PC Hardware
1- What are the components of a Computer?
Ans- The components of a computer are Processor, RAM, Motherboard, SMPS, Hard Disk and Input Output Devices.
2- What are the input devices? Tell me any 3.
Ans- The devices through which processor receive the instructions are called input devices. Mouse, Keyboard and scanner are basic input devices.
3- What are the output devices? Tell me any 3.
Ans- The devices on which the processor sends the output are called output devices. Monitor, Printer and Speaker are basic output devices.
1- What is a processor?
Ans- A processor is the main component of the computer which accepts the instructions from the input devices, process on that instruction and sends the output to the output devices.
2- Which is the latest processors of Intel?
Ans- core i9 (Released-Quarter-3 2017) is the latest processor of Intel.
3- Which is the latest processors of AMD?
Ans- AMD Ryzen is the latest processor of AMD.
4- How many physical cores are there in Intel core i-3, i-5, i-7 and i9.
Ans- i3- 2 Physical Cores, i5- 2 or 4 Physical Cores, i7- 4 Physical Cores and i9 has 10-18 physical Cores
5- What is cache memory?
Ans- Cache memory is a small and fast memory which is placed between Processor and RAM. Cache memory stores the instruction from the RAM so that processor does not have to traverse RAM to get the instruction.
6- What are EDB, EIST, Turbo Boost, Hyper-Threading, Smart Cache and virtualization?
EDB- Execute Disable Bit is an Intel Hardware based security feature that help to secure computer from viruses and malicious.
EIST- Enhanced Intel Speed Step Technology allows the system to dynamically adjust processor voltage and frequency according to requirement.
Turbo Boost- It is new feature of Intel latest processors which automatically allows processor cores to run faster than the base operating frequency.
Hyper Threading- Hyper threading enables a single processor to work as logically 2 processor. It was launched with Pentium-4 Processor.
Smart Cache- Smart Cache allows each core of processor to dynamically utilize up to 100% of available cache memory.
Virtualization- It is a technology used to run multiple virtual machines on a single physical machine.
7- What are FSB, DMI and QPI?
FSB- Front Side Bus connects Microprocessor to RAM through North Bridge.
DMI- Direct Memory Interface is a feature of computer systems that allows certain hardware subsystems to access main system memory (RAM) independently of the central processing unit (CPU).
QPI- Quick Path Interconnect (QPI) is a point-to-point processor interconnects developed by Intel which replaced the front-side bus (FSB).
1- What is the Difference between Volatile and Non-Volatile Memory?
Ans- Volatile memory is temporarily storage and can store data until it is receiving power whereas Non Volatile stores data permanently even after turning off the power.
2- What is SRAM?
Ans- Static Random Access Memory is a volatile memory that retains data bits in its memory and does not have to periodically refreshed. Cache memory is the example of SRAM.
3- What is DRAM?
Ans- Dynamic Random Access Memory is a volatile memory that stores data bits in cells and have to periodically refreshed. System Memory is the example of DRAM.
4- RAM Comparison
RAM
|
Total Pins
|
Frequency Range
|
Operating Voltage
|
DDR-1
|
184
|
266-400 MHz
|
2.5 Volt
|
DDR-2
|
240
|
533-800 MHz
|
1.8 Volt
|
DDR-3
|
240
|
1066-1866 MHz
|
1.5 Volt
|
DDR-4
|
288
|
2133-4266 MHz
|
1.2 Volt
|
5- What is ROM?
Ans- Read Only Memory (ROM) is Non Volatile memory which stores data permanently. The Data in ROM can only be read but cannot be modified.
6- What are the types of ROM?
Ans- The type of ROM are PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read Only Memory) and EEPROM (Electrically Erasable Programmable Read Only Memory).
1- What is the Motherboard?
Ans- Motherboard is the most important components of the computer which connects all the components together and passes the required voltage to all the devices.
3- What are North Bridge, South Bridge, ICH and Super I/O Chip? North Bridge- Northbridge controls the interaction of processor with the System Memory (RAM).
South Bridge- South Bridge controls the interaction of processor with Input/output Controllers and Expansion slot such as PCI and AGP slots.
ICH- Input/output Controller Hub is an Intel microchip which is use to connect and control peripheral devices.
Super I/O Chip- Super I/O chip is a single chip which controls slower I/O devices which are not controlled by South Bridge.
• Define Following
a) PCI- Peripheral Component Interconnect is a 32-bit wide bus which is used to attaching expansion card on the motherboard such as LAN Card, Sound Card and Internal Modem.
b) AGP- Accelerated Graphics Port is dedicated to attach graphics card on the motherboard.
• What is Jumper
Ans- Jumpers are the small pins used to configure motherboard and other devices like Hard Disk Drive and CD/DVD.
• What is SMPS?
Ans- Switch Mode Power Supply provides the regulated DC voltage to all the component of a computer.
• What are the Output Voltages of power supply?
Ans- The output voltage of power supply are +12V, -12V, +5V, -5V and 3.3V.
• What are the power supply control Signals?
Ans- Following are the control signal of power supply
a) PG Signal (Gray +5V) - it indicates to motherboard that all the supplies voltage (+12V, -12V, +5V, -5V, 3.3V) are at proper level.
b) PS_ON Signal (Green +5V) - It is used to power on and power off the SMPS unit.
c) Standby Signal (Violet +5V) - It keeps the power supply in standby mode if input AC is active even the system is turned off.
Complete the following
Wire Color
|
Voltage
|
Use For
|
Blue
|
-12V
|
Provides power to serial
ports.
|
Yellow
|
+12V
|
Provides power to the motors.
|
Red
|
+5V
|
Provides power to Logic cards
and SIMM slots.
|
Orange
|
3.3V
|
Provides power to processor,
Expansion slots and DIMM slots.
|
White
|
-5V
|
Provides power to floppy
controllers and ISA slots.
|
Black
|
0V
|
It is used for grounding.
|
• How to check power supply?
Ans- If the SMPS fan is working fine after shorting the PS_ON signal (Green) with any Ground (Black), initially the SMPS is working fine.
• What are Molex and Mini-Molex power connectors?
Ans- Molex power connector provides power to the Hard Disk Drive and Optical Disk Drive whereas Mini-Molex is used to provide power to floppy drive.
