1. What is the difference between Windows XP
& Windows 7?
Windows
Defender, Parental Control, Windows Touch and Tap instead of point and Click,
Multiple
Active
Firewall.
2. One Fine Morning System is not booting up.
Explain what would be the problem.
2x2 or 2x4
Power Connector Not Plugged In
Processor
Issues
Memory
Issues
Monitor
Issues
Power
Supply and Chassis Issues
Cable
Issues
Electrical
Short or Overload
Defective
Components
3. System No Display. What the steps are to
Diagnoses the problem?
Check the
monitor is switched on and the power indicator LED of the monitor is glowing.
Check the
monitor
power connection.
Adjust the
contrast/brightness knob of the monitor to maximum.
Check
whether the monitor is connected properly to the video adapter of the system.
If your
system has add-on video adapter, switch off the system and remove the power.
Check
whether the CPU, memory are connected properly to the motherboard.
4. System is power on, but beep sound occurs.
What would be the problem?
One long
beep: Memory problem
One long
and two short beeps: Video error
One long
and three short beeps: Video error
Continuous
beeps: Video/memory problem
Other
beeps: Check the motherboard manual
5. Different and NTFS and FAT32.
NTFS
Allows
access local to w2k w2k3 XP win NT4 with SP4 & later may get access for
some file.
Maximum
size of partition is 2 Terabytes & more.
Maximum
File size is up to 16TB.
File &
folder Encryption is possible only in NTFS.
FAT 32
Fat 32
Allows access to win 95 98 win millennium win2k xp on local partition.
Maximum
size of partition is up to 2 TB.
Maximum
File size is up to 4 GB.
File &
folder Encryption is not possible.
6. How will you convert FAT32 to NTFS?
To convert
a volume to NTFS from the command prompt
Open
Command Prompt.
In the
command prompt window, type
convert
drive_letter: /fs:ntfs
For
example, typing convert D: /fs:ntfs would format drive D: with the ntfs format.
7. What are primary Partition, Extended
Partition and Logical Partition?
A primary
partition contains one file system. The first partition (C:) must be a primary
partition..
An extended
partition is a primary partition which contains secondary partition(s). A hard
disk may contain only one extended partition..
Extended
partition that is sub divided into many drives is called as Logical partition..
8. In a computer how many primary partition can
be held.
Four
Primary partitions can be done...
9. Difference between Microsoft outlook and
Outlook Express.
Microsoft
Outlook:
Files will
be saved in .PST Format.
Have some
Additional Features like Address Book, Contacts, and Remainderetc...
Not a free
product have to purchase it..
Outlook
Express:
Files will
be saved in .DBX Format.
Don’t have
any additional features.
Free
product that comes along with the OS Installation.
10. What is Virus?
Vital
Information Resource under Seige.It is an executable Program which Performs
Malicious activities in the system.
11. What is Antivirus?
An
Antivirus Is a Software that protects the system from Virus Attack..
12. What is the difference between Delete and
Quarantine in Action methodology for Virus Scanning?
Delete will
delete all the virus infected files and Quarantine create a copy from an
infected file and produce a new one..
13. What are the procedures for cleaning an
infected virus system?
Unplug the
system from the Network if it is in a Network & Scan the System with the
Updated Antivirus..
14. What is SMTP Protocol? What is the port
Number used by SMTP?
Simple Mail
Transfer Protocol which performs all outgoing Mail. The port number is 25.
15. What is POP3 Protocol? What is the port
Number used by POP3?
Post Office
Protocol which performs all incoming mails. The Port number is 110.
16. Tell me the procedure for Backup and Restore
Mail in Outlook Express.
Go to
C:\Documents & Setting\User Profile\Application Data\Local
Settings\Identities\Outlook Express & Copy the .DBX files and Save it in
another location as a Backup. Copy the files from the location that was saved
as a Backup & Go to the same path &
Paste it.
17. Tell me the Procedure for Backup and Restore
Mail in Microsoft Express.
