Você está na página 1de 20

1.

What is bus speed? Ans : The paths or lines on the motherboard on which data, instructions and electrical power move from Mother board to other component. The speed or frequency at which the data on the motherboard is moving. 2. What is ROM? Ans : Read-Only Memory or ROM is an integrated-circuit memory chip that contains configuration data. ROM is commonly called firmware because its programming is fully embedded into the ROM chip. As such, ROM is a hardware and software in one. 3. Uses of BIOS/ CMOS Ans : BIOS ( Basic input/output system ) Firmware that can control much of a computer's input/output functions, such as communications with the floppy drive and the monitor. Also called ROM BIOS. CMOS ( Complementary Metal-Oxide Semiconductor ) One of the technologies used to manufacture microchips , CMOS chips require less electricity, hold data longer after the electricity is turned off, are lower and produce less heat 4. What are the uses of RAM.? Ans : It is the work table of the computer. It is a primary memory.

5. Types of RAM ? (Explain its family) Ans : 2. 1. SDRAM (Synchronous DRAM) : SDRAM is 168-pin RAM, and runs at speeds ranging from 66MHz to 133MHz DDR (Double Data Rate SDRAM) DDR 1 RAM : It is faster then SDRAM. 84-pin module DDR RAM completes two per memory clock cycle. data transfers

DDR 2 RAM : It is more faster then DDR1 Its a 240-pin module , DR2 RAM completes four data transfers per memory clock cycle DDR 3 RAM : It is a 240-pin module, It is twice as fast as DDR2 RAM. 6. Can Two RAMs of different clock speed but of same family can used together? Explain.

Ans : YES two Rams of different frequency can work together. But it runs at the same frequency which both supports. 7. Difference between ROM and RAM. Explain.

Ans : Both RAM and ROM provide the user random access to stored data. However, RAM provides only short-term memory since data stored in RAM is lost when power is turned off. ROM, on the other hand, provides long-term storage since data is permanently embedded into the ROM chip. One other difference between the two is that RAM's data can frequently and speedily be altered and changed at will. ROM cannot be reconfigured at all. 8. What is IDE? Ans : IDE (Integrated Drive Electronics) - A hard drive whose disk controller is integrated into the drive eliminating the need for a controller cable and thus increasing speed as well as reducing price.

9. What is a parallel Port, Serial Port.? Explain its uses. Ans : parallel port - A female 25-pin port on a computer that can transmit data in parallel, 8 bits at a time and is usually used with a printer. serial port - A male 9-pin or 25-pin port on a computer system used by slower I/O devices such as a mouse or modem. Data travels serially, one bit at a time through the port. 10. What are Primary MASTER and Secondary Master IDE ports in a Mother Board? Ans : Primary Master are hard disk drives and the secondary master are CO-Rom and floppy disk. 11. How many devices can you connect in the above said ports. Explain the procedures. Ans : Totally of 4 devices can be connected to the IDE Ports Primary Master can connect in to 2 devices as Primary Master and Primary Slave. Secondary Master can connect to 2 devices as Secondary Master and Secondary Slave. 12. What are P/S 2 ports and its uses? Ans : A type of port used for connecting a mouse or keyboard to a PC. The PS/2 port supports a mini DIN plug containing just 6 pins. Most PCs have a PS/2 port so that the serial port can be used by another device, such as a modem. The PS/2 port is often called the mouse port. 13. What is the need for PCI slots? Ans : PCI slots is used to connect the external additional devices such as Graphics Card, Sound Card , Network Card , Modem Card 14. What is a data cable and how many pins does it have? Ans : A data cable is any media that allows baseband transmissions (binary 1,0's) from a ( transmitter to a receiver ) Mother board to Other devices like Hard disk , CD-Rom. It has 40 Pins in normal IDE cable. 15. What is a power Good signal and what are its uses? Ans : power supplies also provide a signal called the Power-Good signal, sometimes written as Power_OK or Power_Good. Its purpose is to tell the computer all is well with the power supply and that the computer can continue to operate normally. 16. What is a VGA port and its uses? Ans : A VGA Connector is the most common port on any computer. It connects any standard monitor to the CPU or you can use this port on your laptop to connect an external monitor. It is also commonly known as RGB Connector, D Sub 15, mini sub D15 and mini D15 as it consist of a total of 15 pins in three rows. They are used for Display Devices. 17. What is an off board devices? Give some example Ans : Off board devices are the externally connected devices, that are connected to the system. Example Cd-Rom,

18. How do you reset BIOS Password in Mother Board? Ans : Remove the Battery in the mother board and keep it after a few seconds.

19. What is a graphics accelerator Card?

Ans : A type of video adapter that contains its own processor to boost performance levels. These processors are specialized for computing graphical transformations 20. What are the types of HARD DISK used? Which would you suggest for Higher end Machines Ans : Types of HDD : IDE : Integrated Drive Electronics. IDE drives are also known as PATA drives( Parallel advance technology attachment ) , have usually 40 pins. SATA : Serial advance technology attachment , have usually 7 pins, 4 pins in pair of two for sending and receiving data and rest 3 pins are grounded SCSI : Small Computer System Interface. SCSI is pronounced as skuzzy, have usually 50 to 68 pins SAS : Serial Attached SCSI ( External )

1. 2. 3. 4.

