders, making it easier to manage
and search for specific messages.
f) Professional communication: Email is widely used for business and professional
communication, allowing formal and structured interactions.
Disadvantages:

a) Spam and junk mail: Emails can be susceptible to spam, unsolicited messages,
and phishing attempts, which can clutter your inbox and pose security risks.
b) Lack of personal touch: Email lacks the personal touch of face-to-face or voice
communication, making it sometimes difficult to convey emotions or tone
accurately.
Page 54 of 59
c) Overload: With the ease of sending emails, it's possible to receive a large volume
of messages, leading to information overload and difficulty in managing and
responding to all of them.
d) Security risks: Emails can be intercepted or hacked, potentially exposing sensitive
information or leading to identity theft if proper security measures are not taken.
e) Dependence on the internet: Email requires an internet connection to send and
receive messages, so if you don't have internet access, you won't be able to use
email.

Computer Fundamentals
1. Define computer.
A computer is an electronic device that accepts input, process it and gives output and can
store output for future.
2. Write a brief history of the computer.
Computers have a long history that started in the mid-20th century. The first electronic
computers were large and used vacuum tubes for processing. Over time, computers became
smaller, faster, and more powerful. The invention of transistors and integrated circuits played
a crucial role in this advancement. In the 1970s and 1980s, personal computers became
popular, leading to the development of user-friendly interfaces and software. The following
decades witnessed the rise of laptops, smartphones, and other portable devices, bringing
computing power to individuals worldwide.

3. How many generations of computers are there? Explain them.


There are generally five generations of computers:
First Generation (1940s-1950s): These computers used vacuum tubes for processing and were
large and expensive.
Second Generation (1950s-1960s): Transistors replaced vacuum tubes, making computers
smaller, more reliable, and faster.
Third Generation (1960s-1970s): Integrated circuits were introduced, further reducing the size
and cost of computers.
Fourth Generation (1970s-1990s): Microprocessors made computers even smaller, more
powerful, and affordable. Personal computers became widely available.
Fifth Generation (1990s-present): Advances in microprocessor technology and the development
of the internet led to faster and more interconnected computers. Artificial intelligence and
robotics also became prominent fields.

Page 55 of 59
4. Write the usages of a computer.
Computers have various usages, including:
a. Processing and analyzing data.
b. Creating documents, presentations, and spreadsheets.
c. Internet browsing and communication.
d. Gaming and entertainment.
e. Graphic design and multimedia production.
f. Scientific research.
g. Programming and software development.
h. Business and financial management.
i. Education and e-learning.

5. What is the structure of a computer, and explain each part?


A computer is made of three parts including, hardware, software and firmware.
a. Hardware: Physical parts of computers that can seen and touched are called
hardware.
b. Software: Logical parts of computer that tells computer what to do and how to do
are called software.
c. Firmware: Part of computer that has both software and hardware forms are called
firmware. (BIOS)

6. How many types of hardware are there in a computer? Explain them.


There are four main types of hardware in a computer:
Input Devices: These devices allow users to input data or commands into the computer, such as
keyboards, mice, and scanners.
Output Devices: They display or present information to the user, such as monitors, printers, and
speakers.
Processing Devices: These devices perform calculations and execute instructions. They include
the CPU,
Storage Devices: Those devices which stores data in computer called storage devices like, RAM,
ROM, USB, hard drives and solid-state drives.
7. What is a keyboard, and provide a short description of its keys?
A keyboard is an input device that allows users to enter text, numbers, and commands into a
computer. It has various keys, including:
a. Alphanumeric Keys: These keys represent letters, numbers, and special
characters.
b. Function Keys: They provide shortcuts for specific functions in software.
c. Modifier Keys: These keys modify the function of other keys when pressed
together, like Shift, Ctrl, and Alt.

Page 56 of 59
d. Navigation Keys: They allow users to move the cursor or navigate within
documents, such as arrow keys and the Enter key.
8. What is a mouse?
A mouse is an input device that is used to move a cursor on the computer screen. It typically
has two buttons and a scroll wheel. By moving the mouse, users can control the cursor's
position and perform actions like selecting, dragging, and clicking on items.
9. What are output devices?
Output devices are components that display or present information to the user. Some examples
include:
a. Monitor or Display: It shows visual output like text, images, and videos.
b. Printer: It produces hard copies of documents and images.
c. Speakers or Headphones: They provide audio output, allowing users to hear
sounds and music.
10. What is a processor?
A processor, also known as a central processing unit (CPU), is the main component
responsible for executing instructions and performing calculations in a computer. It
carries out tasks such as data processing, mathematical operations, and controlling the
flow of information within the computer.