• What is Hard Disk?
Ans- A hard disk is the primary permanent storage device which hosts the operating system as well as data.
• What are the different types of HDD?
Ans- The different types of hard disk drives are IDE/ATA, SATA, SCSI and USB.
Complete the following
HDD Type
|
Transfer Rate
|
Pins
|
ATA-6
|
100 MB/Sec
|
40/80
|
ATA-7
|
133 MB/Sec
|
80 Pins
|
SATA 1.5
|
150 MB/Sec
|
7
|
SATA 3.0
|
300 MB/Sec
|
7
|
SATA 6.0
|
600 MB/Sec
|
7
|
USB 2.0
|
60 MB/Sec
|
4
|
USB 3.0
|
625 MB/Sec
|
4
|
• How to configure jumper setting of hard Disk?
• What is RPM? What are different RPM in HDD?
Ans- Revolution Per Minute defines that how many times the platter of the drive completes 3600 turn in one minute. Faster RPM means better read write performance of the drive. Different RPM of the hard drives are 5400, 5900, 7200 and 10000.
• What are different types of CD Drives?
Ans- The different types of CD drives are CD-ROM Drive, CD-R Drive and CD-RW Drive.
• What is Combo Drive?
Ans- Combo drive can read and write CD Disk but can only read DVD Disk.
• How to configure jumper setting of the CD and DVD?
• What is capacity of Blu-Ray Disk?
Ans- Single layer Blu-Ray disk can store up to 25 GB and dual layer can store 50 GB.
• How to write CD and DVD through Nero?
Ans- Practical……………………….
• How to create ISO image through Power ISO?
Ans- Practical……………………….
• What are the deferent types of Monitors?
Ans- The different types of monitor are CRT, TFT, LCD, LED and plasma.
• What is Pixel?
Ans- Pixels are the tiny dots (.) on the screen. The more number of pixels means the more clarity.
Complete the following
Standard
|
Resolution
|
VGA
|
640*480
|
SVGA
|
800*600
|
XGA
|
1024*768
|
WXGA
|
1280*800
|
UXGA
|
1600*1200
|
• What is the use of Input/output ports in a computer?
Ans- Input/output ports are use to connect peripherals devices to a computer.
Complete the following
Port
|
Pins
|
Serial
|
9
|
Parallel
|
25
|
USB
|
4
|
PS/2
|
6
|
VGA
|
15
|
DVI
|
24
|
HDMI
|
19
|
Ans- Interrupt Request are the line numbers provided to I/O ports and device controllers through which processor understands from which port the input is received and to which port the output to be send.
• What is Printer?
Ans- Printer is an output device which converts soft copy into hard copy.
• What are the types of Printer?
Ans- There are 2 types of printers
a) Impact Printer: - These are the printers where a physical contact is established between the paper and the print head. Dot Matrix printer is a type of Impact Printer.
b) Non-Impact Printer: - These are the printers where a physical contact is not established between paper and print head. Inkjet and LaserJet are the type of Non-Impact printer.
• How many pins are there in the head of Dot-Matrix Printer?
Ans- There are 9 to 24 pins in the head of dot matrix printer.
• How to Install a Local Printer?
Ans- Practical………………………….
• How to share a Printer?
Ans- Practical………………………….
• How to install Network Printer?
Ans- Practical………………………….
• How to access shared printer?
Ans- Practical………………………….
• What is scanner?
Ans- Scanner is an input device which converts a hard copy into soft copy.
• What are the types of Scanner?
Ans- The type of scanner are Flatbed Scanner, Sheet Fed Scanner, Slide Scanner and Drum Scanner.
• How to scan documents with a scanner?
Ans- Practical………………………….
• What is BIOS?
Ans- Basic Input Output System is a program or firmware which is loaded in CMOS chip located on the motherboard. It performs the basic maintenance of the system by checking all the hardware connected to the system and loads the operating system.
• What is POST?
Ans- POST (Power On Self Test) is a 14 series test performed by BIOS to test the hardware components of the computer.
• How to set boot priority in BIOS?
Ans- Practical……………………………………
• How to upgrade BIOS firmware?
Ans- Practical……………………………………
• How to reset BIOS settings?
Ans- BIOS settings can be reset by removing CMOS battery and RTC jumper from the motherboard.
• What is the voltage of CMOS battery?
Ans- The Voltage of CMOS battery is 3V (DC).
Hardware Troubleshooting Questions
1-No power
2-No Display
3-Continue beep sounds
4-BSOD (Blue Screen of Death)
5-No Audio
6-Over Heating
7-CMOS checksum error
8-BIOS reset after restarting PC
9-Select Proper boot media
10-Hardware not detected
11-Frequent Restart
What is the full form of………………………………..
FSB
|
BSB
|
DMI
|
QPI
|
IOH
|
ICH
|
PDA
|
CPU
|
AMD
|
HT
|
EDB
|
EIST
|
PGA
|
LGA
|
ZIF
|
LIF
|
CMOS
|
BIOS
|
POST
|
RAM
|
DRAM
|
SRAM
|
SDRAM
|
RDRAM
|
DDR
|
ROM
|
PROM
|
EPROM
|
EEPROM
|
CD
|
DVD
|
PCB
|
AGP
|
PCI
|
SIMM
|
DIMM
|
RIMM
|
PCISIG
|
AMR
|
VRM
|
IDE
|
ATA
|
SATA
|
USB
|
VGA
|
SVGA
|
XGA
|
LED
|
LCD
|
TFT
|
CNR
|
AMR
|
AT
|
ATX
|
SMPS
|
PSU
|
RPM
|
PATA
|
ATAPI
|
ANSI
|
UDMA
|
SCSI
|
ODD
|
CRT
|
DVI
|
HDMI
|
UART
|
SPP
|
EPP
|
ECP
|
IEEE
|
IRQ
|
MIDI
|
DDWP
|
SSD
|
SODIMM
|
LPT
|
DMP
|
ADC
|
ALU
|
ESD
|
SMART
|
PCMCIA
|
VT
|
Operating System
1- What is Operating System? Ans- An operating system (OS) is system software that manages computer hardware and software, it acts as an intermediate between user and hardware.
