Pages

Sunday, April 7, 2013

Desktop Administrator Interview Question





1.  What is the difference between Windows XP & Windows 7?

Windows Defender, Parental Control, Windows Touch and Tap instead of point and Click, Multiple
Active Firewall.

2.  One Fine Morning System is not booting up. Explain what would be the problem.
2x2 or 2x4 Power Connector Not Plugged In

Processor Issues

Memory Issues

Monitor Issues

Power Supply and Chassis Issues

Cable Issues

Electrical Short or Overload

Defective Components

3.  System No Display. What the steps are to Diagnoses the problem?

Check the monitor is switched on and the power indicator LED of the monitor is glowing. Check the
monitor power connection.

Adjust the contrast/brightness knob of the monitor to maximum.

Check whether the monitor is connected properly to the video adapter of the system.

If your system has add-on video adapter, switch off the system and remove the power.

Check whether the CPU, memory are connected properly to the motherboard.

4.  System is power on, but beep sound occurs. What would be the problem?

One long beep: Memory problem

One long and two short beeps: Video error

One long and three short beeps: Video error

Continuous beeps: Video/memory problem

Other beeps: Check the motherboard manual

5.  Different and NTFS and FAT32.

NTFS
Allows access local to w2k w2k3 XP win NT4 with SP4 & later may get access for some file.

Maximum size of partition is 2 Terabytes & more.

Maximum File size is up to 16TB.

File & folder Encryption is possible only in NTFS.
FAT 32
Fat 32 Allows access to win 95 98 win millennium win2k xp on local partition.

Maximum size of partition is up to 2 TB.

Maximum File size is up to 4 GB.

File & folder Encryption is not possible.

6.  How will you convert FAT32 to NTFS?

To convert a volume to NTFS from the command prompt

Open Command Prompt.

In the command prompt window, type

convert drive_letter: /fs:ntfs

For example, typing convert D: /fs:ntfs would format drive D: with the ntfs format.

7.  What are primary Partition, Extended Partition and Logical Partition?

A primary partition contains one file system. The first partition (C:) must be a primary partition..

An extended partition is a primary partition which contains secondary partition(s). A hard disk may contain only one extended partition..

Extended partition that is sub divided into many drives is called as Logical partition..

8.  In a computer how many primary partition can be held.

Four Primary partitions can be done...

9.  Difference between Microsoft outlook and Outlook Express.

Microsoft Outlook:
Files will be saved in .PST Format.

Have some Additional Features like Address Book, Contacts, and Remainderetc...

Not a free product have to purchase it..

Outlook Express:
Files will be saved in .DBX Format.

Don’t have any additional features.

Free product that comes along with the OS Installation.

10.  What is Virus?

Vital Information Resource under Seige.It is an executable Program which Performs Malicious activities in the system.

11.  What is Antivirus?

An Antivirus Is a Software that protects the system from Virus Attack..

12.  What is the difference between Delete and Quarantine in Action methodology for Virus Scanning?

Delete will delete all the virus infected files and Quarantine create a copy from an infected file and produce a new one..

13.  What are the procedures for cleaning an infected virus system?

Unplug the system from the Network if it is in a Network & Scan the System with the Updated Antivirus..

14.  What is SMTP Protocol? What is the port Number used by SMTP?

Simple Mail Transfer Protocol which performs all outgoing Mail. The port number is 25.

15.  What is POP3 Protocol? What is the port Number used by POP3?

Post Office Protocol which performs all incoming mails. The Port number is 110.

16.  Tell me the procedure for Backup and Restore Mail in Outlook Express.

Go to C:\Documents & Setting\User Profile\Application Data\Local Settings\Identities\Outlook Express & Copy the .DBX files and Save it in another location as a Backup. Copy the files from the location that was saved as a Backup & Go to the same path &  Paste it.

17.  Tell me the Procedure for Backup and Restore Mail in Microsoft Express.

Go to C:\Documents & Setting\User Profile\Application Data\Local Settings\Microsoft \Outlook Express & Copy the .PST files and Save it in another location as a Backup..

Copy the files from the location that was saved as a Backup & Go to the same path & Paste it.

18.  How will you repair a PST Files?

Using scanpst.exe files

19.  How to set Password for PST Files?
Select Go | Folder List from the menu.

Click on the root item of the desired PST file with the right mouse button.

If you want to protect only certain email folders with a password, you can move them to a newly created PST file and assign a password only for that file.

Select Properties for... from the menu.

Click Advanced....

Now click Change Password....

Enter the desired password under both New password: and Verify password:.

If a password had already been set for the PST file, enter that phrase under Old password:.

