Monday 7 May 2012

Interview Questions

 ·         Common Scenarios:
Incase a Customer tells u that there is no sound from the computer speakers!!
1.     First check if the speakers are turned on
2.     Then check if they are properly connected to the CPU
3.     Check if the volume button on the speakers is turned on.
4.     Check if the volume on the Task bar is also turned on and also the volume on the respective software’s are also turned on.
5.     Incase the speakers or the software’s are muted un mute them.
6.     Still if there is no sound then connect the headphones to the CPU and check if there is sound. Incase it is audible from the headphone then the speakers are faulty.
7.     If there is no sound from the headphone then there is something wrong with the sound card
8.     Go to the Device manager and see if the driver is installed or no.
9.     If not then install the driver and if yes then there is something wrong with the sound card.


Incase a Customer tells u that there is no Display on the computer monitor!!
10.   First check if the monitor is turned on.
11.   If there is no display then unplug the monitor cable from the CPU and then a screen with red, blue and green color with the letters RBG (Red Blue and Green Colors) or a message “SELF TEST” will pop up and keep moving all over the screen.
12.   In this case the monitor is absolutely fine and the problem is with the video card.
13.   In case the video card is an external one the it has to be replaced and if it is integrated on the motherboard then the motherboard has to be replaced


  What’s a Broadband? -     
It is a High Speed Internet Connection which requires a modem or a router and it is an Optical Fiber Connection (RJ 45, (Registered Jack-45)) Speed of 64KBPS to 1GBPS. This cable is used only for Ethernet card, LAN WAN                 
What’s a narrowband/ Dialup? -
It’s an Internet Connection which has to be Manually Dialed through telephone lines (RJ11, (Registered Jack-11)) with the help of a modem. Speed of 56KBPS. This card is only for MODEM 2 Phone
What’s Winzip?
WinZip is a popular data compression format. WinZip files save time and space, and make downloading software faster. To open the Zip file you will need to have WinZip software on your PC. Once you have unzipped the file you will have an executable file.
To extract a Winzip file right click on the zipped file and click on Extract All. It will direct u to a Destination Folder. Click on the desired folder and the file is extracted to that folder.
Define an operating system
This is a computer's primary software program, and it controls all basic operations of the computer.
Ex Windows, Linux, UNIX & Dos.
What are the different types of internet browsers?
Netscape navigator, Netscape communicator, Internet Explorer 6, Internet Explorer 7, Mozilla Firefox and Opera
How is a desktop Measured? - It is measured diagonally
What is System restore?
It’s a process when the entire system is restored back to its previous day’s or time’s setting. This is done only when the system does not work properly maybe due to software or hardware which is not installed properly.
How’s a System restore done?
System Restore can be done only on a Windows XP in the following ways.
1-Go to Safe Mode then go to  Start on the taskbar menu
2- Go to Programs and then go to Accessories.
3-Go to System tools and then to System restore.
4-Automatically 2 options pop up on the Screen which is A-Restore System to a previous point and B- Create a new restore point.
5-When u click on option A, a calendar automatically pops up with few dates highlighted.
6- Click on the highlighted dates and click on next. Then the computer restarts and it either says A- System successfully restored or B-System not Restored or System Restore unsuccessful
What the Components inside a CPU?
  1  Processor
  2  Mother Board
  3  RAM
  4  Hard Disk
  5  CD Drive, CD Writer
  6  Floppy Drive
  7  Sound Card
  8  Video Card
  9  Graphics Card
  10  LAN/Ethernet card (Used for Networking)
  11  SMPS (Switch mode Power Supply)