2- What is Client Operating System? Tell me the name of Client OS?
Ans- An operating system which can be use as individual or can uses the services provided by servers is called client operating system. Windows-98, Windows 2000 professional, Windows-XP, Windows-Vista, Windows-7, Windows-8, Windows-8.1 and Windows-10 are the client operating systems of Microsoft.
3- What is Server Operating System? Tell me the name of Server OS?
Ans- An operating system which can provide network services is known as Server operating system. Windows-NT, Windows 2000 Advanced Server, Windows Server 2003, Windows server 2008 and windows server 2012 are the server operating system of Microsoft.
Complete The Following
OS
|
Minimum Hardware
Requirement
|
Editions
|
Booting Files
|
Windows XP
|
Processor-233MHz, RAM-64
MB,
HDD-1.5 GB
|
*Starter
*Home
*Professional
|
NTLDR, Boot.ini,
Bootsect.doc,
NTDETECT.com, NTOSKRNL.exe
Win.com, hall.dll
|
Windows Vista
|
Processor-800MHz, RAM-512
MB,
HDD-15 GB
|
*Home Basic
*Home Premium
*Vista Business
*Vista Enterprise
*Vista Ultimate
|
Bootmgr, Winload.exe,
NTOSKRNL.exe, Win.com, hall.dll
|
Windows-7
|
Processor-1 GHz, RAM-1 GB,
HDD-16 GB
|
*Basic
*Home Premium
*Professional
*Enterprise
*Ultimate
|
Bootmgr, Winload.exe,
NTOSKRNL.exe, Win.com, hall.dll
|
Windows-8
|
Processor-1 GHz, RAM-1 GB,
HDD-16 GB
|
Win-8
Win-8 Pro
Win 8 Enterprise
|
Bootmgr, Winload.exe,
NTOSKRNL.exe, Win.com, hall.dll
|
Windows-8.1
|
Processor-1 GHz, RAM-1 GB,
HDD-16 GB
|
Win-8
Win-8 Pro
Win 8 Enterprise
|
Bootmgr, Winload.exe,
NTOSKRNL.exe, Win.com, hall.dll
|
Windows-10
|
Processor-1 GHz, RAM-1 GB,
HDD-16 GB
|
Win-10 Home
Win-10 Pro
Win-10 Enterprise
Win-10 Education
|
Bootmgr, Winload.exe, NTOSKRNL.exe,
Win.com, hall.dll
|
4- What are the features of Windows-8.1 and Windows-10?
Windows-8.1
➢ Charms Bar
➢ Multi Desktop
➢ Apps (People, Weather, Alarm, Scientific Calculator)
➢ Internet Explorer 11
➢ Advanced Search box
Windows-10
➢ Snap Assist
➢ 21st Century Command Prompt
➢ Cortana
➢ Project Spartan
➢ Xbox
5- How to activate Windows-10 through command prompt?
Ans- Refer the link:
https://grok.lsu.edu/article.aspx?articleid=17869
6- How to install Windows O/S using
➢ DVD
➢ USB
➢ VHD
➢ Network
7- What is the difference between clean installation and up gradation?
Ans- A clean install is a software installation in which any previous version is eradicated. The alternative to a clean install is an upgrade, in which elements of a previous version remain.
8- What is Dual Boot or Multi boot?
Ans- Multi-booting is the act of installing multiple operating systems on a computer, and being able to choose which one to boot. The term dual-booting refers to the common configuration of specifically two operating systems.
9- What is migration?
Ans- Migration is the process of moving from the use of one operating environment to another operating environment.
10- What are Disk clean up and Disk Defragment and how to perform?
Ans- Disk Cleanup- It is a computer maintenance utility to free up disk space on a computer's hard drive. The utility first searches and analyzes the hard drive for files that are no longer of any use, and then removes the unnecessary files. Disk Defragment- Disk Defragment is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations.
11- What is Virtual Hard Disk (VHD)?
Ans- Virtual Hard Disk (VHD) is a disk image file format for storing the complete contents of a hard drive.
12- How to attach a VHD in Windows-10?
Ans- Refer the link: https://www.groovypost.com/howto/attach-copy-files-vhd-windows-10/
13- How to hide and unhide a Folder?
Ans- Refer the link:
https://www.windowscentral.com/how-hide-files-and-folders-windows-10
14- What is Compression and Encryption? How to encrypt and compress a Folder in Windows-10?
Ans- Compression is the process of reducing the size of a file by encoding its data information more efficiently. Encryption- Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it.
Refer the link: https://windowsreport.com/encrypt-files-folders-windows-10/
15- What is the use of Winrar utility? Ans- Winrar is a file archiver and compressor utility for Windows. It can create archives in RAR or ZIP file formats, and unpack numerous archive file formats.
16- What are different types of NTFS Permissions and how to apply?
Ans- Followings are the NTFS permissions
·
Full Control - can create items; see, open, read, write, delete the
item; modify access rights and attributes and take ownership of the item.
Selecting the box enables all other options.
•
Modify - can create items; see, open, read, write and delete
the item; view access rights and modify attributes. Activating the option
enables all check boxes below it.
•
Read &
Execute - can see, open/launch and
read the item. Selecting the option enables the List folder contents and
Read items.
•
List folder
contents - applies to folders only,
same rights as Read & Execute, but applies to sub-folders only (not
to files in these).
•
Read - can see, open and view permissions and attributes of
the item. The most basic right.
•
Write - can create items; see, open, read, write,
synchronize and delete the item. Viewing permissions and attributes is also
allowed.
•
Special
permissions - customized rights that
fall out of scope of basic rights.
17- How to share a folder? What are the share permissions?
Ans- Refer the link:
https://kodi.wiki/view/SMB/Windows
Followings are the Share permissions
• Full Control
• Change
• Read
18- What is UNC Path?
Ans- Universal Naming Convention (UNC) is a standard for accessing servers, printers and other share resources on a network. A UNC path uses double slashes or backslashes to precede the name of the computer.
19- How to change the space of recycle bin in Windows-10?
Ans- Refer the link:
https://www.tenforums.com/tutorials/32948-change-maximum-storage-size-recycle-bin-windows-10-a.html
20- What is quota? How to apply quota on a drive?