Go to
C:\Documents & Setting\User Profile\Application Data\Local
Settings\Microsoft \Outlook Express & Copy the .PST files and Save it in
another location as a Backup..
Copy the
files from the location that was saved as a Backup & Go to the same path
& Paste it.
18. How will you repair a PST Files?
Using
scanpst.exe files
19. How to set Password for PST Files?
Select Go |
Folder List from the menu.
Click on
the root item of the desired PST file with the right mouse button.
If you want
to protect only certain email folders with a password, you can move them to a
newly created PST file and assign a password only for that file.
Select
Properties for... from the menu.
Click
Advanced....
Now click
Change Password....
Enter the
desired password under both New password: and Verify password:.
If a
password had already been set for the PST file, enter that phrase under Old
password:.
If you
assign a password to a previously unprotected PST file, leave the Old password:
field blank.
To remove
the password from a PST file, enter it under Old password: and leave both New
password: and Verify password: blank.
Click OK.
Click OK
again.
Now click
Cancel.
20. How to set store a mail copy in Server for 30
days while configuring mail in Microsoft outlook?
Go to
Outlook 2007's Tools, Account Settings, and With the Account Settings dialog
open, select the account and click Change, then click More Settings. Look on
the Advanced tab..
21. How to set Rules in Microsoft outlook in
order to organize mailbox?
Open
Microsoft Outlook.
Click
Tools.
Click Rules
Wizard.
Click the
New button and run through the wizard..
22. Explain about Junk Mail option in outlook.
Low. This
level is designed to catch only the most obvious junk e-mail messages. You can
make the filter more aggressive, but if you do it may catch legitimate messages
sometimes. Any message that is caught by the Junk E-mail Filter is moved to a
special Junk E-mail folder. You should review messages in the Junk E-mail
folder from time to time to make sure that they are not legitimate messages
that you want to see.
23. Explain about Registry?
This is a
database used by Microsoft Windows to store configuration information about the
software installed on a computer. This information includes things like the
desktop background, program settings, and file extension associations.
24. How to backup and Restore Registry?
Import and
Export from regedit.
25. When system booting “NTLDR file Missing”
Error. What would be the solution?
Boot the
System from the OS cd and Select Repair Option
26. When XP is booting up system gets restart
automatically. What would be the solution?
May be RAM
problem so replace it...
Virus would
have affected..
27. Explain about Windows Firewall?
Firewall
Restricts the System from Unwanted Traffic.
28. Difference between Administrators and Power
Users?
Members of
the Administrator group have total control over the computer and everything on
it. The user named Administrator is the default account within this group
The Power
User class can perform any task except for those reserved for Administrators.
They are allowed to carry out functions that will not directly affect the
operating system or risk security
29. What is Service Pack? Is it needed to be
installed in all the system?
A service
pack (in short SP) is a collection of updates, fixes and/or enhancements to a
software program delivered in the form of a single installable package.
Yes it
should be installed in all the systems.
30. What is Device Drivers? Why it is needed?
A device
driver is a program that controls a particular type of device that is attached
to your computer. There are device drivers for printers, displays, CD-ROM
readers, diskette drives, and so on
31. Explain about Local Printer and Network
Printer?
A network
printer is shared by more than one computer using the IP Address that is
assigned to the printer.
A local
printer is directly connected to one computer & shared using sharing &
security
32. Explain detail how to install a Network
Printer?
To install
the printer using an IP address, go to Start>Control Panel>Printers and
Faxes and then click the Add Printer icon. Next, click Create a new port, then
select Standard TCP/IP Port from the drop-down menu. You will then be asked to
enter an IP address. Enter the IP address of the print server and click Next.
You will be asked to select the printer manufacturer and the model from the
list. If you do not see your printer listed, insert the disk that came with the
printer and click Have Disk.
If you do
not know the IP address of the printer, you can sometime select Browse for
printer in the beginning of the process. If the networked printer is attached
to another computer is being shared, you will need to enter the name of the
computer followed by the share name of the printer. For example:
\\computername\printername.