SCSI is used for Most Higher end Machines 21. What is cache? Explain its uses A cache is a block of RAM used for temporary storage of data that is likely to be used again. The CPU and hard drive frequently use a cache, as do web browsers. In a CPU there can be several caches, to speed up instructions in loops or to store often accessed data. These caches are small but very fast. Reading data from cache memory is much faster than reading it from RAM. 22. What is an USB port? (Explain two types of USB devices) A USB port is a standard cable connection interface on personal computers and consumer electronics. USB ports allow stand-alone electronic devices to be connected via cables to a computer (or to each other). A few different types of physical layouts exist for USB ports. The standard layout for computers, called USBB, is a rectangular connection point approximately 1.4 cm (9/16 in) length by 0.65 cm (1/4 in) height. Printers and some other devices may use smaller types of USB ports including a standard called USB-A. To connect a device having USB-B ports to a device with another type, simply use the correct type of cable with appropriate interfaces on each end. 23. What is a NIC? Explain its uses. (Network Interface Card) .In computer networking, a NIC provides the hardware interface between a computer and a network. A NIC technically is network adapter hardware in the form factor of an add-in card such as a PCI or PCMCIA card. Most NIC support either wired Ethernet or WiFi wireless standards. Ethernet NIC plug into the system bus of the PC and include jacks for network cables, while WiFi NIC contain built-in transmitters / receivers 24. Explain Ethernet frames. Ethernet is a physical and data link layer technology for local area networks (LANs). Ethernet was invented by engineer Robert Metcalfe. Data travels over Ethernet inside protocol units called frames. 25. Explain LAN and WAN A local area network (LAN) supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, games or other applications. A LAN in turn often connects to other LANs, and to the Internet or other WAN. A WAN spans a large geographic area, such as a state, province or country. WANs often connect multiple smaller networks, such as local area networks (LANs) or metro area networks (MAN). WANs generally utilize different and much more expensive networking equipment than do LANs.

26. What is a Router, Switch and a Hub Explain the difference? Routers are physical devices that join multiple wired or wireless networks together. A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). In computer networking, A hub is a small, simple, inexpensive device that joins multiple computers together A router is a more sophisticated network device than either a switch or a hub. Like hubs and switches, network routers are typically small, box-like pieces of equipment that multiple computers can connect to. Each feature a number of "ports" the front or back that provide the connection points for these computers, a connection for electric power, and a number of LED lights to display device status. While routers, hubs and switches all share similar physical appearance, routers differ substantially in their inner workings. 27. What is a patch cable? A patch cable connects two network devices. Patch cables are typically CAT5 / CAT5e Ethernet cables linking a computer to a nearby network hub, switch or router. 28. What is a NON DOS partition? Give example. When using Microsoft fdisk a NON-DOS partition indicates a partition that is not native to the Microsoft operating system. For example, this could be a Linux partition. 29. What is a MBR (Master Boot record) Short for Master Boot Record, MBR is also sometimes referred to as the master boot block and is the first sector of the computer hard disk drive used to determine what partition a computer will boot 30. What is a partition Table, File allocation Table? Partition can be considered as a piece of disk space, which is marked thereby, runs on some operating system. Partition table is located at the first sector (cylinder 0, head 0 and sector 1, MBR) of each hard disk. It memorizes information about sizes and locations of partitions on hard disk. File Allocation Table or FAT is a computer file system architecture now widely used on most computer systems and most memory cards, such as those used with digital cameras. 31. What is paging? Explain its uses. The movement of pages between auxiliary storage slots and central storage frames is called paging. Paging is key to understanding the use of virtual storage in z/OS. The main advantage of paging is that it allows the physical address space of a process to be noncontiguous. Prior to paging, systems had to fit whole programs into storage contiguously which caused various storage and fragmentation problems 32. What is Boot.ini? Boot.ini is one of the very first files that come into play when a Windows XP system is started up. It is a plain text file that is kept in the system root, so it is usually C:\boot.ini. Because it is an essential system file, the attributes are set to hidden, system, read-only to protect it. 33. What is an internal Command and External Command? A command that is stored in the system memory and loaded from the command.com Eg- assoc, break, call A MS-DOS command that is not included in command.com. External commands are commonly external either because they require large requirements and/or are not commonly used commands. Eg: append, Arp, assign. 34. Explain Path and explain how to set or add an additional path to existing path. In a network, a path is a route between any two points or node. 35. What are Environmental variable and its uses? Procedures to add a New Variable.

Environment variables are a set of dynamic named values that can affect the way running processes will behave on a compute Procedure to add environmental variables: 1. 2. 3. 4. Right-click 'My Computer' and select 'Properties' Click the 'Advanced' tab, then 'Environment Variables'. This opens the Environment Variables dialog. In the top 'User variables for ' pane, select 'PATH' and click 'Edit'. If there is no 'PATH' variable, click on 'New' to create it. Add this to the beginning of the 'Variable value' field: C:\perl\bin; 5. Click 'Ok' to close each open dialog