Ans- Quota is use to specify storage limit on a drive for the users.
Refer the link:
https://www.isunshare.com/windows-10/enable-quota-management-for-hard-disk-in-windows-10.html
21- What is a User account? What is Built-In user account? Ans- A user account is a collection of information that tells Operating System which files and folders you can access, what changes you can make to the computer. Built-In User: - Built-in user accounts are the user accounts which are created automatically while installing operating System. Important built-in user accounts are Administrator and Guest.
22- How to create a User account in Windows-10?
Ans- Refer the link:
https://www.lifewire.com/how-to-create-and-delete-user-accounts-in-windows-10-4096672
23- How to change the password of a user in Windows-10?
Ans- Refer the link:
https://www.laptopmag.com/articles/change-password-windows-10
24- What is a group? How to create a group and add a user in group?
Ans- A group is container of computer objects such as users, group, computers; printers etc any permission applied to the group will be applicable to all group members.
Refer the link:
https://www.isunshare.com/windows-10/5-ways-to-open-local-users-and-groups-in-windows-10.html
25- What is Applocker? How to prevent game for a user through Applocker?
Ans- Applocker is a new feature in Windows Operating Systems that allows you to specify which users or groups can run particular applications in the computer. If you use Applocker, you can create rules to allow or deny applications from running.
26- What is UAC?
Ans- User Account Control (UAC) is a feature in Windows that can help prevent unauthorized changes to your computer. UAC does this by asking you for permission or an administrator password before performing actions that could potentially affect your computer's operation or that change settings that affect other users.
27- What are Password and Account lockout policies? Password Policies- A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly.
Following are the password policies
➢ Enforce Password History
➢ Maximum Password Age
➢ Minimum Password Age
➢ Minimum Password Length
➢ Password must meet complexity requirements
➢ Store password using reversible encryption Account Lockout Policies: - Account Lockout Policy determines what happens when a user enters a wrong password. It ensures that an attacker can’t use a brute force attack or dictionary attack to guess and crack the user’s password. Following are the password policies
➢ Account Lockout Duration
➢ Account Lockout threshold
➢ Reset Account Lockout counter after
28- What is Password reset disk? How to create password Disk?
Ans- The Password Reset Disk is essentially a small file that can be used to reset your password, even if you have changed your password since creating the reset disk. Refer the link: https://www.windowscentral.com/how-create-and-use-password-reset-disk-windows-10
29- What is Device Manager? How to enable and disable device through device manager?
Ans- The Device Manager is a Control Panel in Microsoft Windows operating systems. It allows users to view and control the hardware attached to the computer. Ans- Refer the link https://community.shaw.ca/docs/DOC-1037
30- How to install, update and roll back driver?
Ans- Refer the link: https://answers.microsoft.com/en-us/windows/forum/windows_10-hardware-winpc/how-to-install-and-update-hardware-drivers-in/a97bbbd1-9973-4d66-9a5b-291300006293
31- What is unsigned driver? How to search unsigned driver in your computer?
Ans- An unsigned driver is one that has NOT been tested, approved, or have an electronic signature placed on it by Microsoft; these types of driver may harm operating system. Refer the link: http://www.thewindowsclub.com/identify-unsigned-drivers-sigverif-windows
32- What is Disk management? How to create, delete, shrink and extend a partition? Ans- Disk Management is a Microsoft Windows utility first introduced in Windows XP as a replacement for the fdisk command. It enables users to view and manage the disk drives installed in their computer and the partitions associated with those drives. Refer the link:
https://www.digitaltrends.com/computing/how-to-partition-a-hard-drive-in-windows/
33- How to mount a partition with a NTFS folder and to change the drive letter of a partition?
Refer the link:
https://www.windowscentral.com/how-mount-hard-drive-folder-windows-10
34- What is Basic and Dynamic Disk? How to convert basic disk into Dynamic Disk?
Ans- Basic Disk-A basic disk uses primary partitions, extended partitions, and logical drives to organize data. Basic disks can have either four primary partitions or three primaries and one extended partition. The extended partition can contain multiple logical drives (up to 128 logical drives are supported). A basic disk can be easily converted into Dynamic Disk.
Dynamic Disk- Dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes). All volumes on dynamic disks are known as dynamic volumes. Dynamic Disk cannot easily convert into basic Disk.
Refer the link:
http://www.thewindowsclub.com/convert-basic-disk-to-dynamic-disk-windows-8-7
35- How to assign 2 IP address to a computer?
Refer the link:
https://tunecomp.net/windows-10-multiple-ip-addresses/
36- How to change the name of a PC?
Refer the link:
https://www.groovypost.com/howto/rename-windows-10-computer/
37- What is the latest version of Internet Explorer?
Ans- Internet explorer 11 is the latest version.
38- What is internet explorer compatibility view in Internet Explorer?
Ans- Internet explorer compatibility view feature allows websites designed for previous versions of internet explorer to display correctly in internet explorer 8 or later.
39- What are Smart Screen Filter and In Private Mode in Internet Explorer?
Ans- Smart Screen filter is a feature of internet explorer that protects your internet explorer from browsing websites which are illegal, viral fraudulent or malicious. Smart Screen filter blocks the websites related to phishing.
In Private mode is a feature of internet explorer 8 or later that limits the amount of information available about a user’s browsing session to a third party user. In private mode provides two technologies namely In Private browsing mode and In private filtering mode.
40- What is Add-Ons? And how to manage Add-Ons in Internet explorer 11?
Ans- Add-ons extends the functions of the browser. You can manage add-ons through Manage Add-ons option under tools menu in internet explorer.
Refer the link:
https://www.wikihow.com/Add-Addons-in-Internet-Explorer
41- What is Pop-Up Blocker in a browser?
Ans- Pop-up Blocker is a feature in internet Explorer that allows you to block pop-ups from appearing when you browse a web page.
42- How to delete history from internet explorer?
Refer the link:
http://home.bt.com/tech-gadgets/internet/how-to-check-and-delete-your-web-browser-history-in-windows-10s-edge-11363996318373
43- What is Windows updates and how to configure?