What is a Combo Drive?
It’s a drive that plays both CD and DVD but can write only CD’S
What are Optical Drives?
The Hard Disk, CD drive and Floppy Drive Put together are called as optical drives.
Basic configuration of a PC
1- Pentium 4   2.8 GHz Processor.
2- Intel 915 Mother Board.
3- 512 MB RAM
4-80 GB Hard Disk.
What is a RAM?
Random Access Memory is the best form of a Computer Memory. RAM is considered as “Random Access” because you can access any memory cell directly if you know the row and column that intersect at that cell.
What is ROM?
Read Only Memory whose contents can be accessed and read but cannot be changed. You can read from it, but you cannot write to it without using special procedures. ROM is where your BIOS is stored. BIOS stand for Basic Input / Output System.
What are Input and Output Devices?
Input Devices- Keyboard, Mouse, Floppy drive, CD Drive, Scanner etc.
Output Devices- monitor, Speakers, Printer etc.
What are the Different types of RAM?
  1  SDRAM
SDRAM means Synchronous Dynamic Random Access Memory
  2  DDR1
Double Data Rate
  3  DDR2
  What are the different types of Slots?
  1  PCI-(Peripheral
Component Interconnect)
–Sound card, Video Card, LAN Card,
Internal Modem, Graphics/VGA card.
  2  RAM
  3  IDE
(Integrated Drive
Electronics) –Optical Drives




Windows XP Vs Windows Vista

Windows XP
Windows Vista
1.
2.
3.
4.
Not secure
Compatible with 32 bit Processors and 64 Bit Processors
Minimum of 64 MB of RAM
More secured compared to XP
Compatible with 64 bit Processor
Minimum of 1 GB RAM
Advanced Graphics option



How many types of Ports are there?
There are 3 types of ports,
  
1 Serial port
  
2 Parallel Port

3 USB Port



Audio file formats or sound file formats –WAV, AIFF, MP3 and AU.
Image file formats available – mpeg, jpeg, gif, bitmap
Dual Core Vs Core 2 Duo
The Simple facts are:
All Core 2 Duo Processors are Dual Core Processors    All Pentium D Processors are Dual Core Processors    All Intel Dual Core Processors are Dual Core Processors
Intel Core 2 Duo processors are next gen processors from Intel on 65 nm platform developed from Ground up with new Architecture called Core
What are the seven layers in the OSI Reference Model?
1- Applications Layer
2- Presentation Layer
3- Sessions Layer
4- Transport Layer
5- Network Layer
6- Data Link Layer
7 – Physical Layer 
What is a MODEM?
Modem is a device used to connect to the internet. The signals coming from the phone are converted from analogue and sent to the computer as digital and vice versa
 What is a ROUTER?
Router is a device used for networking. Incase of more than one computer then a modem and a router is required for the internet connection as well as for networking purpose. Its basically used to connect two LANS or LAN – WAN ETC           
Router   
Abbreviations 
HTTP
HTML
TCP/IP 
SMTP
POP
DSL
WIFI
URL
FTP
BIOS
Hyper Text Transfer Protocol
Hyper Text Markup Language
Transmission Control Protocol/ Internet Protocol
Simple Mail Transfer Protocol
Post Office Protocol
Digital Subscriber Line
Wireless Fidelity
Uniform Resource Locator
File Transfer Protocol
Basic Input Output Setup