36. What is an IRQ? Give some devices that raise IRQ The computing phrase "interrupt request" (or IRQ) is used to refer to either the act of interrupting the bus lines used to signal an interrupt, or the interrupt input lines on a Programmable Interrupt Controller (PIC). Eg- keyboard, mouse, LAN card. 37. What are the three methods of installing a NEW OS over an existing OS? Explain in Details 38. What are the type cables (Category and Speed) used for Networking commonly. There are three types of cable they are category5 (cat 5), category 5e (cat 5e), category6 (cat 6). Cat5 is rigid, more flexible and most likely to be used as patch cable. It can support 10 or 100 mbps Cat5e is an enhanced version can handle up to 1000mbps it is suitable for gigabit Ethernet and experiences much lower levels of near- end crosstalk than cat5 Cat6 has twice the bandwidth of cat5.It is ideal for supporting 10 gigabit Ethernet and it is also backward compatible. 39. What are primary, extended and logical partitions? A primary partition contains one file system. In MS-DOS and earlier versions of Microsoft Windows systems, the first partition (C :) must be a primary partition. Some operating systems are not limited in this way; however, this can depend on other factors, such as a PC's BIOS The primary partition thus subdivided is the extended partition; the sub partitions are logical partitions. They behave like primary [1] partitions, but are created differently. There is no speed difference between them. An extended partition is a primary partition which contains secondary partition(s). A hard disk may contain only one extended partition; which can then be sub-divided into logical drives, each of which is (under DOS and Windows) assigned additional drive letters. 40. What are the three methods of creating LAN Cable in Networking? Explain each When creating a straight cable, both ends should be exactly the same when held together side-by-side with the clips facing down. For a crossover cable, one end should be wired according to the 568A standard, and the other according to the 568B standard.

41) Classes in TCP/IP. --1 - 126 [127 is used for loop back] 128 - 191 192 223 42) Disk partitioning - FAT, FAT32, NTFS? Disk partitioning is the act or practice of dividing the storage space of a hard disk drive into separate data areas Known as partitions. FAT - is a file system that was created by Microsoft in 1977 43) Multi-boot Multi Boot is the act of installing multiple operating systems on a computer, and being able to choose which one to boot when switching on the computer power. The program which makes multi-booting possible is called a boot loader. Dual boot: Usually dual-booting, but more than two OSes can be booted from the same computer 44) RAID: RAID is an acronym to describe a Redundant Array of Inexpensive Disks, a technology that allowed computer users to achieve high levels of storage reliability from low-cost and less reliable PC-class disk-drive components, via the technique of arranging the devices into arrays for redundancy. RAID" is now used as an umbrella term for computer data storage schemes that can divide and replicate data among multiple hard disk drives. The different schemes/architectures are named by the word RAID followed by a number, as in RAID 0, RAID 1, etc. RAID's various designs involve two key design goals: increase data reliability and/or increase input/output performance. 45) RAW device: In computing, specifically Unix-like operating systems, a raw device is a special kind of block device file that allows accessing a storage device such as a hard drive directly, bypassing the operating system's caches and buffers (although the hardware caches might still be used). Applications like a Database management system can use raw devices directly, enabling them to manage how data is cached, rather than deferring this task to the operating system. 46) i) Cylinder: A cylinder comprises the same track number but spans all such tracks across each platter surface that is able to store data (without regard to whether or not the track is "bad"). Thus, it is a three-dimensional object. Any track that comprises the same cylinder can be written to and read from while the actuator assembly remains stationary. One way drive makers have been able to increase drive speed is by increasing the number of platters that can be read at a given time.

ii) Track: The tracks are the thin concentric circular strips on a floppy medium or platter surface which actually contain the magnetic regions of data written to a disk drive. They form a circle and are (therefore) two-dimensional. At least one head is required to read a single track. iii) Sector: A sector can be thought of as a wedge-shaped area of a disk, as shown in the diagram. This conceptualization works well when thinking about CHS numbering. The term sector, however, is more often used as a synonym for block. Registry may refer to

47) Registry: Windows Registry, a database of configuration settings in Microsoft Windows operating systems The Windows Registry is a database that stores settings and options for Microsoft Windows operating systems. It contains information and settings for hardware, operating system software, most non-operating system software, and per-user settings. The registry also provides a window into the operation of the kernel, exposing runtime information such as performance counters and currently active hardware. 48) Boot.ini: boot.ini, which contains configuration options for a boot menu.Boot.ini is protected from user configuration by having the following file attributes: system, hidden, read-only. To make it editable, you must first unlock it with the following command under a console attrib -s -h -r boot.ini. A more secure fashion to edit the file is to use the bootcfg command from a console. bootcfg will also relock the file (setting the file back to system, hidden and read-only).. 50) Services: Windows services is a long-running executable that performs specific functions and which is designed not to require user intervention. Windows services can be configured to start when the operating system is booted and run in the background as long as Windows is running, or they can be started manually when required. Windows Control Panel Administrative Tools or typing "Services.msc" in the Run command on Start menu. The "Services" management console provides a brief description of the service functions and displays the path to the service executable, its current status, startup type, dependencies and the account under which the service is running.

51) Memory management

It is the act of managing computer memory. In its simpler forms, this involves providing ways to allocate portions of memory to programs at their request, and freeing it for reuse when no longer needed. The management of main memory is critical to the computer system. Virtual memory Virtual memory Systems separate the memory addresses used by a process from actual physical addresses, allowing separation of processes and increasing the effectively available amount of RAM using disk swapping. The quality of the virtual memory manager can have a big impact on overall system performance. Paging: Memory management scheme is referred to as paging. In the paging memory-management scheme, the operating system retrieves data from secondary storage in same-size blocks called pages. The main advantage of paging is that it allows the physical address space of a process to be noncontiguous. 52) Interrupt processing: The interrupt mechanism is the means for coordinating multiprogramming between an I-stream engine and the engines of a channel subsystem. An interrupt is a hardware enforced transfer of control within an I-stream engine. An interruption usually takes place after an instruction is completed and before interpretation of the next instruction is started. The logic built into z/Architecture support is enough to preserve the information necessary to return to the interrupted point of departure. Further, interrupts of the same kind are inhibited generally by the z/TPF system, at least long enough to preserve the state of the I-stream engine and to save control information and data. Ultimately, return is made to the interrupted code without loss of data.