11. Define storage devices.


Storage devices are components used to store data and programs in a computer. They provide
long-term storage even when the power is turned off. Examples of storage devices include hard
disk drives (HDDs), solid-state drives (SSDs), and optical drives (CD/DVD).

12. What are the different types of storage devices?


There are different types of storage devices, including:
Hard Disk Drives (HDDs): They use magnetic storage to store data on spinning disks.
Solid-State Drives (SSDs): They store data on flash memory chips, providing faster access and
improved durability compared to HDDs.
Optical Drives: These devices use lasers to read and write data on optical discs like CDs, DVDs,
and Blu-ray discs.
USB Flash Drives: Portable storage devices that use flash memory to store data.

13. List the units of storage devices.


Storage devices are measured in various units:
Bit (b): The smallest unit of storage, representing a single binary digit (0 or 1).
Byte (B): A unit of storage that consists of 8 bits. It can represent a single character or a small
amount of data.
Page 57 of 59
Kilobyte (KB): Approximately 1,000 bytes.
Megabyte (MB): Approximately 1 million bytes or 1,000 kilobytes.
Gigabyte (GB): Approximately 1 billion bytes or 1,000 megabytes.
Terabyte (TB): Approximately 1 trillion bytes or 1,000 gigabytes.
Petabyte (PB): Approximately 1 quadrillion bytes or 1,000 terabytes.

14. What are the differences between ROM and RAM?


ROM (Read-Only Memory) and RAM (Random Access Memory) are two types of computer
memory with key differences:
ROM: It contains permanent data that cannot be changed or erased by normal computer
operations. It stores firmware and instructions essential for booting up the computer.
RAM: It is volatile memory that allows fast read and write operations. It is used to
temporarily store data and instructions that the CPU needs to access quickly. RAM loses
its data when the computer is powered off.

15. What is a motherboard?


The motherboard is the primary circuit board in a computer. It provides the electrical
connections and pathways for communication between various components, including the
CPU, memory, storage devices, and input/output devices. It houses important components
like the chipset, expansion slots, and connectors for peripherals.

16. What are buses, and name some of their types?


Buses in a computer are pathways that transfer data and signals between different components.
Some types of buses include:
System Bus: It connects the CPU to the memory and other major components.
Peripheral Bus: It connects peripheral devices like printers and scanners to the computer.
Expansion Bus: It allows expansion cards, such as graphics cards and network cards, to be
connected to the motherboard.

17. What is a port, and name some important ports in a computer?


A port in a computer is a physical or virtual interface that allows communication between the
computer and external devices. Some important ports include:
USB (Universal Serial Bus) Port: It is used for connecting various peripherals like keyboards, mice,
printers, and external storage devices.

Page 58 of 59
HDMI (High-Definition Multimedia Interface) Port: It transmits high-quality audio and video
signals between the computer and external displays.
Ethernet Port: It enables a wired connection to a network or the internet.
Audio Jack: It allows the connection of headphones, speakers, and microphones.
18. Define software and name its types.
Software refers to the programs and instructions that tell a computer what to do. There are two main
types of software:
System Software: It manages and controls the computer's hardware and provides a platform for
running other software. Examples include operating systems like Windows and macOS, device
drivers, and utility programs.
Application Software: These are programs designed for specific tasks or applications, such as word
processors, web browsers, games, and multimedia editing software.

19. What is system software, and explain some examples of it?


System software is responsible for managing the computer's resources and providing a platform for
running other software. Some examples include:
Operating Systems: They control and coordinate computer hardware and software, enabling users to
interact with the computer. Examples include Windows, macOS, and Linux.
Device Drivers: These software components allow the operating system to communicate with and
control hardware devices like printers, scanners, and graphics cards.
Utility Programs: They perform various maintenance and optimization tasks, such as antivirus
software, disk cleanup tools, and backup software.
20. What are application software, and explain some examples of them?
Application software consists of programs designed for specific tasks or applications. Some
examples include:
Word Processors: Programs like Microsoft Word and Google Docs for creating and editing
documents.
Web Browsers: Software such as Google Chrome, Mozilla Firefox, and Microsoft Edge for
browsing the internet.
Media Players: Programs like VLC Media Player and Windows Media Player for playing audio
and video files.
Graphic Design Software: Applications like Adobe Photoshop and CorelDRAW for creating and
editing images and illustrations.
Games: Software designed for entertainment purposes, offering various genres and gameplay
experiences.

Page 59 of 59

You might also like