You are on page 1of 16

1) What are the types of the operating system or O.S?

The two types of operating systems are:

 NOS: Network Operating System. Examples of NOS- Windows NT, 2000,2003


 SOS: Simple Operating System. Examples of SOS – Windows 95,98, ME

2) Explain about VPN server?

VPN means Virtual Private Network. It is a private communications network often used by
companies or organizations to communicate confidentially over a public network. This is
used by the mobile users in the network.

3) What is a Ping command?

Between two or more devices, to check the physical IP connectivity Ping command is used.

4) What is a “Default Gateway”?

The default gateway is the IP address of the router in the network. In any case, if the user
wants to switch on to another network, or if they cannot locate their particular network than
their query will be forwarded to the default gateway.

5) What is the major difference you can mention about Gateway and Router?

Gateway works on different network architecture and router works on the same network
architecture.

6) How many classes are there for “IP addresses” and what are the ranges?

They are segregated into five classes

1. Class A === 0 -126 ( 127 is reserved for loop back)


2. Class B ==== 128- 191
3. Class C ==== 192-223
4. Class D ==== 224-239
5. Class E ==== 240-255

7) What is the difference between server OS and desktop OS?

Server OS gives centralized administration for users, shared resources and security while
desktop OS offers access to only local administration.
8) What is the difference between the MSI file and .EXE file?

MSI (Microsoft Installer) allows install, uninstall and repair the program with a single file,
while .EXE file needs two files to install and uninstall the software. Also, .EXE file is able to
detect the existing version of the software and give an option to user to uninstall the
program while MSI will instruct the users to use the add and remove program in the control
panel to remove the existing product first and then you can install the new program.

9) What is BSOD? How do you troubleshoot it?

BSOD stands for the Blue Screen Of Death. When there is some fault in OS or hardware,
then Windows can’t run the program and gives a blue screen with a code. To resolve this
problem the best way is to reboot the system. If it doesn’t work than boot the system in the
safe mode.

10) What is the SMTP server or POP server?

POP stands for post office protocol. It is basically used for sending and receiving the mail.

SMTP stands for simple mail transfer protocol. It is used for mail receiving purpose in the
network.

11) What is “Bootloader”?


Bootloader facilitates the loading of the operating system on the system. It enables the
booting process and gives the OS option to the users while starting the system.

12) How can you take a backup of emails in MS Outlook?

To take a back-up in the ms outlook, you have to go in the control panel. In the control
panel, you have to go under mail option and then open the data file, select personal folder
and click on open folder. After that, you have to copy .pst and have to paste it wherever
you want the backup.

13) What is the operating system?

Operating system acts as an interpreter between computer application and hardware. It


works as a user interface.
14) What is the IPCONFIG command?
IPCONFIG command is used to display the IP information of the computer assigned like
DNS IP address and gateway IP address.

15) What is DNS?

DNS means Domain Naming Service, and it is used for resolving IP addresses to name and
names to IP address. DNS is like a translator for computers, computers understand the
number and not the alphabet. For example, if we type like hotmail.com, the computer
doesn’t understand this, so they use DNS which converts (hotmail.com) into (numbers) and
then executes the command.

16 )What Are Rj45 And Rj11 Connectors?

RJ45 connectors are used for LAN/Ethernet connections and RJ11 connectors are
used for Telephone Cable connections.

17) What Is The Difference Between Fat32 And Ntfs File Systems?
Answer :
o NTFS allows compression and file encryption. FAT32 does not.
o NTFS is more secure than FAT32

18) You Have Norton 360. When The Firewall Is Turned On, You Are Unable To
Browse The Internet. But If You Turn Off The Firewall, You Are Able To Browse.
What Is The First Thing You Would Do To Fix This Problem?
Answer :
Reconfigure Norton Firewall to allow Internet Explorer to access the internet.
19) Some Functions Of Bios:

o Performs a POST (PowerOn Self Test) for all the different


Hardware Components in the System to make sure everything is working
properly.
o Activating other BIOS Chips on different cards installed in the computer, for
example, SCSI and Graphics Cards.
o Provides a set of lowlevel suiting that the Operating System uses to interface
different Hardware devices.
o BIOS manages things in your computer like the Keyboard, Monitor, Serial and
Parallel Ports especially when the computer is Booting up.
o Manage the settings for Harddisk drives, System Clock etc.

20). Sequence Of Things Done By The Bios When You Turn On Your Computer:

o Check the CMOS for Custom Settings.


o Load the interrupt Handlers and Device Drivers.
o Initialize Registers and Power Management.
o Perform POST (Power On Self Test).
o Display System Settings.
o Determine which devices are Bootable.
o Initialize the Bootstrap sequence.

21) A User Calls And Says That Whenever He Starts His Computer, It Boots Up
Only In Safe Mode. There Is No Other Error Message. What Would You Do To Fix
This Problem?

Go to Msconfig and select Normal Mode and Restart the Computer.

22). What Does The Term Uac Stand For?