If you assign a password to a previously unprotected PST file, leave the Old password: field blank.

To remove the password from a PST file, enter it under Old password: and leave both New password: and Verify password: blank.

Click OK.

Click OK again.

Now click Cancel.

20.  How to set store a mail copy in Server for 30 days while configuring mail in Microsoft outlook?

Go to Outlook 2007's Tools, Account Settings, and With the Account Settings dialog open, select the account and click Change, then click More Settings. Look on the Advanced tab..

21.  How to set Rules in Microsoft outlook in order to organize mailbox?

Open Microsoft Outlook.
Click Tools.

Click Rules Wizard.

Click the New button and run through the wizard..

22.  Explain about Junk Mail option in outlook.

Low. This level is designed to catch only the most obvious junk e-mail messages. You can make the filter more aggressive, but if you do it may catch legitimate messages sometimes. Any message that is caught by the Junk E-mail Filter is moved to a special Junk E-mail folder. You should review messages in the Junk E-mail folder from time to time to make sure that they are not legitimate messages that you want to see.

23.  Explain about Registry?

This is a database used by Microsoft Windows to store configuration information about the software installed on a computer. This information includes things like the desktop background, program settings, and file extension associations.

24.  How to backup and Restore Registry?

Import and Export from regedit.

25.  When system booting “NTLDR file Missing” Error. What would be the solution?

Boot the System from the OS cd and Select Repair Option

26.  When XP is booting up system gets restart automatically. What would be the solution?

May be RAM problem so replace it...
Virus would have affected..

27.  Explain about Windows Firewall?

Firewall Restricts the System from Unwanted Traffic.

28.  Difference between Administrators and Power Users?

Members of the Administrator group have total control over the computer and everything on it. The user named Administrator is the default account within this group

The Power User class can perform any task except for those reserved for Administrators. They are allowed to carry out functions that will not directly affect the operating system or risk security

29.  What is Service Pack? Is it needed to be installed in all the system?

A service pack (in short SP) is a collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package.
Yes it should be installed in all the systems.

30.  What is Device Drivers? Why it is needed?

A device driver is a program that controls a particular type of device that is attached to your computer. There are device drivers for printers, displays, CD-ROM readers, diskette drives, and so on

31.  Explain about Local Printer and Network Printer?

A network printer is shared by more than one computer using the IP Address that is assigned to the printer.
A local printer is directly connected to one computer & shared using sharing & security

32.  Explain detail how to install a Network Printer?

To install the printer using an IP address, go to Start>Control Panel>Printers and Faxes and then click the Add Printer icon. Next, click Create a new port, then select Standard TCP/IP Port from the drop-down menu. You will then be asked to enter an IP address. Enter the IP address of the print server and click Next. You will be asked to select the printer manufacturer and the model from the list. If you do not see your printer listed, insert the disk that came with the printer and click Have Disk.
If you do not know the IP address of the printer, you can sometime select Browse for printer in the beginning of the process. If the networked printer is attached to another computer is being shared, you will need to enter the name of the computer followed by the share name of the printer. For example: \\computername\printername.

33.  How does virus get loaded into computer?

Through Exe Files, Pen drive, CD, E-mail, Internet Etc...

34.  What is Boot Process in a computer?

First is the POST, this stands for Power On Self-Test, for the computer. This process tests memory as well as a number of other subsystems. You can usually monitor this as it runs each test. After that is complete the system will run POST for any device that has BIOS (Basic Input-Output System).

35.  What is the difference between RAM & ROM?

RAM – Random Access Memory which is called as Temporary Memory..
ROM- Read Only Memory which stores the data Permanently.

36.  What is Cache Memory?

Cache memory is fast memory that is used to hold the most recently accessed data in slower main memory. The idea is that frequently accessed data will stay in cache, which allows the CPU to access it more quickly, which means it doesn't have to wait for the data to arrive.

37.  What is the difference between Primary Storage and Secondary Storage?

Usually the primary storage is a hard drive(s). Secondary is a flash drive(s), cd and so on. But nowadays, it's mostly a game of words.

The primary memory of CPU is the place where computer program and data is stored during processing. this storage unite is often called either main memory or primary memory..

There is usually two types primary memory

1. RAM 2:.ROM
The devices of computer that store information such as software and data permanently are called secondary storage device.

There are many types of secondary storage devices such as ,magneticdisk, Hard disk floppy disk , CD Rom , magnetic tape etc...

38.  How to increase or set virtual memory in Window XP?
Click Start, and then click Control Panel.

ClickPerformance and Maintenance, and then click System.

On the Advanced tab, under Performance, click Settings.