What is BIOS?
BIOS is an acronym that stands either for the Basic Input/Output System or for Built In Operating System.  BIOS refers, in part, to thefirmware code (a type of boot loader) run by a PC when first powered on. The BIOSes of IBM PC class machines are coded programs embedded on a chip that recognize and control various devices that make up x86 personal computers, and provide a small library of basic Input/Output functions that can be called to operate and control the peripherals such as the keyboard, primitive (800 x 600) display functions and so forth.
The primary functions of BIOS is as follows:
14.   to identify and initialize system component hardware (such as the video display card, hard disk, and floppy disk) and some other hardware devices
15.   to prepare the machine into a known low capability state, so other software programs stored on various media can be loaded, executed, and given control of the PC. This process is known as booting, or booting up, which is short for bootstrapping
What is a File System?
file system is a method for storing and organizing computer files and the data they contain to make it easy to find and access them. File systems may use a data storage device such as a hard disk or CD-ROM and involve maintaining the physical location of the files. 
TYPES OF FILE SYSTEM
16.   Disk file systems
disk file system is a file system designed for the storage of files on a data storage device, most commonly a disk drive, which might be directly or indirectly connected to the computer
Ex: FAT (FAT12, FAT16, FAT32), NTFS, HFS and HFS+, ext2, ext3, ISO 9660, ODS-5, and UDF
17.   Flat file systems
In a flat file system, there are no subdirectories—everything is stored at the same (root) level on the media, be it a hard disk,floppy disk, etc. While simple, this system rapidly becomes inefficient as the number of files grows, and makes it difficult for users to organize data into related groups.
18.   Flash file systems
flash file system is a file system designed for storing files on flash memory devices.
Ex:  mobile devices, flash memory devices in Digital cameras.
19.   Database file systems
A database is a collection of interrelated data’s stored in a database server; these data’s will be stored in the form of tables. The primary aim of database is to provide a way to store and retrieve database information in fast and efficient manner. In addition to, hierarchical structured management, files are identified by their characteristics, like type of file, topic, author.
20.   Transactional file systems
Each disk operation may involve changes to a number of different files and disk structures. In many cases, these changes are related, meaning that it is important that they all be executed at the same time. Transaction processing introduces the guarantee that at any point while it is running, a transaction can either be finished completely or reverted completely (though not necessarily both at any given point). This means that if there is a crash or power failure, after recovery, the stored state will be consistent. This type of file system is designed to be fault tolerant, but may incur additional overhead to do so.
21.   Network file systems
A network file system is a file system that acts as a client for a remote file access protocol, providing access to files on a server
Examples of network file systems include clients for the NFS, AFS, SMB protocols, and file-system-like clients for FTP andWebDAV.
22.   Special purpose file systems
A special purpose file system is basically any file system that is not a disk file system or network file system. This includes systems where the files are arranged dynamically by software, intended for such purposes as communication between computer processes or temporary file space.
What is a Protocol?
A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax, semantics, and synchronization of communication. Protocols may be implemented by hardware, software, or a combination of the two. At the lowest level, a protocol defines the behavior of a hardware connection.
Common protocols 
§  IP (Internet Protocol)
§  UDP (User Datagram Protocol)
§  TCP (Transmission Control Protocol)
§  DHCP (Dynamic Host Configuration Protocol)
§  HTTP (Hypertext Transfer Protocol)
§  FTP (File Transfer Protocol)
§  Telnet (Telnet Remote Protocol)
§  SSH (Secure Shell Remote Protocol)
§  POP3 (Post Office Protocol 3)
§  SMTP (Simple Mail Transfer Protocol)
§  IMAP (Internet Message Access Protocol)
TYPES OF NETWORKS:
34.   LAN - Local Area Network -LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings.
35.   WLAN - Wireless Local Area Network -a LAN based on WiFi wireless network technology
36.   WAN - Wide Area Network -As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address.
37.   MAN - Metropolitan Area Network - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation.
38.   SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network - connects servers to data storage devices through a technology like Fibre Channel.
39.   CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network - a network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus.
40.   PAN - Personal Area Network - is a computer network organized around an individual person. Personal area networks typically involve a mobile computer, a cell phone and/or a handheld computing device such as a PDA. You can use these networks to transfer files including email and calendar appointments, digital photos and music.
What is ISP?
An Internet service provider (ISP, also called Internet access provider or IAP) is a company that offers their customers access to theInternet. The ISP connects to its customers using a data transmission technology appropriate for delivering Internet Protocoldatagrams, such as dial-up, DSL, cable modem or dedicated high-speed interconnects.
ISPs may provide Internet e-mail accounts to users which allow them to communicate with one another by sending and receiving electronic messages through their ISPs' servers. ISPs may provide other services such as remotely storing data files on behalf of their customers, as well as other services unique to each particular ISP. 
The number of valid host addresses available is always 2N - 2 (where N is the number of bits used, and the subtraction of 2 adjusts for the invalidity of the first and last addresses). Thus, for a class C address with 8 bits available for hosts, the number of hosts is 254.