Classes of interrupts inhibited in an I-stream engine do not prevent interrupt generating signals to be set in the device controllers and devices. These signals are essentially stacked within the channel subsystem, which presents the signals to any I-stream engine that is willing to accept the interruption. Internet Connection Firewall configuration Microsoft decided to include a basic functional firewall in Windows XP. This allows small companies and users who do not have a software or hardware firewall to be able to protect their computers. The firewall is called Internet Connection Firewall (ICF). Where do I find Internet Connection Firewall settings? Open Network Connections in the Control Panel. --> Right-click on your Local Area Connection and choose Properties. Click on the Advanced tab. --> If you check the Protect my computer and network by limiting or preventing access to this computer from the Internet. it will enable ICF.

55) To enable hibernation: 1. 2. 3. Start the Power Options control panel applet (Start - Settings - Control Panel - Power Options) Select the Hibernate tab Check the 'Enable hibernate support' box Click Apply then click OK

56) MSConfig, or Microsoft System Configuration Utility, MSConfig modifies which programs run at startup, edits certain configuration files, and simplifies controls over Windows services.

57) Roaming user profile: Roaming user profile is a concept in the Microsoft Windows NT family of operating systems that allows a user with a computer joined to a Windows Server domain to log on to any computer on the same network and access their local files and settings. Mandatory profiles: A mandatory user profile is a preconfigured, read-only roaming user profile that administrators can use to specify settings for users. With a mandatory user profile, a user can modify the desktop, but any changes made are not saved when the user logs off. The next time the user logs on, the mandatory user profile set by the administrator is downloaded. There is also a special type of mandatory profile known as a super-mandatory profile. 59) Task manager: Task manager is a program used to provide information about the processes and programs running on a computer, as well as the general status of the computer. It can also be used to terminate processes and programs, as well as change the processes' priority. 60) PST files Import and Export: It describes how to use personal storage folders, also known as .pst files, to back up data that you created in Microsoft Office Outlook 2007, Microsoft Office Outlook 2003, and Microsoft Office Outlook 2002. You can back up messages, contacts, appointments, tasks, notes, and journal entries in .pst files. Import: You can use the backup copy of your .pst file to restore your Outlook data if the original .pst file is damaged or lost. Everything that is saved in the .pst file is returned to Outlook.

Export: If you want to back up only some of your Outlook data, you can create a new backup .pst file of only the data that you want to save. This is known as exporting .pst file data. 61). POP3, SMTP, IMAP, HTTP:POP3 - (POST OFFICE PROTOCOL 3) it is a standard protocol used to access mailboxes and to download the mails to your local computer. When using the POP protocol all your email messages will be downloaded from the mail server to your local computer. You can choose to leave copies of your emails on the server as well. The advantage is that once your messages are downloaded you can cut the internet connection and read your email at your leisure without incurring further communication costs. On the other hand you might have transferred a lot of message (including spam or viruses) in which you are not at all interested at this point. STMP - (SIMPLE MAIL TRANSFER PROTOCOL) it is used by the Mail Transfer Agent (MTA) to deliver your email to the recipient's mail server. The SMTP protocol can only be used to send emails, not to receive them. IMAP - (INTERNET MESSAGING ACCESS PROTOCOL) it is a standard protocol for accessing e-mail from your local server. IMAP is a client/server protocol in which e-mail is received and held for you by your Internet server. As this requires only a small data transfer this works well even over a slow connection such as a modem. Only if you request to read a specific email message will it be downloaded from the server. You can also create and manipulate folders or mailboxes on the server, delete messages etc. HTTP - (HYPRETEXT TRANSFER PROTOCOL) it is not a protocol dedicated for email communications, but it can be used for accessing your mailbox. Also called web based email, this protocol can be used to compose or retrieve emails from your account. Hotmail is a good example of using HTTP as an email protocol. 62). IP Address:An Internet Protocol (IP) address is a numerical label that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its nodes. An IP address serves two principal functions in networking: host identification and location addressing. The Internet Protocol also has the task of routing data packets between networks, and IP addresses specify the locations of the source and destination nodes in the topology of the routing system. 63). Subnet Mask:Subnet Mask allows you to identify which part of an IP address are reserved for the network, and which part is available for host use. It is also an IP and the bits reserved for identifying the sub network. 64). Default Gateway:In computer networking, a default gateway is the device that passes traffic from the local subnet to devices on other subnets. The default gateway often connects a local network to the Internet, although internal gateways for local networks also exist.

65). TCP/IP:Transmission Control Protocol/Internet Protocol the suite of communications protocols used to connect hosts on the Internet. 66). Class A, B, C:IP are defined in their class. There are 5 classes of IPs. Class A ranges from 1.0.0.1 to 126.255.255.254. Class B ranges from 128.1.0.1 to 191.255.255.254.

