Professional Documents
Culture Documents
Active directory authorizes and authenticates all users and computers in a window
domain network, ensuring the security of the computer and software. Through
active directory various functions can be managed like creating admin users,
connecting to printers or external hard drives.
4) What is DNS?
DNS mean Domain Naming Service and it is used for resolving IP addresses to name
and names to IP address. DNS is like a translator for computers, computers
understand the number and not the alphabet. For example, if we type like
hotmail.com, the computer dont understand this so they use DNS which converts
(hotmail.com) into (numbers) and then executes the command.
8) What would you use to connect two computers without using switches?
Cross cables are used to connect two computers without using switches.
9) What is a domain?
Domain is a set of computers which network recognizes by the internet. It can be
used by centrally administer computers. It is created when you install active
directory.
10) Tell me if your system is infected by a virus how you will recover the data?
You need to re-install another system, latest anti-virus software and an O.S with
latest patches. Before you start your system, connect the infected HDD as a
secondary drive then scan and clean the infected hard drive. Once done, you can
copy the files into the system.
26) What is the difference between DC (Domain controller) and ADC ( Additional
Domain Controller)?
There is one difference between domain controller and additional domain controller,
on DC all five operational roles are available while in ADC only three operational role
is available.
27) What are the operational roles for DC (Domain controller) and ADC ( Additional
Domain Controller)?
Operational roles for DC (Domain controller) are:
Domain Naming Master
Schema Master
RID Master
PDC Emulator
Infrastructure Master
Domain partition
36) What is the major difference you can mention about Gateway and Router?
Gateway works on different network architecture and router works on same network
architecture.
39) How many classes are there for IP addresses and what are the ranges?
They are segregated into five classes:
Class A ===
Class B ====
128- 191
Class C ====
192-223
42) What is the difference between incremental backup and differential backup?
Differential backups will select only files that are changed since the last backup.
Incremental backups will select only the data that has changed since the last
backup.
Example, On Sunday you do a backup of a 5 text file each of 40 MB. Total backup
size will be 200MB
On Monday you change 2 lines in just ONE of the text file.
Under Differential backup, only the changed text file will be backed up. Total backup
size will be 40MB
Under Incremental backup, only the data corresponding to the 2 lines will be backed
up. Total backup size will be just in bytes.
44) What is the difference between the MSI file and .EXE file?
MSI (Microsoft Installer) allows install, uninstall and repair the program with a single
file, while .EXE file needs two files to install and uninstall the software. Also,.EXE file
is able to detect the existing version of the software and give option to user to
uninstall the program while MSI will instruct the users to use the add and remove
program in control panel to remove the existing product first and then you can
install the new program.
Windows Functionalities:
Installing Windows Operating System on desktops
Managing and troubleshooting access to shared folders
Configuring and troubleshooting hardware devices and drivers
Troubleshooting system startup and user login problems
Configuring and troubleshooting remote connections
Configuring and troubleshooting Internet Explorer
Configuring and troubleshooting Outlook Express
Resolving issues related to application customization
Identifying and troubleshooting problems related to security permissions
DHCP
DNS
Scheduling tasks
A: From Windows:
Open Run, type msconfig and press Enter to open System Configuration Utility.
Select the tab labelled BOOT.INI. Click the button labelled Check All Boot Paths. A
dialog box will open detailing the location of any invalid operating system locations.
Q: What are some common sources of computer viruses and how can you prevent
being infected?
A: Some common sources are Internet downloads, email attachments, and infected
CDs/DVDs. You can use trusted anti-virus software and update it regularly. Make
sure it checks every file on the computer. Backup your system periodically in case a
major infection occurs, and be aware of all software and programs that run on your
computer. Never click a suspicious link or download a suspicious file.
Q: Describe some commonly used LAN cables. What is the maximum length of LAN
cable for proper communication?
A: There are mainly two types:
Cat 5 (Category 5 where 5 indicates twists per inch) & Cat 5e (5e indicates 5 twists
per inch per pair which leads to reduced cross talk). Both Cat 5 & 5e are UTP cables
that can support up to 100 Mbps.
Cat 6 & 6e are UTP cables that can support up to 1 Gbps.
After about 80 meters (260 feet), you will usually see a reduction in speed.
Q: Windows cannot currently check for updates; what could be the possible
reasons?
A: There could be two possible reasons:
Missing/corrupted files
Update services down
Method 1: Contact Microsoft: http://support.microsoft.com/mats/windows_update/
Method 2: Please follow the steps below:
a. Go to Run, type services.msc without quotes and press Enter.
b. Locate Windows Update.
c. Right click on Service and select Properties.
d. In Start-up type, select Enable.
e. Click Start under Service status.
f. Click OK.