The larger network number field allowed a larger number of networks, thereby accommodating the continued growth of the Internet.
The IP address netmask, which is commonly associated with an IP address today, was not required because the mask was implicitly derived from the IP address itself. Any network device would inspect the first few bits of the IP address to determine the class of the address.
The method of comparing two IP addresses' physical networks did not change, however (see subnet). For each address, the network number field size and its subsequent value were determined (the rest field was ignored). The network numbers were then compared. If they matched, then the two addresses were on the same network. 
What is DHCP?
Dynamic Host Configuration Protocol (DHCP) is a protocol used by networked devices (clients) to obtain the parameters necessary for operation in an Internet Protocol network. This protocol reduces system administration workload, allowing devices to be added to the network with little or no manual configuration.
What is telnet?
Telnet (Telecommunication network) is a network protocol used on the Internet or local area network (LAN) connections. It was developed in 1969 beginning with RFC 15 and standardized as IETF STD 8, one of the first Internet standards. Typically, telnet provides access to a command-line interface on a remote machine.
What is DNS?
The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource participating in theInternet. It associates various information with domain names assigned to such participants. Most importantly, it translates human meaningful domain names to the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices world-wide. An often used analogy to explain the Domain Name System is that it serves as the "phone book" for the Internet by translating human-friendly computer hostnames into IP addresses. For example, www.example.com translates to208.77.188.166.
What is ping?
Ping is a computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self test the network interface card of the computer, or as a speed test. It works by sending ICMP “echo request” packets to the target host and listening for ICMP “echo response” replies.
Few Anti Virus Vendors available
Symantec Norton Antivirus, McAfee, Avast,
Computer Association – CA, AVG, ESET, Kaspersky,
Bit Defender, Quick Heal, Vipre, Trend Micro.  
What is a Fire Wall?
A firewall is a dedicated appliance, or software running on another computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.
A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust.
What are Cookies?
HTTP cookies, more commonly referred to as Web cookies, tracking cookies or just cookies, are parcels of text sent by a server to a Web client (usually a browser) and then sent back unchanged by the client each time it accesses that server. HTTP cookies are used for authenticating, session tracking (state maintenance), and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts.
What is Antivirus ?
Antivirus software are computer programs that attempt to identify, neutralize or eliminate malicious software. The term "antivirus" is used because the earliest examples were designed exclusively to combat computer viruses; however most modern antivirus software is now designed to combat a wide range of threats, including worms, phishing attacks, rootkits, Trojans, often described collectively as malware.
How do u go to safe mode ?
To use a Safe Boot option, follow these steps:
41.   Restart your computer and start pressing the F8 key on your keyboard. On a computer that is configured for booting to multiple operating systems, you can press the F8 key when the Boot Menu appears.
42.   Select an option when the Windows Advanced Options menu appears, and then press ENTER.
43.   When the Boot menu appears again, and the words "Safe Mode" appear in blue at the bottom, select the installation that you want to start, and then press ENTER.
Description of Safe Boot options 
§  Safe Mode (SAFEBOOT_OPTION=Minimal): This option uses a minimal set of device drivers and services to start Windows.
§  Safe Mode with Networking (SAFEBOOT_OPTION=Network): This option uses a minimal set of device drivers and services to start Windows together with the drivers that you must have to load networking.
§  Safe Mode with Command Prompt (SAFEBOOT_OPTION=Minimal(AlternateShell)): This option is the same as Safe mode, except that Cmd.exe starts instead of Windows Explorer.
§  Enable VGA Mode: This option starts Windows in 640 x 480 mode by using the current video driver (not Vga.sys). This mode is useful if the display is configured for a setting that the monitor cannot display.    Note Safe mode and Safe mode with Networking load the Vga.sys driver instead.
§  Last Known Good Configuration: This option starts Windows by using the previous good configuration.
§  Directory Service Restore Mode: This mode is valid only for Windows-based domain controllers. This mode performs a directory service repair.
§  Debugging Mode: This option turns on debug mode in Windows. Debugging information can be sent across a serial cable to another computer that is running a debugger. This mode is configured to use COM2.
§  Enable Boot Logging: This option turns on logging when the computer is started with any of the Safe Boot options except Last Known Good Configuration. The Boot Logging text is recorded in the Ntbtlog.txt file in the %SystemRoot% folder.
§  Starts Windows Normally: This option starts Windows in its normal mode.
§  Reboot: This option restarts the computer.
§  Return to OS Choices Menu: On a computer that is configured to starting to more than one operating system, this option returns to the Boot menu.
An environment variable is set when you use one of the Safe Boot options. The environment variable is SAFEBOOT_OPTION. This variable is set to either Network or to Minimal.
What is a boot device?
Devices that can boot a computer are usually boot disks or boot drives (normally a hard drive, but can be a floppy disk or a CD).
What is a Device Manager?
The Device Manager is a Control Panel applet in Microsoft Windows operating systems. It allows users to view and control the hardware attached to the computer. When a piece of hardware is not working, the offending hardware is highlighted for the user to deal with. The list of hardware can be sorted by various criteria.
For each device, users can:
§  Supply device drivers for the hardware
§  Enable or disable devices
§  Tell Windows to ignore malfunctioning devices
§  View other technical properties