Class C ranges from 192.0.1.1 to 223.255.254.254. Class D ranges from 224.0.0.0 to 239.255.255.255. Class E ranges from 240.0.0.0 to 254.255.255.254. 67). UDP:User Datagram Protocol is a set of network protocols used for the Internet. It is a part of the Internet Protocol suite, using which, programs running on different computers on a network can send short messages known as Datagrams to one another. UDP can be used in networks where TCP is traditionally used, but unlike TCP, it does not guarantee reliability or the right sequencing of data. This is due to it doesnt need any acknowledgement to send or receive data. 68). ICMP:Internet Control Message Protocol is one of the core protocols of the Internet Protocol Suite. It is chiefly used by networked computers' operating systems to send error messagesindicating, for instance, that a requested service is not available or that a host or router could not be reached. The protocol is also frequently used by Internet managers to verify correct operations of End Systems (ES) and to check that routers are correctly routing packets to the specified destination address. In simple words- this protocol is used to report problems with delivery of IP Datagrams within an IP network. 69). DHCP:Dynamic Host Configuration Protocol is a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device's IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses. In simple it is a protocol reduces system administration workload, allowing networks to add devices with little or no manual intervention. 70). DNS:Domain Name System, an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they are easier to remember. The Internet however, is really based on IP addresses. In simple it resolves the host name into IP address. For example, the domain name www.example.com might translate to 198.105.232.4.

71). WINS:Windows Name Internet Service, a system that determines the IP address associated with a particular network computer. This is called name resolution. WINS supports network client and server computers running Windows and can provide name resolution for other computers with special arrangements. 72). ipconfig /all, ipconfig /renew, ipconfig /release:ipconfig /all is syntax which display the current status of your IP, Default gateway, DNS IP, WINS IP. It shows the full configuration of your IP settings. ipconfig /renew this is used to fetch the IP from the server when the TCP/IP settings are not done. ipconfig/release this is used to release the IP address for the specified adapter. 73). Nbtstat:NBTStat is a command-line tool that is designed to help troubleshoot NetBIOS name over TCP/IP resolution problems. It displays protocol statistics and current TCP/IP connections using NetBIOS over TCP/IP (NetBT). When a network is functioning normally, NetBT resolves NetBIOS names to IP addresses. Start NBTStat from the command prompt rather than from Windows Explorer to see the resulting display.

74). Share and NTFS permissions:Access to a folder on a file server can be determined through two sets of permission entries: the share permissions set on a folder and the NTFS permissions set on the folder (which can also be set on files). Share permissions are often used for managing computers with FAT32 file systems, or other computers that do not use the NTFS file system. Share permissions and NTFS permissions are independent in the sense that neither changes the other. The final access permissions on a shared folder are determined by taking into consideration both the share permission and the NTFS permission entries. The more restrictive permissions are then applied.

75). Group Policy:Group Policy is a feature of the Microsoft Windows NT family of operating systems. Group Policy is a set of rules which control the working environment of user accounts and computer accounts. Group policy provides the centralized management and configuration of operating systems, applications and users' settings in an Active Directory environment. In other words, group policy in part controls what users can and can't do on a computer system.

76). GPMC:GPMC simplifies the management of Group Policy by making it easier to understand, deploy, manage, and troubleshoot Group Policy implementations. GPMC also enables automation of Group Policy operations via scripting. GPMC can be used to manage Windows Server 2003 as well as Windows 2000-based Group Policy implementations. Customers who have at least one valid license of Windows Server 2003 or Windows 2000 Server can obtain and use an unlimited number of copies of GPMC. Please see the End User License Agreement (EULA) provided with the GPMC software for details on licensing terms. 78). Safe mode:Safe Mode is a diagnostic mode of a computer operating system (OS). It can also refer to a mode of operation by application software. Safe mode is intended to fix most, if not all problems within an operating system. An operating system in safe mode will have reduced functionality, but the task of isolating problems is easier because many non-core components are disabled (turned off). An installation that will only boot into its safe mode typically has a major problem, such as disk corruption or the installation of poorly configured software that prevents the operating system from successfully booting into its normal operating mode. 79). Last Known Good Configuration:Last Known Good Configuration feature is a recovery option that you can use to start your computer by using the most recent settings that worked. The Last Known Good Configuration feature restores registry information and driver settings that were in effect the last time the computer started successfully. Use the Last Known Good Configuration feature when you cannot start Windows XP after you make a change to your computer, or when you suspect that a change that you just made may cause a problem. 80). Recovery Console:Recovery Console is a feature of the Windows 2000, Windows XP and Windows Server 2003 operating systems. It provides the means for administrators to perform a limited range of tasks using a command line interface. Its primary function is to enable administrators to recover from situations where Windows does not boot as far as presenting its graphical user interface.

81. System Restore System Restore is a feature of Windows XP that allows you to restore your computer to a previous known working state in the event of a problem. This is done without loss of personal files or data such as word processing documents, spreadsheets, music, images, etc. This feature is enabled by default and runs in the background making backups after certain events happen on your computer. System restore functions are only available to an administrator of the computer. 82.Network Cabling? able is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size.

83. Color codes Color Codes for network cable is: Green of White, Green, Orange of White,Blue, Blue of White, Orange,Brown of White, Brown Color Code for Cross over cables: Orange of white, Orange,Green of white, Blue, Blue of white,Green,Brown of White, Brown

84.RJ-11? More commonly known as a phone jack or phone connector, the RJ-11 is short for Registered Jack-11 and is a four or six wire connection primarily used for telephones and computer modem connectors in the United States. Although this cable can be used to connect your modem to the Internet. 85.RJ-45? Short for Registered Jack-45, a RJ-45 is a 8-pinconnection used for Ethernet network adapters. This connector resembles to the RJ-11 or 6-pin connector used with telephones in the United States but they're completely different. 86.Backup? a backup or the process of backing up refer to making copies of data so that these additional copies may be used to restore the original after a data loss event. These additional copies are typically called "backups." 87. Full backup,Incremental backup,Differential backup Full backup