UAC stands for User Access Control. For more information read this article.

23) A Customer Calls And Says He Is Unable To Get Online. He Uses A Cable
Connection To Connect To The Internet On A Windows Xp Computer. You Ping
127.0.0.1 On His Computer And Get The Results That All The Packets Are Lost.
What Should You Do Next?

Rebuild the TCP/IP Stack in the users computer


24. After Restarting Your Windows Xp (professional) Computer, Your Monitor
Shows A Blank, Blue Screen. You Remember That A New Video Driver Was Just
Installed. What Would Be The Best Way To Fix This Problem?

Restart the Computer, Keep tapping on the F8 Key to go to the Windows Advanced
Options Menu and select the option “Last Known Good Configuration” and hit the key.

25. What Is Chipset? How Is It Different From Processor And MotherboardChipset


is one of the processing devices in a computer. It is a number of integrated circuits,
designed to control how information travels between other components and processor.
It is a group of microchip to work as a unit to perform one or more related functions.
While motherboard is where all other components like CPU, Memory, Sockets for
external connectors and drives are attached. Chipset is a built in feature of otherboard.
While, processor is a main integrated circuit block, which does the function according to
the instruction of a computer program. It is based on the logical, arithmetical and
input/output of the system.

26. What Is The Blue Screen Of Death (bsod)?

A Blue Screen of Death (or just a Blue Screen Error) is an indication of a Critical System
Problem wherein the Computer freezes altogether and does not respond to anything.To
rectify this problem, try Restarting the computer or Booting into Safe Mode.

27 .Lights on a Modem / LAN Card:


Generally, there are 04 lights. They indicate the following:
1. Power Light: Shows if the device (Modem)is getting Power Supply or not.
2. Link Light: Indicates if the device is getting broadband/internet signals properly from
the ISP
3. Data Light: Indicates wether the internet is working or not.
4. Connectivity Light: Indicates the Modem is connected to a PC or not.

28. What Is Meant By Malware?

:
o A is software used or created to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
o It can appear in the form of code, scripts, active content, and other software.
o Malware' is a general term used to refer to a variety of forms of hostile,
intrusive, or annoying software

29. What Are The Types Of Malware?


Answer :
Types of Malware :
o Viruses
o Trojan horses
o Worms
o Spyware
o Zombie
o Phishing
o Spam
o Adware
o Ransomware

30. What Is Phishing?


Answer :
Phishing :
• Phishing (pronounced like the word 'fishing') is a message that tries to trick you into
providing information like your social security number or bank account information or
logon and password for a web site.
• The message may claim that if you do not click on the link in the message and log
onto a financial web site that your account will be blocked, or some other disaster

31. . What Is Spam?


Answer :
Spam :
o Spam is email that you did not request and do not want.
o One person's spam is another's useful newsletter or sale ad.
o Spam is a common way to spread viruses, trojans, and the like.

32. What Is Adware?

o Adware (short for advertising-supported software) is a type of malware that


automatically delivers advertisements.
o Common examples of adware include pop-up ads on websites and
advertisements that are displayed by software.
o Often times software and applications offer “free” versions that come bundled
with adware.

33. Name Five Anti Virus softwares ?

o Norton Antivirus.
o AVG.
o Kaspersky.
o Avast.
o PC-Cilin.
o McAffee.
o Avira.

OBJECTIVE TYPE

1) What is the use of firewall in the computer ?

Ans : For security

A. For Data Transmission


B. For Authentication
C. For Monitoring
D. For security

2) The Extension of MS Access Database is :

Ans : .mdb

A. .Md
B. .Mad
C. .mdb
D. .mac
3) A terabyte represents about ?

Ans : 1 Trillion bytes

A. 1 billion bytes
B. 1 Trillion bytes
C. 1 quadrillion bytes
D. 1 million bytes

4) A device which connects multiple nodes to the network is ?

Ans : A hub

A. A repeater
B. A Router
C. A Hub
D. A Modem

5) The out put of the printer is known as ?

Ans : Hard Copy

A. Hard Copy
B. Print out
C. Photocopy
D. Soft copy

6) The length of IP address is ?

Ans : 32 bits

A. 16 bits
B. 32 bits
C. 64 bits
D. 16 bits

7)What is the full form of WI-FI

Ans – Wireless Fidelity

A. Wired Fidelity
B. Wireless Focus
C. Wired Focus
D. Wireless Fidelity
8) What is the Full form of TCP ?

Ans : Transmission control protocol

A. Transmission Centric protocol


B. Transfer Control process
C. Transmission control process
D. Transmission control protocol

9) How many versions of Windows 8 pc have been released ?

Ans : 3

A. 5
B. 2
C. 3
D. 4

10)Which one of the following is internet protocol ?

Ans : TCP/IP

A. PCT / PI
B. TCP / IP
C. ITTT
D. Y25

11) Which of the following protocol is used to access webpage on world wide web ?

Ans : HTTP

A. TCP /IP
B. Gopher
C. HTML
D. HTTP

12) What is the officical Twitter Birds Name ?