On the Advanced tab, under Virtual memory, click Change.

UnderDrive [Volume Label], click the drive that contains the paging file that you want to change.

UnderPaging file size for selected drive, click to Custom size check box. You can enter the amount of memory you would like to reserve for Virtual memory by entering the initial and maximum size.  ClickSet

39.  What are the advantages of having SATA HDD over PATA HDD?

SATA HDD uses different channel for incoming and outgoing traffic. Wherelse PATA HDD uses same Channel for incoming and outgoing traffic.

40.  What are Bidirectional and Unidirectional Bus?

The address bus (sometimes called the memory bus) transports memory addresses which the processor wants to access in order to read or write data. It is a unidirectional bus.
The data bus transfers instructions coming from or going to the processor. It is a bidirectional bus.

41.  How does the browser know to go to a certain IP address when you enter a domain like google.com?

Whenever an address is typed on the browser it immediately connects with the DNS.This DNS Finds the IP address related to the Domain & connects with the Server & the requested web page will be displayed.

42.  What’s the difference between L1 and L2 cache?

Short for Level 1 cache, a memory cache built into the microprocessor.

Short for Level 2 cache, cache memory that is external to the microprocessor. In general, L2 cache memory, also called the secondary cache, resides on a separate chip from the microprocessor chip.

43.  What is BIOS? How to clear password for BIOS?

BIOS or Basic Input/output System is the first program accessed by the processor during start up to ensure that all the other basic programs, hard drives, ports, peripherals and the central processing unit are in good working condition.
In order to clear the password for BIOS Just Remove the CMOS Battery & Insert it again after Sometime or Change the Jumper Settings.

44.  What difference between original motherboard & chipset motherboard?

A chipset is a group of microchips designed to work as a unit in performing one or more related functions.
They are chip or chips on a motherboard containing various functions supporting the CPU.

Motherboard is the "heart" of your PC -- it handles system resources (IRQ lines, DMA channels, I/O locations), as well as core components like the CPU, and all system memory. It accepts expansion devices such as sound and network cards, and modems. The main printed circuit board in a computer that carries the system buses. It is equipped with sockets to which all processors, memory modules, plug-in cards, daughterboard, or peripheral devices are connected.

45.  What is the SMPS? Explain about its output voltage?

Switch Mode Power Supply is an electronic power supply Unit that incorporates a switching regulator in order to provide the required output voltage

46.  What is Power Good Signal? Explain its functionality.

In addition to the voltages and currents that a computer needs to operate, power supplies also provide a signal called the Power-Good signal, sometimes written as Power_OK or Power Good or you can distinguish it by its gray color. Its purpose is to tell the computer all is well with the power supply and that the computer can continue to operate normally. If the Power-Good signal is not present at startup, the CPU is held in reset state. If a Power-Good signal goes down during operation the CPU will shutdown. The Power-Good signal prevents the computer from attempting to operate on improper voltages and damaging itself.

47.  What is the difference between AGP and PCI graphics cards?

AGP stands for 'Accelerated Graphics Port’ the speed at which the AGP bus transfers data to and from the video card was too Fast.
PCI stands for 'Peripheral Component Interconnect’ the speed at which the PCI bus transfers data to and from the video card was too Slow.

48.  While Installing Windows XP File Missing Error Occurs. What would be the Problem?

If you are attempting to boot from a CD-ROM and are receiving this error message it is likely that the diskette does not have all the necessary files and/or is corrupt.

49.  What is Defragmentation? Why it’s needed?

Defragmentation is a process that reduces the amount of fragmentation in file systems. It does this by physically organizing the contents of the disk to store the pieces of each file close together and contiguously.

50.  One fine morning system is not able to login into domain. What could be the problem?

May be Network problem.

Password would have expired.

May be some restriction policy applied.

51.  In a workgroup environment how many system can access a shared folder simultaneously.

10 Systems

52.  What is command to view computer name?

Ipconfig /all or hostname

53.  Explain Ping command in detail.

Packet Internet Gopher is a simple command line network tool that you can use to verify your connectivity to a network.

54.  What would the problem if system gets restarted frequently?

RAM problem, Virus Attack, Dust in processor FAN.

55.  What would the problem if the system gets hanged off?

RAM problem,OS Corrupt,Virus Attack,Hard Disk Problem.

56.  What could be the problem if hard disk gets in problem?

Disk boot failure, Hard Disk not detected, CableProblem, BlueScreen, No power supply, Bad Sectors.

57.  What is msconfig? Why it is used?

Microsoft System Configuration Utility is a utility to troubleshoot the Windows startup process.