Full backup is the starting point for all other types of backup and contains all the data in the folders and files that are selected to be backed up. Because full backup stores all files and folders, frequent full backups result in faster and simpler restore operations. Remember that when you choose other backup types, restore jobs may take longer. Differential backup Differential backup contains all files that have changed since the last FULL backup. The advantage of a differential backup is that it shortens restore time compared to a full backup or an incremental backup. However, if you perform the differential backup too many times, the size of the differential backup might grow to be larger than the baseline full backup. Incremental backup Incremental backup stores all files that have changed since the last FULL, DIFFERENTIAL OR INCREMENTAL backup. The advantage of an incremental backup is that it takes the least time to complete. However, during a restore operation, each incremental backup must be processed, which could result in a lengthy restore job. 88. Active Directory , Domain Controller? Active Directory is a directory service used to store information about the network resources across a domain.An 'Active Directory' (AD) structure is a hierarchical framework of objects. The objects fall into three broad categories: resources (e.g. printers) services (e.g. email) and users (user accounts and groups). The AD provides information on the objects organizes the objects controls access and sets security. a domain controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain. 89. Differentiate between Domain, Tree and a Forest The forest is a collection of every object, its attributes, and rules (attribute syntax) in the Active Directory. The forest, tree, and domain are the logical parts in an Active Directory network. The Active Directory forest contains one or more transitive, trust-linked trees. A tree is a collection of one or more domains and domain trees, again linked in a transitive trust hierarchy. Domains are identified by their DNS name structure, the namespace 90. Name resolution --- DNS and WINS NetBIOS name and Domain Name ame resolution is used to find a lower level address (such as an IP address) that corresponds to a given higher level address (such as a hostname). Commands that allow name resolution are: nslookup and host. The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. Windows Internet Name Service (WINS) is Microsoft's implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names. Effectively WINS is to NetBIOS names, what DNS is to domain names a central mapping of host names to network addresses. The NetBIOS name is 16 ASCII characters, however Microsoft limits the host name to 15 characters and reserves the 16th character as a NetBIOS Suffix. This suffix describes the service or name record type such as host record, master browser record, domain controller record. The host name (or short host name) is specified when Windows networking is installed/configured, the suffixes registered are determined by the individual services supplied by the host. In order to connect to a computer running TCP/IP via its NetBIOS name, the name must be resolved to a network address. A domain name is an identification label that defines a realm of administrative autonomy, authority, or control in the Internet, based on the Domain Name System (DNS). An important purpose of domain names is to provide easily recognizable and memorizable names to numerically addressed Internet resources 91. Group Type and Group Scope Security Group, Distribution Group, Domain Local Groups, Global Groups and Universal Groups

Types of Groups Security Security groups are used to control access to resources. They can also be used as e-mail distribution lists. Distribution Distribution groups can be used only for e-mail distribution lists, or simple administrative groupings. These groups cannot be used for access control because they are not "security enabled." In Native-mode domains, a group type can be converted at any time. In Mixed-mode domains, a group's type is fixed at the time of creation and cannot be changed. Types of Scope Universal Universal groups can be used anywhere in the same Windows forest. They are only available in a Nativemode enterprise. Universal groups may be an easier approach for some administrators because there are no intrinsic limitations on their use. Users can be directly assigned to Universal groups, they can be nested, and they can be used directly with access-control lists to denote access permissions in any domain in the enterprise. Universal groups are stored in the global catalog (GC); this means that all changes made to these groups engender replication to all global catalog servers in the entire enterprise. Changes to universal groups must therefore be made only after a careful examination of the benefits of universal groups as compared to the cost of the increased global catalog replication load. If an organization has but a single, well-connected LAN, no performance degradation should be experienced, while widely dispersed sites might experience a significant impact. Typically, organizations using WANs should use Universal groups only for relatively static groups in which memberships change rarely. Global Global groups are the primary scope of groups into which users are placed in Mixed-mode domains. Global groups can be placed only in the security descriptors of resource objects that reside in the same domain. This means that you cannot restrict access to an object based solely on user membership in a global group from another domain. Global group membership for a user is evaluated when that user logs on to a domain. Because global group membership is domain-centric, changes in global group membership do not impose global catalog replication throughout an entire enterprise. In a Native-mode domain, global groups can be nested within each other. This may be useful when administrators have nested organizational units, and want to delegate Organizational Unit (OU) administrative functionality in a gracefully decreasing manner down an OU tree. In this situation, a global group tree can be used as a parallel construct, for the assignment of such decreasing privileges

Domain Local Domain Local groups can be used for the direct assignment of access policies on specific resources that are not directly stored in Active Directory, (such as file server shares, printer queues, and so on). Domain Local groups should not be used to assign permissions on Active Directory objects, because Domain Local groups cannot be evaluated in other domains, and parts of most Active Directory objects get replicated to other domains in the form of the GC. Access restrictions placed on Active Directory objects that are based on Domain Local group membership have no effect on GC queries that take place in groups other than the domain in which the Domain Local group originated. 92 .Default Groups Default groups, such as the Domain Admins group, are security groups that are created automatically when you create an Active Directory domain. You can use these predefined groups to help you control access to shared resources and delegate specific domain-wide administrative roles. Group Description Default user rights