Windows 2000 and Windows XP:
59.   Right-click My Computer then select Properties
60.   Select the Hardware tab
61.   Click the Device Manager button
What is Msconfig?
MSConfig, or Microsoft System Configuration Utility, (or simply System Configuration in Windows Vista) is a utility to troubleshoot the Windows startup process. It is bundled with all Microsoft Windows operating systems since Windows 98 except Windows 2000. Windows 95 and Windows 2000 users can download the utility as well, although it was not designed for them. MSConfig modifies which programs run at startup, edits certain configuration files, and simplifies controls over Windows services.
Explain Registry.
The Windows registry is a directory which stores settings and options for the operating system for Microsoft Windows 32-bit versions, 64-bit versions, and Windows Mobile. It contains information and settings for all the hardware, operating system software, most non-operating system software, users, preferences of the PC, etc. Whenever a user makes changes to Control Panel settings, file associations, system policies, or most installed software, the changes are reflected and stored in the registry. The registry also provides a window into the operation of the kernel, exposing runtime information such as performance counters and currently active hardware. 
What are Registry Hives?
The Registry is split into a number of logical sections, or "hives". Hives are generally named by their Windows API definitions, which all begin "HKEY".
hive is a logical group of keys, subkeys, and values in the registry that has a set of supporting files containing backups of its data.
Each time a new user logs on to a computer, a new hive is created for that user with a separate file for the user profile. This is called the user profile hive. A user's hive contains specific registry information pertaining to the user's application settings, desktop, environment, network connections, and printers. User profile hives are located under the HKEY_USERS key.
What are service packs?
service pack (in short SP) is a collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package. 
What is a Task Manager?
A task manager is a program used to provide information about the processes and programs running on a computer, as well as the general status of the computer. It can also be used to terminate processes and programs, as well as change the processes' priority.
Use CTRL+ALT+DEL to invoke Task Manager.
Reasons why a computer is slow.
1. Start up overload: As you add additional programs, they claim start-up status quickly and quietly. The more programs you have that are loading at start-up, the slower the start-up.
2. Spyware: Malicious programs that stealthily embed themselves into your software. They are installed in your software, without your knowledge, in many ways. Through e-mail especially, the ones that are multi-forwarded.
3.The Registry: If your registry is corrupted or bloated, there could be a BSOD in your future.
4. Badly Fragmented Hard Drive. Over time, your computer's files can be scattered over your hard drive; this is called fragmentation and a cause for file searches to be slower than usual.
5. Poor Security Software. A large number of security programs, and suites, are bloated with software and demand a great deal of system resource and memory.
6. Remnants of Uninstalled Programs.
7. The Page File. The Windows Page File is a temporary source of memory used by the system in processing functions. It is actually a buffer that is used for "wiggling room." If your page file is too small, your operating system will not have enough room to move and the result will be poor performance and error message.
8. Too Many Windows and Temporary Files. Your hard drive could be crammed with many useless files left over from re-installs, and just general use.
9. Viruses or any ITD.
10. Hardware Problems. There are assortments of things that can happen to your hardware: wear and tear, over heating and dust.
Explain Printer Spool issues.
Each time you execute a command to print a document or file, your printer-driver software first converts your document information into a language the printer can understand, and this translated information creates the map or instructions the printer needs to place the ink (or toner) in the right places on the paper.
In order to do this conversion, and to make an accurate map, your driver software tends to make a rather lengthy set of instructions, called a "Spool File". This temporary file is written to your printer's Printer Spool Folder, or often called a "Temporary Files Folder", within your printer's folder inside the Extensions folder of your Startup Volume's System Folder.
The instructions needed to print a document tend to be complicated, and thus need a lot of disk-space to store that temporary information. The larger and more complicated the original file is, the larger and more complex the Spool File becomes, and the more likely you are to run out of available free space on your hard drive(s) to host it.
How to install software?
Manual:- After inserting the CD  1. Open My Computer      
2. Open the CD drive   
3. Click on Setup.exe
A pop-up screen will appear, follow the instructions from there.
Autorun :- After inserting the CD
A pop-up screen will appear automatically, follow the instructions from there.
How to uninstall software?
62.   Go to Add/remove programs in control panel.
63.   Select the software that has to be uninstalled and click on remove.
64.   A pop-up screen will appear, follow the instructions.
Or go to the location where the software is stored and execute uninstall.exe.    
Parts of Computer: Power Supply, Motherboard, Processor, Hard Disk Drive, RAM(Random Access Memory), CD/DVD-ROM drive, USB ports, Video/Sound Card(integrated or Cards on Slots), 
Peripherals: Monitor, Keyboard, Mouse, Printer, External HDD/Pen Drive (USB devices), Modem, Scanners. 