33. How does virus get loaded into computer?
Through Exe
Files, Pen drive, CD, E-mail, Internet Etc...
34. What is Boot Process in a computer?
First is
the POST, this stands for Power On Self-Test, for the computer. This process
tests memory as well as a number of other subsystems. You can usually monitor
this as it runs each test. After that is complete the system will run POST for
any device that has BIOS (Basic Input-Output System).
35. What is the difference between RAM & ROM?
RAM –
Random Access Memory which is called as Temporary Memory..
ROM- Read
Only Memory which stores the data Permanently.
36. What is Cache Memory?
Cache
memory is fast memory that is used to hold the most recently accessed data in
slower main memory. The idea is that frequently accessed data will stay in cache,
which allows the CPU to access it more quickly, which means it doesn't have to
wait for the data to arrive.
37. What is the difference between Primary
Storage and Secondary Storage?
Usually the
primary storage is a hard drive(s). Secondary is a flash drive(s), cd and so
on. But nowadays, it's mostly a game of words.
The primary
memory of CPU is the place where computer program and data is stored during
processing. this storage unite is often called either main memory or primary
memory..
There is
usually two types primary memory
1. RAM
2:.ROM
The devices
of computer that store information such as software and data permanently are
called secondary storage device.
There are
many types of secondary storage devices such as ,magneticdisk, Hard disk floppy
disk , CD Rom , magnetic tape etc...
38. How to increase or set virtual memory in
Window XP?
Click
Start, and then click Control Panel.
ClickPerformance
and Maintenance, and then click System.
On the
Advanced tab, under Performance, click Settings.
On the
Advanced tab, under Virtual memory, click Change.
UnderDrive
[Volume Label], click the drive that contains the paging file that you want to
change.
UnderPaging
file size for selected drive, click to Custom size check box. You can enter the
amount of memory you would like to reserve for Virtual memory by entering the
initial and maximum size. ClickSet
39. What are the advantages of having SATA HDD
over PATA HDD?
SATA HDD uses
different channel for incoming and outgoing traffic. Wherelse PATA HDD uses
same Channel for incoming and outgoing traffic.
40. What are Bidirectional and Unidirectional
Bus?
The address
bus (sometimes called the memory bus) transports memory addresses which the
processor wants to access in order to read or write data. It is a
unidirectional bus.
The data
bus transfers instructions coming from or going to the processor. It is a
bidirectional bus.
41. How does the browser know to go to a certain
IP address when you enter a domain like google.com?
Whenever an
address is typed on the browser it immediately connects with the DNS.This DNS
Finds the IP address related to the Domain & connects with the Server &
the requested web page will be displayed.
42. What’s the difference between L1 and L2
cache?
Short for
Level 1 cache, a memory cache built into the microprocessor.
Short for
Level 2 cache, cache memory that is external to the microprocessor. In general,
L2 cache memory, also called the secondary cache, resides on a separate chip
from the microprocessor chip.
43. What is BIOS? How to clear password for BIOS?
BIOS or
Basic Input/output System is the first program accessed by the processor during
start up to ensure that all the other basic programs, hard drives, ports,
peripherals and the central processing unit are in good working condition.
In order to
clear the password for BIOS Just Remove the CMOS Battery & Insert it again
after Sometime or Change the Jumper Settings.
44. What difference between original motherboard
& chipset motherboard?
A chipset
is a group of microchips designed to work as a unit in performing one or more
related functions.
They are
chip or chips on a motherboard containing various functions supporting the CPU.
Motherboard
is the "heart" of your PC -- it handles system resources (IRQ lines,
DMA channels, I/O locations), as well as core components like the CPU, and all
system memory. It accepts expansion devices such as sound and network cards,
and modems. The main printed circuit board in a computer that carries the
system buses. It is equipped with sockets to which all processors, memory
modules, plug-in cards, daughterboard, or peripheral devices are connected.