Members of this group can create, modify, and delete accounts for users, groups, and computers located in the Users or Computers containers and organizational units in the domain, except the Domain Controllers organizational unit. Members of this group do not have permission to modify the Account Operators Administrators or the Domain Admins groups, nor Allow log on locally; Shut down the system. do they have permission to modify the accounts for members of those groups. Members of this group can log on locally to domain controllers in the domain and shut them down. Because this group has significant power in the domain, add users with caution. Access this computer from the network; Adjust memory quotas for a process; Back up files and directories; Bypass traverse checking; Change the system time; Create a pagefile; Debug programs; Members of this group have full control of all Enable computer and user accounts to be trusted domain controllers in the domain. By default, the for delegation; Force a shutdown from a remote Domain Admins and Enterprise Admins groups are system; Increase scheduling priority; Load and Administrators members of the Administrators group. The unload device drivers; Allow log on locally; Administrator account is also a default member. Manage auditing and security log; Modify Because this group has full control in the domain, firmware environment values; Profile single add users with caution. process; Profile system performance; Remove computer from docking station; Restore files and directories; Shut down the system; Take ownership of files or other objects. Members of this group can back up and restore all files on domain controllers in the domain, regardless of their own individual permissions on Back up files and directories; Allow log on those files. Backup Operators can also log on to Backup Operators locally; Restore files and directories; Shut down domain controllers and shut them down. This the system. group has no default members. Because this group has significant power on domain controllers, add users with caution. By default, the Domain Guests group is a member of this group. The Guest account (which is Guests No default user rights. disabled by default) is also a default member of this group. Members of this group can create one-way, incoming forest trusts to the forest root domain. For example, members of this group residing in Forest A can create a one-way, incoming forest Incoming Forest trust from Forest B. This one-way, incoming forest Trust Builders (only trust allows users in Forest A to access resources No default user rights. appears in the forest located in Forest B. Members of this group are root domain) granted the permission Create Inbound Forest Trust on the forest root domain. This group has no default members. For more information about creating forest trusts, see Create a forest trust. Members of this group can make changes to Network TCP/IP settings and renew and release TCP/IP Configuration No default user rights. addresses on domain controllers in the domain. Operators This group has no default members. Members of this group can monitor performance counters on domain controllers in the domain, Performance locally and from remote clients without being a No default user rights. Monitor Users member of the Administrators or Performance Log Users groups. Performance Log Members of this group can manage performance No default user rights. Users counters, logs and alerts on domain controllers in

the domain, locally and from remote clients without being a member of the Administrators group. Members of this group have read access on all users and groups in the domain. This group is provided for backward compatibility for computers running Windows NT 4.0 and earlier. By default, Pre-Windows 2000 Access this computer from the network; Bypass the special identity Everyone is a member of this Compatible Access traverse checking. group. For more information about special identities, see Special identities. Add users to this group only if they are running Windows NT 4.0 or earlier. Members of this group can manage, create, share, and delete printers connected to domain controllers in the domain. They can also manage Active Directory printer objects in the domain. Members of this group can log on locally to domain Print Operators Allow log on locally; Shut down the system. controllers in the domain and shut them down. This group has no default members. Because members of this group can load and unload device drivers on all domain controllers in the domain, add users with caution. Members of this group can remotely log on to Remote Desktop domain controllers in the domain. This group has No default user rights. Users no default members. This group supports directory replication functions and is used by the File Replication service on Replicator domain controllers in the domain. This group has No default user rights. no default members. Do not add users to this group. On domain controllers, members of this group can log on interactively, create and delete shared resources, start and stop some services, back up Back up files and directories; Change the system and restore files, format the hard disk, and shut time; Force shutdown from a remote system; Server Operators down the computer. This group has no default Allow log on locally; Restore files and members. Because this group has significant directories; Shut down the system. power on domain controllers, add users with caution. Members of this group can perform most common tasks, such as running applications, using local and network printers, and locking the server. By Users default, the Domain Users group, Authenticated No default user rights. Users, and Interactive are members of this group. Therefore, any user account created in the domain becomes a member of this group.

Description Members of this group are permitted to publish Cert Publishers certificates for users and computers. This group has no default members. Members of this group have administrative access to DnsAdmins the DNS Server service. This group has no default (installed with DNS) members. Members of this group are DNS clients that can DnsUpdateProxy perform dynamic updates on behalf of other clients, (installed with DNS) such as DHCP servers. This group has no default members. Domain Admins Members of this group have full control of the

Group

Default user rights No default user rights.

No default user rights.

No default user rights. Access this computer from the network; Adjust

Domain Computers

Domain Controllers Domain Guests

Domain Users

Enterprise Admins (only appears in the forest root domain)

Group Policy Creator Owners

IIS_WPG (installed with IIS)