Ans : Larry

A. Chip
B. Larry
C. Birdy
D. Tweety
13) Data is permenatly stored in ?

Ans : Hard Disk

A. RAM
B. Cache Memory
C. Hard Disk
D. Printer

14) The Microphone converts the sound into ?

Ans : Electric Signals

A. Software
B. Soundwaves
C. Electrical Signals
D. GUI

15) 3. Internet access by transmitting digital data over the wires of a local telephone network is
provided by

Ans : digital subscriber link

a leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned

16) ISP exchanges internet traffic between their networks by


Ans : internet exchange point
a) internet exchange point
b) subscriber end point
c) isp end point
d) none of the mentioned

17) 6. IPv6 addressed have a size of


a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits

18) Which protocol assigns IP address to the client connected in the internet?
a) DHCP
b) IP
c) RPC
d) none of the mentioned

19. Which one of the following is not used in media access control?

a) ethernet

b) digital subscriber line

c) fiber distributed data interface

d) none of the mentioned

20 What is Wired Equivalent Privacy (WEP) ?

a) security algorithm for ethernet

b) security algorithm for wireless networks

c) security algorithm for usb communication

d) none of the mentioned

21. What is WPA?

a) wi-fi protected access

b) wired protected access

c) wired process access

d) wi-fi process access

22. It is a small piece of text stored on a user's computer by a web browser for maintaining
the state. What we are talking about?
Ans : Cookie

a)Cache
b)Cookie
c)Data
d) bits

23. A network that covers small geographic or group or single of building is called
Ans : LAN

a)LAN
b)Bridge
c)WAN
d)Gateway

24. What are the steps to upgrade a 32-bit version to a 64-bit version of windows?
Ans : It cannot be up upgraded

a) Run a windows update system


b) Download files from Microsoft website and run
c) Run a system restore setup and replace files
d) It cannot be upgraded

25. Volatile memory is


Ans : RAM

a) ROM
b) Cache Memory
c) PROM
d) RAM

26. Which of the following is an email client ?


ANS : Outlook express

a) Oulook express
b) Mozilla Fire Fox
c) Yahoo
d) Google

27. What is PDF ?


ANS : Portable Document Format

a) Printed Document Format


b) Public Document Format
c) Portable Document Format
d) Published Document Format

28. .gif is an extension of Which type of file ?


ANS : Image

a) Audio
b) Word
c) Image
d) Video

29. Arithmentic Logic unit(ALU) can do :


ANS : Both of these

a) Both of these
b) Mathematical Operations
c) Logical operations

30. A fibre- Optic cable consists of tubes of


ANS : Glass
a) Mirror
b) Wooden
c) Glass
d) Rubber

31) What is the name of the new built – In Browser includes windows 10 ??
Ans : Edge

a) Edge
b) Cortana
c) Super IE Pro
d) Opera

32) 1. Which malicious program cannot do anything until actions are taken to activate the file
attached by the malware.
Ans : Virus

 A. Trojan Horse

 B. Worm

 C. Virus

 D. Bots

33) What is Spyware?


ANS : D
 A. Spyware is a type of malware installed on computers that collects information about
users without their knowledge

 B. The presence of spyware is typically hidden from the user and can be difficult to
detect

 C. Spyware programs lurk on your computer to steal important information, like your
passwords and logins and other personal identification information and then send it off to
someone else

 D. All of the above

34) . What are the types of malware?

Ans : Worms

 A. Caterpillars

 B. Worms

 C. Lions

 D. Horses

35) What is Trojan Horse?


Ans : All of the Above

 A. A Trojan Horse program has the appearance of having a useful and desired function

 B. A Trojan Horse neither replicates nor copies itself, but causes damage or
compromises the security of the computer

 C. A Trojan Horse must be sent by someone or carried by another program and may
arrive in the form of a joke program or software of some sort

 D. All of the above


36) Whichmalicious program cannot do anything until actions
are taken to activate the file attached by the malware.

Trojan Horse

Worm

Virus

Bots

37) Which method is NOT a sufficient way to prevent malware


attacks?
Ans : Having firewall on
a) Using and updating legitimate security software and performing daily scans.
b) Having your firewall on.
c) Never use an electronic device.
38) Worms can spread and harm independently.
Ans : True

a) True
b) False

38) When you pay the creator of the ransomware that currently
infects your computer you are guaranteed to get your computer
Ans : False
a) True
b) False

39) Websitesuse to verify users as human and prevent


malicious bot attacks.
ANS : CAPTCHA
a) CAPTCHA
b) Cookie
c) BOT
d) DOT
40) Whichoption below is a sign that suggests the email you
received from your bank is possibly forged and an attempt at
phishing?

The domain name of the email sender corresponds with the bank name. (e.g. td bank: ...@td.com)

URL of the bank provided in the email.

The email contains spelling and grammar mistakes.

You see your full name and your postal address in the email, information you provided when you
registered for your online banking account 2 years ago.

You might also like