58.  What is Remote Desktop? Why it is used?

Remote Desktop is used to take another network system remotely Remote desktop allows you to control the desktop and, indeed, the entire contents of a computer from another machine entirely

59.  How to run legacy application in windows xp?

In both XP , right click on the executable of the application you wish to run.
Select "Properties".

Select the "Compatibility" tab on the "Properties" dialogue box.

There will be a number of options. Choose "Windows 95 or 98 compatibility mode"

60.  What is the command to shutdown and restart the computer?

Shutdown –s –t 00

61.  What is system restore? Why it is used?

System Restore helps you restore your computer's system files to an earlier point in time. It's a way to undo system changes to your computer without affecting your personal files, such as e­mail, documents, or photos.

62. What is Ghost?  
Ghost is a software product from Symantec that can clone (copy) the entire contents of a hard disk to another computer's hard disk or to storage media, automatically formatting and partitioning the target disk. This product is especially useful where one system is to be replicated on a number of computers or when someone wants to back up everything on their personal computer.

63. Difference between Public and Private IP?

Public IP addresses

A public IP address is any valid address, or number, that can be accessed over the Internet.  Internet standards groups, such as the Network Information Center (NIC) or the Internet Assigned Numbers Authority (IANA), are the organizations responsible for registering IP ranges and assigning them to organizations, such as Internet Service Providers (ISPs).
In the Cloud(n) system, a public IP address is an identifier assigned to a virtual router on the network. Any resources that will be available over the Internet will require a public IP address.  Public IP addresses can be added in the Cloud Console.

Private IP addresses

A private IP address is any number or address assigned to a device on a private TCP/IP Local Area Network that is accessible only within the Local Area Network.  For a resource inside the Local Area Network to be accessible over the Internet, a device within the Local Area Network must be connected to the Internet with a public IP address, and the networking must be appropriately configured.  The same Internet standards organizations have reserved the following three IP address ranges that will never be registered publicly:
First IP in block
Last IP in block
10.0.0.0
10.255.255.255
172.16.0.0
172.31.255.255
192.168.0.0
192.168.255.255
A private IP address is assigned to each instance created in the Cloud(n) system.  Consequently, each instance may only have one private IP address, and additional private IP addresses cannot be added.



64. How will you deploy Windows XP or Windows 7 in 100 Computers simultaneously?
Using SCCM (System Center Configuration Manager), MDT (Microsoft Deployment Toolkit), WDS (Windows Deployment Services) tools

65. How will update patches or Service pack in multiple computers?
Using WSUS (Windows Software Update Service) tool.

66. Which are the tools you use for remote support?
Dame Ware, Remote Assistance, Remote Desktop, Ammy Admin

67. What is bitlocker?
BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2.

68. What are Host & LMHosts Files?
Host File: Windows Internet Explorer is set to automatically take instructions from a special file that can be found as part of the default installation of the Operating system.Windows XP it is in C:\WINDOWS\SYSTEM32\DRIVERS\etc
LMHOSTS:LMHOSTS file is for LAN Manager name resolution with the TCP/IP protocol. The file is similar in format to the HOSTS file, but its function is to resolve IP addresses for a server that is not on the local subnet (the same wire)

69. Difference between 32 bit and 64bit OS Versions?

70. What are Ping and Traceroute?
Ping is a program that sends a series of packets over a network or the Internet to a specific computer in order to generate a response from that computer.Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer. It also calculates and displays the amount of time each hop took.

71. How can recover a file encrypted using EFS?
Use Domain Recovery Agents

72. What is telnet?
Telnet is a protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network (such as the Internet).

73. What is VPN?
A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network

74. Difference between Hub and Switch?

Both Ethernet hubs and switches are devices used to connect one or more machines to another component of either the local area network (LAN) or wide area network (WAN) in its environment.


Hub

  • A hub connects multiple components on a LAN to each other, to the WAN or both. When data is sent to a port on the hub, that data is repeated to all the ports on the hub and all the devices then determine for which device the data was intended.

Switch

  • A switch acts like a direct connection between two machines. Although many machines can be connected to a switch, each one is allocated a direct connection to each device sharing that switch. This direct connection allows data to be sent only to the correct machine without the need for unnecessary repetition.

75. How will you fine tune OS?
Clean tmp Files, Run Defragmentation, Run Scan Disk, Disk Cleanup, Check for Antivirus, Increase system virtual memory,

76. Difference between Safe and Normal mode?
Safe mode is an alternate boot method for Windows operating systems that makes it easier to diagnose problems. The only startup programs loaded are the operating system and drivers for the mouse, keyboard, and display modes display.


No comments :

Post a Comment