Operating System:  
65.   Operating System: is the software that manages/helps run the computer hardware & the system.

§   
§  Types : Windows 95, 98, Windows 2000 professional, Windows XP Home & Professional, Windows Vista, Linux & Unix

Difference b/w Win XP & Vista

  Features
  Windows XP
  Windows Vista
  Data Security(Firewall)
  Medium
  High
  Graphical Interface
  Good
  Better
  Restore & Back-up Functions
  Medium
  High
  H/W Requirements
  Min 512MB RAM
  Min 1GB RAM up to 4GB RAM
  Instant Search
  NA
  Can easily search and find everything on your PC and the Internet

67.   MS Office Software: MS Word, MS Excel, MS PowerPoint, MS Access, & MS Outlook for exchanging mails

68.   Internet Browsers: Helps in navigating through all the websites on the internet

§   
§  Types of browsers: Internet Explorer, Opera, Mozilla Firefox, Google Chrome.

70.   Anti-Virus: Software which helps to prevents the entry of virus, detects the virus & removes the virus from the system.

§   
§  List of Anti-Virus : Symantec Norton, McAfee, Kaspersky, Quickheel.

72.   Instant Messaging: This is a real time application where the messages are sent to other users on the system ( one to one)

§   
§  Types: Google Talk, MSN Messenger, Yahoo Messenger, Office Communicator, Skype.