45. What is the SMPS? Explain about its output
voltage?
Switch Mode
Power Supply is an electronic power supply Unit that incorporates a switching
regulator in order to provide the required output voltage
46. What is Power Good Signal? Explain its
functionality.
In addition
to the voltages and currents that a computer needs to operate, power supplies
also provide a signal called the Power-Good signal, sometimes written as
Power_OK or Power Good or you can distinguish it by its gray color. Its purpose
is to tell the computer all is well with the power supply and that the computer
can continue to operate normally. If the Power-Good signal is not present at
startup, the CPU is held in reset state. If a Power-Good signal goes down
during operation the CPU will shutdown. The Power-Good signal prevents the
computer from attempting to operate on improper voltages and damaging itself.
47. What is the difference between AGP and PCI
graphics cards?
AGP stands
for 'Accelerated Graphics Port’ the speed at which the AGP bus transfers data
to and from the video card was too Fast.
PCI stands
for 'Peripheral Component Interconnect’ the speed at which the PCI bus
transfers data to and from the video card was too Slow.
48. While Installing Windows XP File Missing
Error Occurs. What would be the Problem?
If you are
attempting to boot from a CD-ROM and are receiving this error message it is
likely that the diskette does not have all the necessary files and/or is
corrupt.
49. What is Defragmentation? Why it’s needed?
Defragmentation
is a process that reduces the amount of fragmentation in file systems. It does
this by physically organizing the contents of the disk to store the pieces of
each file close together and contiguously.
50. One fine morning system is not able to login
into domain. What could be the problem?
May be
Network problem.
Password
would have expired.
May be some
restriction policy applied.
51. In a workgroup environment how many system
can access a shared folder simultaneously.
10 Systems
52. What is command to view computer name?
Ipconfig
/all or hostname
53. Explain Ping command in detail.
Packet
Internet Gopher is a simple command line network tool that you can use to
verify your connectivity to a network.
54. What would the problem if system gets
restarted frequently?
RAM
problem, Virus Attack, Dust in processor FAN.
55. What would the problem if the system gets
hanged off?
RAM
problem,OS Corrupt,Virus Attack,Hard Disk Problem.
56. What could be the problem if hard disk gets
in problem?
Disk boot
failure, Hard Disk not detected, CableProblem, BlueScreen, No power supply, Bad
Sectors.
57. What is msconfig? Why it is used?
Microsoft
System Configuration Utility is a utility to troubleshoot the Windows startup
process.
58. What is Remote Desktop? Why it is used?
Remote
Desktop is used to take another network system remotely Remote desktop allows
you to control the desktop and, indeed, the entire contents of a computer from
another machine entirely
59. How to run legacy application in windows xp?
In both XP
, right click on the executable of the application you wish to run.
Select
"Properties".
Select the
"Compatibility" tab on the "Properties" dialogue box.
There will
be a number of options. Choose "Windows 95 or 98 compatibility mode"
60. What is the command to shutdown and restart
the computer?
Shutdown –s
–t 00
61. What is system restore? Why it is used?
System
Restore helps you restore your computer's system files to an earlier point in
time. It's a way to undo system changes to your computer without affecting your
personal files, such as email, documents, or photos.
62. What is
Ghost?
Ghost is a
software product from Symantec that can clone (copy) the entire contents of a
hard disk to another computer's hard disk or to storage media, automatically
formatting and partitioning the target disk. This product is especially useful
where one system is to be replicated on a number of computers or when someone
wants to back up everything on their personal computer.
63.
Difference between Public and Private IP?
Public IP addresses
A public IP address is any valid address, or number, that can be accessed over the Internet. Internet standards groups, such as the Network Information Center (NIC) or the Internet Assigned Numbers Authority (IANA), are the organizations responsible for registering IP ranges and assigning them to organizations, such as Internet Service Providers (ISPs).