Ans- The Windows Update utility is used to keep your Windows-based computer up-to-date with the latest patches. These updates will close security holes in your computer and hopefully prevent you from being hacked or infected with viruses. Windows updates are now replaced with Microsoft Updates in latest Windows OS.
Refer the link: http://www.thewindowsclub.com/windows-update-security-settings-windows-10
44- What is firewall? What are Inbound and Outbound rules?
Ans- Firewalls provide the security by limiting access to your computer and network, a firewall is also useful for allowing remote access to a private network through secure authentication certificates and logins. Inbound rules are use to filter the traffic that comes to your computer/Network and Outbound rules are use to filter the traffic that leaves your Computer/Network.
45- What is offline file sharing? How to map a Network Drive?
Ans- Using offline files, you can access files stored in shared network folders even when the network copies are unavailable. You can do this by choosing the network files you want to make available offline, which automatically creates a copy of the network files on your computer. Refer the link:
https://www.laptopmag.com/articles/map-network-drive-windows-10
46- How to add a Laptop in Wi-Fi network? Refer the link: https://its.uq.edu.au/services-and-guides/internet-and-wifi/connect-uq-wifi/connect-wifi-using-windows-10
47- What is Bit Locker? Which edition of windows-7 supports bit locker?
Ans- BitLocker is a full disk encryption feature included with select editions of Windows Vista and later. It is designed to protect data by providing encryption for entire volumes.
48- What are the different modes of bit locker? Encrypt a drive through bit locker?
Following are the modes of bit locker
➢ TPM only
➢ TPM with Startup key
➢ TPM with PIN
➢ TPM with PIN and startup key
➢ Bit Locker without TPM
Refer the link:
https://www.windowscentral.com/how-use-bitlocker-encryption-windows-10
49- What is bit locker to go?
Ans- Bit Locker To Go allows you to protect data stored on USB storage devices. In windows-7 it is available in Enterprise and Ultimate editions.
50- What are Reliability Monitor and Resource Monitor?
Ans- Reliability Monitor is an advanced tool that measures hardware and software problems and other changes to your computer. It provides a stability index that ranges from 1 (the least stable) to 10 (the most stable). You can use the index to help evaluate the reliability of your computer. Resource Monitor is a tool that you can use to monitor the usage of CPU, hard disk, network, and memory in real time.
51- What is virtual Memory? How to resize Virtual Memory in your Computer?
Ans- Virtual memory is a feature of an operating system (OS) that allows a computer to compensate for shortages of physical memory by temporarily transferring pages of data from RAM to disk storage.
Refer the link: http://www.thewindowsclub.com/increase-page-file-size-virtual-memory-windows
52- What is Remote Desktop and Remote assistance? How to setup Remote desktop in Windows-10?
Ans- Remote desktop is a program or an operating system feature that allows the user to connect to a computer in another location, see that computer's desktop and interact with it. Remote Assistance is a feature of Windows XP and later that allows a user to temporarily view or control a remote Windows computer over a network or the Internet to resolve issues without directly touching the unit. It is based on the Remote Desktop Protocol. Refer the link……………………… https://www.groovypost.com/howto/setup-use-remote-desktop-windows-10/
53- What is the VNC software? Name any 5?
VNC works on a client/server model: A VNC viewer (or client) is installed on the local computer and connects to the server component, which must be installed on the remote computer. The server transmits a duplicate of the remote computer's display screen to the viewer. Team viewer, Show my PC, Ammy Admin, LogMeIn, imPCremote, TightVNC and Aeroadmin are famous VNC software.
54- What is System Restore ? How to create SRP?
Ans- System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state to that of a previous point in time, which can be used to recover from system malfunctions or other problems. Refer the link………………………. https://www.windowscentral.com/how-create-system-restore-point-windows-10-simple-double-click
55- What are advanced Boot options? Explain all?
➢ Repair your Computer- Shows a list of system recovery tools you can use to repair startup problems, run diagnostics, or restore your system.
➢ Safe mode- Starts Windows with a minimal set of drivers and services.
➢ Safe mode with networking- Starts Windows in safe mode and includes the network drivers and services needed to access the Internet or other computers on your network.
➢ Safe mode with command prompt- Starts Windows in safe mode with a command prompt window instead of the usual Windows interface.
➢ Enable boot logging- Creates a file, ntbtlog.txt, that lists all the drivers that are installed during startup and that might be useful for advanced troubleshooting.
➢ Enable low-resolution video (640-480) - Starts Windows using your current video driver and using low resolution and refresh rate settings. You can use this mode to reset your display settings.
➢ Last Known Good Configuration- Starts Windows with the last registry and driver configuration that worked successfully.
➢ Directory Services Restore Mode- Starts Windows domain controller running Active Directory so that the directory service can be restored.
➢ Debugging Mode- Starts Windows in an advanced troubleshooting mode intended for IT professionals and system administrators.
56- What is shadow copy? Create shadow copy of a drive?
Ans- Shadow Copy (also known as Volume Snapshot Service, Volume Shadow Copy Service or VSS) is a technology included in Microsoft Windows that allows taking manual or automatic backup copies or snapshots of computer files or volumes, even when they are in use.
Refer the link. http://itsimple.info/?p=258
57- What is System Repair Disk? How to create SRD?
Ans- A system repair disc can be used to boot your computer. It also contains Windows system recovery tools that can help you in recovering Windows from a serious error or restore your computer from a system image. Refer the link: https://www.howtogeek.com/131907/how-to-create-and-use-a-recovery-drive-or-system-repair-disc-in-windows-8/
58- What is a Virus? What are different types of Viruses?
Ans- A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes and it can damage your data and Operating System. Boot Sector Virus, Browser Hijacker, Direct Action Virus, File injector virus, Macro Virus, Multipartite virus, Polymorphic virus, Resident Virus and Web scripting virus are the famous viruses.
59- What is Antivirus? How to install and activate an antivirus?
Ans- Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware, and more.