RAS and IAS Servers

memory quotas for a process; Back up files and directories; Bypass traverse checking; Change the system time; Create a pagefile; Debug programs; Enable computer and user domain. By default, this group is a member of the accounts to be trusted for delegation; Force a Administrators group on all domain controllers, all shutdown from a remote system; Increase domain workstations, and all domain member scheduling priority; Load and unload device servers at the time they are joined to the domain. By drivers; Allow log on locally; Manage auditing default, the Administrator account is a member of and security log; Modify firmware this group. Because the group has full control in the environment values; Profile single process; domain, add users with caution. Profile system performance; Remove computer from docking station; Restore files and directories; Shut down the system; Take ownership of files or other objects. This group contains all workstations and servers joined to the domain. By default, any computer No default user rights. account created becomes a member of this group automatically. This group contains all domain controllers in the No default user rights. domain. This group contains all domain guests. No default user rights. This group contains all domain users. By default, any user account created in the domain becomes a member of this group automatically. This group can be used to represent all users in the domain. For example, if you want all domain users to have access No default user rights. to a printer, you can assign permissions for the printer to this group (or add the Domain Users group to a local group, on the print server, that has permissions for the printer). Access this computer from the network; Adjust memory quotas for a process; Back up files and directories; Bypass traverse checking; Change the system time; Create a pagefile; Members of this group have full control of all Debug programs; Enable computer and user domains in the forest. By default, this group is a accounts to be trusted for delegation; Force member of the Administrators group on all domain shutdown from a remote system; Increase controllers in the forest. By default, the scheduling priority; Load and unload device Administrator account is a member of this group. drivers; Allow log on locally; Manage auditing Because this group has full control of the forest, add and security log; Modify firmware users with caution. environment values; Profile single process; Profile system performance; Remove computer from docking station; Restore files and directories; Shut down the system; Take ownership of files or other objects. Members of this group can modify Group Policy in the domain. By default, the Administrator account is a member of this group. Because this group has No default user rights. significant power in the domain, add users with caution. The IIS_WPG group is the Internet Information Services (IIS) 6.0 worker process group. Within the functioning of IIS 6.0 are worker processes that serve specific namespaces. For example, www.microsoft.com is a namespace served by one No default user rights. worker process, which can run under an identity added to the IIS_WPG group, such as MicrosoftAccount. This group has no default members. Servers in this group are permitted access to the No default user rights. remote access properties of users.

Members of this group can modify the Active Schema Admins Directory schema. By default, the Administrator (only appears in the account is a member of this group. Because this forest root domain) group has significant power in the forest, add users with caution. 93. Dynamic Host Configuration Protocol(DHCP) Scope options.

No default user rights.

A DHCP scope is a valid range of IP addresses which are available for assignments or lease to client computers on a particular subnet. In a DHCP server, you configure a scope to determine the address pool of IPs which the server can provide to DHCP clients. DHCP Scope Properties Scope Property Network ID Subnet mask Network IP address range Lease duration Router Scope name Exclusion range The subnet mask for the network ID The range of IP addresses that are available to clients The period of time that the DHCP server holds a leased IP address for a client before removing the lease. A DHCP option that allows DHCP clients to access remote networks. An alphanumeric identifier for administrative purposes. The range of IP addresses in the scope that is excluded from being leased. Description The network ID for the range of IP addresses

The four methods that can be used to set DHCP options are; Default, Global, Scope, and Client. Default Setting a default DHCP option modifies the default value for one of the DHCP options. When a default value is set, the default value becomes the default that was set during administration rather than the DHCP default that was set during installation of DHCP. This method may be accessed through DHCP Manager, click "DHCP Options," then click "Defaults". Global When you set a global DHCP option, the option takes affect for all DHCP scopes defined on the selected DHCP server. Global DHCP options appear in DHCP Manager with a globe icon proceeding them. This method may be accessed through DHCP Manager, from the DHCP Options menu, click Global. Scope Setting a scope DHCP option will set the option only for the selected scope on the Options Scope menu. DHCP options configured for a scope are displayed with a series of computer icons proceeding them in DHCP Manager. This method may be accessed through DHCP Manager, from the DHCP Options menu, click Scope. Client This method can be used to configure one or more of the DHCP options for a specific DHCP client. DHCP options can be set for a client only if the DHCP client has a reserved IP address(a Reservation). The only way to see if a DHCP option is set for a DHCP client is to view the properties of an active client lease through DHCP Manager. To do this, perform the following steps: 1. 2. On the Scope menu, click Active Leases. Select the individual client, click Properties, and then click Options. NOTE: If the Options button is not available, no reservation for the client exists. NOTE: If a DHCP option is set by more than one method, precedence is in the following order:

1. 2. 3. 4. 96. IIS

Client Overrides... Scope Overrides... Global Overrides... Default.

IIS (Internet Information Server) is a group of Internet servers (including a Web or Hypertext Transfer Protocol server and a File Transfer Protocol server) with additional capabilities for Microsoft's Windows NT and Windows 2000 Server operating systems. IIS is Microsoft's entry to compete in the Internet server market that is also addressed by Apache, Sun Microsystems, O'Reilly, and others. 97. FTP File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over a TCP/IP based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server applications. Client applications were originally interactive command-line tools with a standardized command syntax, but graphical user interfaces have been developed for all desktop operating systems in use today. FTP is also often used as an application component to automatically transfer files for program internal functions. FTP can be used with user-based password authentication or with anonymous user access. The Trivial File Transfer Protocol (TFTP) is a similar, but simplified, not interoperable, and unauthenticated version of FTP. 98. PORTS Definition: In computer networking, the term port can refer to either physical or virtual connection points. Physical network ports allow connecting cables to computers, routers, modems and other peripheral devices. Several different types of physical ports available on computer network hardware include:

Ethernet ports USB ports serial ports

Virtual ports are part of TCP/IP networking. These ports allow software applications to share hardware resources without interfering with each other. Computers and routers automatically manage network traffic traveling via their virtual ports. Network firewalls additionally provide some control over the flow of traffic on each virtual port for security purposes. 99. DFS Distributed File System (DFS) is a set of client and server services that allow an organization utilizing Microsoft Windows servers to organize many distributed SMB file shares into a distributed file system. DFS provides location transparency and redundancy to improve data availability in the face of failure or heavy load by allowing shares in multiple different locations to be logically grouped under one folder, or DFS root.

Você também pode gostar