In the Cloud(n) system, a public IP address is an identifier assigned to a virtual router on the network. Any resources that will be available over the Internet will require a public IP address. Public IP addresses can be added in the Cloud Console.
Private IP addresses
A private IP address is any number or address assigned to a device on a private TCP/IP Local Area Network that is accessible only within the Local Area Network. For a resource inside the Local Area Network to be accessible over the Internet, a device within the Local Area Network must be connected to the Internet with a public IP address, and the networking must be appropriately configured. The same Internet standards organizations have reserved the following three IP address ranges that will never be registered publicly:
First IP in block
|
Last IP in block
|
10.0.0.0
|
10.255.255.255
|
172.16.0.0
|
172.31.255.255
|
192.168.0.0
|
192.168.255.255
|
A private IP address is assigned to each instance created in the Cloud(n) system. Consequently, each instance may only have one private IP address, and additional private IP addresses cannot be added.
64. How
will you deploy Windows XP or Windows 7 in 100 Computers simultaneously?
Using SCCM
(System Center Configuration Manager), MDT (Microsoft Deployment Toolkit), WDS
(Windows Deployment Services) tools
65. How
will update patches or Service pack in multiple computers?
Using WSUS
(Windows Software Update Service) tool.
66. Which
are the tools you use for remote support?
Dame Ware,
Remote Assistance, Remote Desktop, Ammy Admin
67. What is
bitlocker?
BitLocker
lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise,
Windows 7 and Vista Ultimate or Windows Server 2008 and R2.
68. What
are Host & LMHosts Files?
Host File:
Windows Internet Explorer is set to automatically take instructions from a
special file that can be found as part of the default installation of the
Operating system.Windows XP it is in C:\WINDOWS\SYSTEM32\DRIVERS\etc
LMHOSTS:LMHOSTS
file is for LAN Manager name resolution with the TCP/IP protocol. The file is
similar in format to the HOSTS file, but its function is to resolve IP
addresses for a server that is not on the local subnet (the same wire)
69.
Difference between 32 bit and 64bit OS Versions?
70. What
are Ping and Traceroute?
Ping is a
program that sends a series of packets over a network or the Internet to a
specific computer in order to generate a response from that computer.Traceroute
is a utility that records the route (the specific gateway computers at each
hop) through the Internet between your computer and a specified destination
computer. It also calculates and displays the amount of time each hop took.
71. How can
recover a file encrypted using EFS?
Use Domain
Recovery Agents
72. What is
telnet?
Telnet is a
protocol that allows you to connect to remote computers (called hosts) over a
TCP/IP network (such as the Internet).
73. What is
VPN?
A Virtual
Private Network (VPN) is a network technology that creates a secure network
connection over a public network such as the Internet or a private network
owned by a service provider. Large corporations, educational institutions, and
government agencies use VPN technology to enable remote users to securely
connect to a private network
74.
Difference between Hub and Switch?
Both Ethernet hubs and switches are devices used to connect one or more machines to another component of either the local area network (LAN) or wide area network (WAN) in its environment.
Both Ethernet hubs and switches are devices used to connect one or more machines to another component of either the local area network (LAN) or wide area network (WAN) in its environment.
Hub
- A hub connects multiple components on a LAN to each other, to the WAN or both. When data is sent to a port on the hub, that data is repeated to all the ports on the hub and all the devices then determine for which device the data was intended.
Switch
- A switch acts like a direct connection between two machines. Although many machines can be connected to a switch, each one is allocated a direct connection to each device sharing that switch. This direct connection allows data to be sent only to the correct machine without the need for unnecessary repetition.
75. How
will you fine tune OS?
Clean tmp
Files, Run Defragmentation, Run Scan Disk, Disk Cleanup, Check for Antivirus,
Increase system virtual memory,
76.
Difference between Safe and Normal mode?
Safe mode
is an alternate boot method for Windows operating systems that makes it easier
to diagnose problems. The only startup programs loaded are the operating system
and drivers for the mouse, keyboard, and display modes display.
No comments :
Post a Comment