Refer the link: https://esupport.quickheal.com/support/solutions/articles/23000004922-how-to-install-quick-heal- 1. Select Start > Programs > Quick Heal antivirus > Activate Quick Heal antivirus. 2. On the Registration Wizard, enter the 20-digit Product Key and click Next. 3. Registration details are displayed, verify the details and click Next. Your product is activated successfully. The expiry date of your license is displayed. 4. Click Finish to close the Registration Wizard
Operating System troubleshooting questions
1. How to reset forgotten password.
https://www.howtogeek.com/222262/how-to-reset-your-forgotten-password-in-windows-10/
2. How to fix bootmgr is missing error.
http://www.thewindowsclub.com/fix-bootmgr-missing-windows-7
3. How to tune up PC.
https://www.cnet.com/how-to/easy-ways-to-speed-up-windows-10/
4. How to fix system BSOD error.
https://www.windowscentral.com/how-troubleshoot-blue-screen-errors-windows-10
5. How to fix Black Screen Problem.
https://www.windowscentral.com/how-fix-black-screen-problems-windows-10
6. How to fix Slow Startup
https://www.partitionwizard.com/partitionmagic/slow-startup-Windows-10.html
7. How to fix missing DLL.
https://support.microsoft.com/en-in/help/929833/use-the-system-file-checker-tool-to-repair-missing-or-corrupted-system
8. Internet Explorer not working or slow.
https://appuals.com/internet-explorer-11-not-responding/
9. How to remove bad sectors from the disk.
https://windowsreport.com/bad-sectors-windows-8/
10. How to fix MBR. http://www.thewindowsclub.com/repair-master-boot-record-mbr-windows
11. How to rebuild Boot Configuration Data.
https://www.howto-connect.com/rebuild-boot-configuration-databcd-windows-10/
12. How to reset group policy.https://www.windowscentral.com/how-reset-local-group-policy-objects-their-default-settings-windows-10
#Network Essential
• What is a network? What are the types of network?
Ans- A group of devices which are connected to each other through some media is called a network. LAN, MAN and WAN are the types of network.
• What is the networking? Give few examples?
Ans- The logical flow of data in a network is called networking. CSMA/CD, CSMA/CA, Token ring, Token passing and FDDI are the examples.
• What are the benefits of the network?
Ans- The advantages of a network are
a) Sharing Information (Data)
b) Sharing Hardware
c) Centralized management and Security
• What is internet, Intranet and extranet?
Internet- It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope. Intranet- A privately maintained computer network that can be accessed only by authorized persons, especially members or employees of the organization that owns it.
Extranet- An extranet is a controlled private network allowing customers, partners, vendors, suppliers and other businesses to gain information.
• What is URL? Ans- URL stands for Uniform Resource Locator, and is used to specify addresses on the World Wide Web.
• What is OSI model? Who developed OSI model?
Ans- Open System Interconnection is a logical layered model which describes the flow of data from sender to receiver device. It has 7 logical layers and each layer perform specific task on the data. OSI was developed by ISO (International Standard for Standardization)
Complete the following
Layer
|
Counting
|
Responsibility
|
Protocol
|
PDU
|
Hardware Device
|
Application
|
Layer-7
|
*Mail Services
*Directory Services
*Authentication
|
HTTP, FTP, SMTP, Telnet,
|
Data
|
None
|
Presentation
|
Layer-6
|
*Translation
*Encryption
*Compression
|
All Extensions (.docx,
.xlsx, .pdf etc.
|
Data
|
None
|
Session
|
Layer-5
|
*Dialog Control
*Synchronization
|
PAP,SSH,SMB,NFS,PPTP,RPC,SIP
|
Data
|
None
|
Transport
|
Layer-4
|
*Service Point Addressing
*Segmentation and
Reassembly
*Connection Control
*Error Control
|
TCP,UDP,SPX,SCTP,AH
|
Segments
|
None
|
Network
|
Layer-3
|
*Logical Addressing
*Routing
*NATing
*Internetworking
|
IP, IPX, NAT, RIP, EIGRP,
OSPF,HSRP, VRRP, ICMP,IGMP,
|
Router, Layer-3 Switches,
Gateway,
Firewall
|
|
Data Link
|
Layer-2
|
*Framing
*Physical Addressing
*Error Control
|
MAC,LLC,CDP,ATM,HDLC,
PPP
|
Frame
|
Switch, Bridge, LAN Card
|
Physical
|
Layer-1
|
*Media Specification
*Transmission Mode and
Transmission Rate
*Encoding and Decoading
|
None
|
Bits and Bytes
|
Hub, Repeater, Media
Convertor, Connector
|
Ans- There are 3 types of network cables
a) Coaxial
b) Twisted Pair
c) Fiber Optic
8- What is the deference between Attenuation and Crosstalk?
Attenuation- As the signals travel through cables, they lose their strength. This loss of signal is called attenuation.
Crosstalk- It is the interference generated by the current flowing through one cable affects electrical current of other cable.
9- What are the characteristics of Cat5, Cat5e and Cat6?
Category
|
Characteristic
|
Cat5
|
It provides 100 Mbps of
Bandwidth and the signal frequency is 100 MHz
|
Cat5e
|
It provides 1000 Mbps of
Bandwidth and the signal frequency is 100 MHz
|
Cat6
|
It provides 1000 Mbps of
Bandwidth and the signal frequency is 250 MHz
|
Complete the following
Cable Type
|
Maximum Segment Length
|
Type of Connector
|
UTP
|
100 Meter
|
RJ-45
|
STP
|
100 Meter
|
RJ-45
|
Coaxial RG-58
|
200 Meter
|
BNC
|
Coaxial RG-8
|
500 Meter
|
AUI, Vampire Tap
|
Fiber Optic
|
2-100 KM.
|
ST, SC, SMA, MIC
|
10- Explain the UTP/STP network cable color coding according to…………..
Pin
|
EIA/TIA T-568A
|
EIA/TIA T-568B
|
Pin-1
|
White/Green
|
White/Orange
|
Pin-2
|
Green
|
Orange
|
Pin-3
|
White/Orange
|
White/Green
|
Pin-4
|
Blue
|
Blue
|
Pin-5
|
White/Blue
|
White/Blue
|
Pin-6
|
Orange
|
Green
|
Pin-7
|
White/Brown
|
White/Brown
|
Pin-8
|
Brown
|
Brown
|
11- How to create cross and straight cables? What is the use of cross and straight cable?
