Professional Documents
Culture Documents
VPN means Virtual Private Network. It is a private communications network often used by
companies or organizations to communicate confidentially over a public network. This is
used by the mobile users in the network.
Between two or more devices, to check the physical IP connectivity Ping command is used.
The default gateway is the IP address of the router in the network. In any case, if the user
wants to switch on to another network, or if they cannot locate their particular network than
their query will be forwarded to the default gateway.
5) What is the major difference you can mention about Gateway and Router?
Gateway works on different network architecture and router works on the same network
architecture.
6) How many classes are there for “IP addresses” and what are the ranges?
Server OS gives centralized administration for users, shared resources and security while
desktop OS offers access to only local administration.
8) What is the difference between the MSI file and .EXE file?
MSI (Microsoft Installer) allows install, uninstall and repair the program with a single file,
while .EXE file needs two files to install and uninstall the software. Also, .EXE file is able to
detect the existing version of the software and give an option to user to uninstall the
program while MSI will instruct the users to use the add and remove program in the control
panel to remove the existing product first and then you can install the new program.
BSOD stands for the Blue Screen Of Death. When there is some fault in OS or hardware,
then Windows can’t run the program and gives a blue screen with a code. To resolve this
problem the best way is to reboot the system. If it doesn’t work than boot the system in the
safe mode.
POP stands for post office protocol. It is basically used for sending and receiving the mail.
SMTP stands for simple mail transfer protocol. It is used for mail receiving purpose in the
network.
To take a back-up in the ms outlook, you have to go in the control panel. In the control
panel, you have to go under mail option and then open the data file, select personal folder
and click on open folder. After that, you have to copy .pst and have to paste it wherever
you want the backup.
DNS means Domain Naming Service, and it is used for resolving IP addresses to name and
names to IP address. DNS is like a translator for computers, computers understand the
number and not the alphabet. For example, if we type like hotmail.com, the computer
doesn’t understand this, so they use DNS which converts (hotmail.com) into (numbers) and
then executes the command.
RJ45 connectors are used for LAN/Ethernet connections and RJ11 connectors are
used for Telephone Cable connections.
17) What Is The Difference Between Fat32 And Ntfs File Systems?
Answer :
o NTFS allows compression and file encryption. FAT32 does not.
o NTFS is more secure than FAT32
18) You Have Norton 360. When The Firewall Is Turned On, You Are Unable To
Browse The Internet. But If You Turn Off The Firewall, You Are Able To Browse.
What Is The First Thing You Would Do To Fix This Problem?
Answer :
Reconfigure Norton Firewall to allow Internet Explorer to access the internet.
19) Some Functions Of Bios:
20). Sequence Of Things Done By The Bios When You Turn On Your Computer:
21) A User Calls And Says That Whenever He Starts His Computer, It Boots Up
Only In Safe Mode. There Is No Other Error Message. What Would You Do To Fix
This Problem?
UAC stands for User Access Control. For more information read this article.
23) A Customer Calls And Says He Is Unable To Get Online. He Uses A Cable
Connection To Connect To The Internet On A Windows Xp Computer. You Ping
127.0.0.1 On His Computer And Get The Results That All The Packets Are Lost.
What Should You Do Next?
Restart the Computer, Keep tapping on the F8 Key to go to the Windows Advanced
Options Menu and select the option “Last Known Good Configuration” and hit the key.
A Blue Screen of Death (or just a Blue Screen Error) is an indication of a Critical System
Problem wherein the Computer freezes altogether and does not respond to anything.To
rectify this problem, try Restarting the computer or Booting into Safe Mode.
:
o A is software used or created to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
o It can appear in the form of code, scripts, active content, and other software.
o Malware' is a general term used to refer to a variety of forms of hostile,
intrusive, or annoying software
o Norton Antivirus.
o AVG.
o Kaspersky.
o Avast.
o PC-Cilin.
o McAffee.
o Avira.
OBJECTIVE TYPE
Ans : .mdb
A. .Md
B. .Mad
C. .mdb
D. .mac
3) A terabyte represents about ?
A. 1 billion bytes
B. 1 Trillion bytes
C. 1 quadrillion bytes
D. 1 million bytes
Ans : A hub
A. A repeater
B. A Router
C. A Hub
D. A Modem
A. Hard Copy
B. Print out
C. Photocopy
D. Soft copy
Ans : 32 bits
A. 16 bits
B. 32 bits
C. 64 bits
D. 16 bits
A. Wired Fidelity
B. Wireless Focus
C. Wired Focus
D. Wireless Fidelity
8) What is the Full form of TCP ?
Ans : 3
A. 5
B. 2
C. 3
D. 4
Ans : TCP/IP
A. PCT / PI
B. TCP / IP
C. ITTT
D. Y25
11) Which of the following protocol is used to access webpage on world wide web ?
Ans : HTTP
A. TCP /IP
B. Gopher
C. HTML
D. HTTP
Ans : Larry
A. Chip
B. Larry
C. Birdy
D. Tweety
13) Data is permenatly stored in ?
A. RAM
B. Cache Memory
C. Hard Disk
D. Printer
A. Software
B. Soundwaves
C. Electrical Signals
D. GUI
15) 3. Internet access by transmitting digital data over the wires of a local telephone network is
provided by
a leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned
18) Which protocol assigns IP address to the client connected in the internet?
a) DHCP
b) IP
c) RPC
d) none of the mentioned
19. Which one of the following is not used in media access control?
a) ethernet
22. It is a small piece of text stored on a user's computer by a web browser for maintaining
the state. What we are talking about?
Ans : Cookie
a)Cache
b)Cookie
c)Data
d) bits
23. A network that covers small geographic or group or single of building is called
Ans : LAN
a)LAN
b)Bridge
c)WAN
d)Gateway
24. What are the steps to upgrade a 32-bit version to a 64-bit version of windows?
Ans : It cannot be up upgraded
a) ROM
b) Cache Memory
c) PROM
d) RAM
a) Oulook express
b) Mozilla Fire Fox
c) Yahoo
d) Google
a) Audio
b) Word
c) Image
d) Video
a) Both of these
b) Mathematical Operations
c) Logical operations
31) What is the name of the new built – In Browser includes windows 10 ??
Ans : Edge
a) Edge
b) Cortana
c) Super IE Pro
d) Opera
32) 1. Which malicious program cannot do anything until actions are taken to activate the file
attached by the malware.
Ans : Virus
A. Trojan Horse
B. Worm
C. Virus
D. Bots
B. The presence of spyware is typically hidden from the user and can be difficult to
detect
C. Spyware programs lurk on your computer to steal important information, like your
passwords and logins and other personal identification information and then send it off to
someone else
Ans : Worms
A. Caterpillars
B. Worms
C. Lions
D. Horses
A. A Trojan Horse program has the appearance of having a useful and desired function
B. A Trojan Horse neither replicates nor copies itself, but causes damage or
compromises the security of the computer
C. A Trojan Horse must be sent by someone or carried by another program and may
arrive in the form of a joke program or software of some sort
Trojan Horse
Worm
Virus
Bots
a) True
b) False
38) When you pay the creator of the ransomware that currently
infects your computer you are guaranteed to get your computer
Ans : False
a) True
b) False
The domain name of the email sender corresponds with the bank name. (e.g. td bank: ...@td.com)
You see your full name and your postal address in the email, information you provided when you
registered for your online banking account 2 years ago.