Ans-
Cross T-568A-----------------------------------------T568B
Straight T-568B-----------------------------------------T568B
Cross cable is use to connect similar devices whereas Straight cable is use to connect dissimilar devices.
12- What is MAC address? How to check the MAC address of the PC?
Ans- MAC address is the physical address of the device which is 48-bits (6-Byte) address. Ipconfig /all or getmac command is use to check the MAC address of the computer.
13- Define Hub, Repeater, Switch, Router and Gateway? Tell me the OSI layer of each device?
Hub: - A hub operates at the physical layer of OSI model. It connects multiple devices together in a single network segment. A hub also called multiport repeater. It operates in half duplex mode and doesn’t provide guaranteed bandwidth to the connected device.
Switch: - A Switch operates of the Data link layer of OSI model. It connects multiple devices together in a single network segment. It is called an intelligent network device because it creates own MAC address table to forward the frame to the appropriate destination. It operates in full duplex mode and provides guaranteed bandwidth to the connected device.
Router: - Router is a network layer device which communicates deferent networks which may be near or very far. A router sends or forwards the packets to the destination network using the best route.
14- What is Topology? Define Bus, Star, Ring, Mesh, Tree and Hybrid topology?
Ans- A topology determines the physical arrangement of the devices in a network.
Bus Topology: - In bus topology all the devices are connected to a coaxial cable in a liner method, the coaxial cable is called backbone or trunk which needs to be terminated at the both end.
Star Topology: - In star topology multiple devices are connected to a centralized device such as Hub or switch.
Ring Topology: - In ring topology multiple devices are connected in a physical loop in point-to-point manner.
Mesh Topology: - In mesh topology all the devices are connected to each other through a dedicated link.
Tree Topology: - In tree topology multiple star topologies are connected to a centralized bus topology.
Hybrid Topology: - A hybrid topology is the interconnection of different types of topologies.
Complete the following
Type of Communication
|
IEEE Standard
|
CSMA/CD
|
802.3
|
Token Passing
|
802.4
|
Token Ring
|
802.5
|
Wireless LAN
|
802.11
|
15- Define the following
a. 10Base2- 10 Mbps LAN speed, Baseband signaling and coaxial thin cable.
b. 10Base5- 10 Mbps LAN speed, Baseband signaling and coaxial thick cable.
c. 10BaseT- 10 Mbps LAN speed, Baseband signaling and twisted pair cable.
d. 100BaseT- 100 Mbps LAN speed, Baseband signaling and twisted pair cable.
e. 1000BaseT- 1000 Mbps LAN speed, Baseband signaling and twisted pair cable.
16- What is IP Address? What are the Classes of IPV4? Ans- An IP address is a unique identifier of a computer or device in a network through which they are identified can communicate to each other. A, B, C, D and E are the classes of IPV4.
17- What is the range of Class A, B, C, D and E?
Class
|
Range
|
A
|
0-127
|
B
|
128-191
|
C
|
192-223
|
D
|
224-239
|
E
|
240-255
|
18- What is Subnet Mask? What is the default subnet mask of class A, B and C? • Ans- A subnet mask is a 32-bit number used to differentiate the network component of an IP address by dividing the IP address into a network address and host address.
A- 255.0.0.0
B- 255.255.0.0
C- 255.255.255.0
19- What is the difference between private and public IP address? What is private IP address range in class A, B and C?
Ans- The IP address which is assigned by an ISP and is use to communicate in public network (Internet) is called Public IP address whereas an IP address which is use to communicate in private Network (Intranet) is called Private IP address.
Class
|
Private IP
|
A
|
10.0.0.0 to 10.255.255.255
|
B
|
172.16.0.0 to
172.31.255.255
|
C
|
192.168.0.0 to
192.168.255.255
|
20- What is a gateway?
Ans- A network gateway is an internetworking system which is capable to join different networks. Most of the time a router acts as a gateway in the network.
21- What is APIPA and Loopback address?
Ans- APIPA (Automatic Private IP Addressing) assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is either permanently or temporarily unavailable. Loop Back Address- Loopback address is a special IP (127.0.0.1) that is designated for the software loopback interface of a machine. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback interface allows IT professionals to test IP software without worrying about broken or corrupted drivers or hardware.
22- What do you standard by static and dynamic IP addressing? Ans- When a device is assigned a static IP address, it does not change. The device always has the same IP address. Dynamic IP addresses are assigned by the DHCP Server when they connect. These IP addresses are temporary, and can change over time.
23- What are differences between IPV4 and IPV6?
IPV4
|
IPV6
|
It is 32-bits address.
|
It is 128-bits address.
|
32-bits are divided into 4 equal
parts; each part is having 8-bits and called an octet.
|
128-bits are divided into 8 groups;
each group is having 16-bits and called a block.
|
Octets are separated by. (dot)
|
Blocks are separated by : (colon)
|
IPV4 is written in decimal format.
|
IPV is written in Hexadecimal
format.
|
It uses subnet mask to determine
network and host bits.
|
It uses prefix to determine network
and host bits.
|
It is divided into 5 different
classes.
|
No classification.
|
There are 3 types of address
Unicast, Multicast and Broadcast.
|
There are 3 types of address
Unicast, Multicast and Anycast.
|
There are 4 layers in TCP/IP model
Application layer
Transport layer
Network/Internet layer
Physical/data layer
25- What are differences between TCP and UDP?
TCP
|
UDP
|
Transmission Control Protocol
|
User Datagram Protocol
|
TCP is a connection-oriented
protocol.
|
UDP is a connectionless protocol.
|
TCP is reliable
|
UDP is unreliable
|
TCP is slow
|
UDP is fast
|
TCP rearranges data packets in the
order specified.
|
UDP has no inherent order as all
packets are independent of each other
|
TCP header size is 20 bytes
|
UDP Header size is 8 bytes.
|
TCP does error checking
|
UDP does error checking, but no
recovery options.
|
Acknowledgement segments
|
No Acknowledgment
|
TCP does Flow Control.
|
UDP does not have an option for
flow control
|
26- Explain FTP, HTTP, SMTP, Telnet and SNMP?
FTP- The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network.
HTTP- The Hypertext Transfer Protocol is an application protocol to access web pages from the web servers.
SMTP- The Simple Mail Transfer Protocol is an application protocol to send mails.
Telnet- Telnet is an application protocol for accessing remote computers. Through Telnet, an administrator or another user can access other computers remotely.
SNMP- The Simple Network Management Protocol is an application protocol to manage Network Devices.
27- Complete the following
TCP/IP Service
|
Port Number
|
FTP
|
20, 21
|
SSH
|
22
|
Telnet
|
23
|
SMTP
|
25
|
DNS
|
53
|
DHCP Server
|
67, 68
|
TFTP
|
69
|
HTTP
|
80
|
POP
|
110
|
IMAP
|
143
|
SNMP
|
161, 162
|
HTTPS
|
443
|
Dynamic Host Configuration Protocol (DHCP) Server is used to assign automatic TCP/IP configuration to its client.
Domain Name System (DNS) server is use to translate Fully Qualified Domain Names (FQDN) into IP addresses and IP address into Fully Qualified Domain Name.
Windows Internet Name Service (WINS) is use to resolve NetBIOS name into IP address.
29- What is the use of following commands
a. Ping- The Packet Internet Gopher (Ping) command helps to verify IP-level connectivity. When troubleshooting, you can use ping to send an ICMP echo request to a target host name or IP address.
b. Ipconfig and Ipconfig /all- These commands are use to verify TCP/IP Configuration in Windows OS.
c. Ipconfig /release and Ipconfig /renew- /release is used to release current dynamic IP address whereas /renew is used for request new IP address. d. Tracert command can show you the path of packet from your computer to the Destination. It will list all the routers it passes through until it reaches its destination.
e. Pathping- The pathping command is a route tracing tool that combines features of the ping and tracert commands. The pathping command sends packets to each router on the way to a final destination over a period of time.
f. Arp- Arp command allows you to display and modify the Address Resolution Protocol (ARP) cache. An ARP cache is a simple mapping of IP addresses to MAC addresses. g. Netstat- Netstat command provides information and statistics about protocols in use and current TCP/IP network connections.
30- What is Wireless Network? What is the IEEE standard of Wireless network?
Ans- A network in which devices are connected through Radio Frequency (RF) signal is called wireless Network. The IEEE standard of wireless is 802.11.
31- What are the differences between wired LAN and wireless LAN
Wired
|
Wireless
|
IEEE Standard is 802.3
|
IEEE standard is 802.11
|
Devices are physically connected.
|
Devices are logically connected.
|
Signal loss is low.
|
Signal Loss is high.
|
Faster data transmission
rate.
|
Slower data transmission
speed
|
More Secure
|
Less Secure
|
Covers large distance.
|
Covers short distance
|
32- Complete the following
Standard
|
Frequency
|
Bandwidth
|
802.11
|
2.5 GHz
|
2 Mbps
|
802.11a
|
5 GHz
|
54 Mbps
|
802.11b
|
2.4 GHz
|
11 Mbps
|
802.11g
|
2.4 GHz
|
54 Mbps
|
802.11n
|
2.4/5 GHz
|
54 Mbps to 600 Mbps
|
33- What is the deference between Ad-Hoc and Infrastructure wireless Network?
Ans- In Ad-hoc network devices are connected in wireless network using their LAN cards and Access Point or Wireless Router is not required in Ad-Hoc.
In Infrastructure network devices are connected in network through Wireless Access Point of Wireless Route.
34- What are the ways to secure wireless network?
Following are the way to secure wireless Network
➢ Change the default setting of wireless router (IP Address, SSID, Admin Password etc)
➢ Configure Network Password
➢ Enable encryption
➢ Configure MAC filtering
➢ Disable SSID broadcast
➢ Configure 802.1x
➢ Physical security of Wireless Router/Access Point
39 | P a g e
35- Define the following…
a. SSID- Service Set Identifier is technical term for a wireless network name. When you set up a wireless network, you give it a name that is called SSID. SSID is a case sensitive, 32 alphanumeric.
b. Mac Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
c. WEP and WPA are the encryption method used in wireless network. WEP provides 56 or 128-bit encryption whereas WPA provides 256-bit encryption.
36- How to configure wireless router (Dlink)?
Find the link:
https://www.isat.co.za/support-online/adsl-setup-dlink-2750u-router.aspx
37- What are the different ways to share the internet?
Ans- Followings are the ways to share the internet
➢ Internet Connection Sharing (ICS)
➢ Network Address Translation
➢ Proxy
To share internet connection using ICS
Find the link:
https://www.utilizewindows.com/internet-connection-sharing-ics-configuration-in-windows-7/
To share internet connection using CC Proxy
Find the link:
http://www.youngzsoft.net/ccproxy/install.htm
To share internet connection using NAT (Windows Server 2012)
Find the link:
http://www.dell.com/support/article/in/en/indhs1/how10169/configuring-windows-server-2012-r2-as-a-router?lang=en
What are the full form of the below
LAN
|
MAN
|
WAN
|
WWW
|
URL
|
ISP
|
POP
|
IMAP
|
SMTP
|
HTTP
|
FTP
|
PING
|
ICMP
|
IGMP
|
TCP
|
UDP
|
IP
|
DNS
|
DHCP
|
SSH
|
ICS
|
NAT
|
APIPA
|
PST
|
OST
|
SNMP
|
NFS
|
SMB
|
FQDN
|
OSI
|
ISO
|
MAU
|
ARP
|
MAC
|
LLC
|
CSMA/CD
|
RFI
|
EMI
|
ANSI
|
ARPA
|
EIA
|
TIA
|
IEEE
|
WINS
|
IANA
|
CSMA/CA
|
PDU
|
UTP
|
STP
|
ISDN
|
FCS
|
CRS
|
DSL
|
ADSL
|
WPAN
|
RARP
|
FDDI
|
DTE
|
DCE
|
BNC
|
QoS
|
TFTP
|
SCTP
|
NNTP
|
RIP
|
IGRP
|
EIGRP
|
OSPF
|
BGP
|
DSSS
|
FHSS
|
WEP
|
WPA
|
WAP
|
SSID
|
TKIP
|
AES
|
GPRS
|
CDMA
|
GSM
|
GPS
|
CDPD
|
VPN
|
HTML
|
VLAN
|
No comments:
Post a Comment