74.   Media Players: This helps in playing music/video files.

§   
§  Types: Winamp, Real player, Windows Media Player, Nero Media Player.

76.   File Formats :
§  Pictures : Bitmap, JPEG, JIF, MPEG, TIF
§  Music : .WMA, .Mp3, .Avi
§  Documents : .doc, .xls, .ppt,

80.   Scanners: Device that captures images from photographic prints, posters, magazine pages.

Scanners are attached to the computer with a small computer system interface (SCSCI). 
81.   Fax: is the telephonic transmission of scanned in printed text or images usually to a telephone number associated with the printer or any other output devices.

Difference b/w core 2 duo & Dual core processors 
Core 2 duo id Intel’s 2nd generation, hence its called Core 2 Duo – uses fast & less power consuming technology. 
Dual Core – generic tem referring to any processor with 2 processors in one unit 
General Questions:   
82.   BIOS: Basic Input & Output System: It has the entire hardware configuration stored on it. Use Delete Key to enter BIOS of any computer.

83.   BSOD : Blue Screen of Death : common error in Windows Operating System.

Reasons for BSOD -
§  Faulty memory, power supply issues, overheating of components, or hardware running beyond its specification limits.
§  Hard Disk failure or OS failure.
§  When the floppy/CD ROM/other removable memory devices are removed while being used.

87.   Computer running slow:

§  Go to Task Manager – Processor Tab - Delete the unwanted programs running at the background
§  Check the usage of the processor

§   
1.     Hard Disk Drive space is less.
           Solution: Remove all the unwanted files & programs from the Hard drive. 
91.   Data Corruption while installing or uninstalling the s/w programs.
Solution: Run Scan Disk or Disk Defragmenter 
92.   Bad hardware:
     Solution: verify the Device Manager does not have any device driver conflicts. 
93.   Hows the Resolution of the Screen Measured: Pixels

Resolution of the Screen can be changed through the desktop properties where we can move the slide bar to change the resolution: 1280x768, 1280x1024. 
94.   Device Manager:à It is a software that gives the status of a hardware device.
i.e.: .1) Shows each & every hardware that is present in the P.C
     2) Shows the properties of each & every hardware device.
95.   HOW TO INSTALL PROGRAMME:à (a) “Start”à”Settings”à”Control Panel”à”ADD/REMOVE Programme”
Insert CD Rom into CD Drive Ã  Installation Wizardà Follow Instructions
96.    
97.   New System Configuration::à
1. Processor: - Intel Pentium IV Dual Core
2. Speed: --- 3 GHz
4. Hard Disk: ---160 GB SATA
5. 2 GB DDR-2 RAM 
  
ISP CONNECTIONS
                                                    |
                                                                ^
*Dial Up/ Narrowband                                              * Broadband /P2P 
98.   Uses a Telephone Line                                      1. Uses optical Fibre Cables
99.   Speed-à56 Kbps                                              2. Speed-à256 Kbps or more
100. Cannot use both phone &internet                     3.Can Use Both at a time
      @ The same time  


IP Address  ::à A number which uniquely identifies the complete on a network. 
   To find IP address::à StartàRunàType CommandàDOS Screenà Type ipconfigà Enter 
What Operating System:àIt is an interface between the user & the computer .
Eg: Windows98, 2000,XP, Linux, Unix, Windows Vista is the latest version of O.S
What is fishing? Phishing
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. 
What is the task manager?
Windows Task Manager is a task manager application included with Microsoft Windows NT family of operating systems that provides detailed information about computer performance and running applications, processes and CPU usage, commit charge and memory information, network activity and statistics, logged-in users, and system services. The Task Manager can also be used to set process priorities, processor affinity, forcibly terminate processes, and shut down, restart, hibernate or log off from Windows. Windows Task Manager was introduced with Windows NT 4.0, previous versions of Windows NT included the Task List application, which had far fewer features. The task list was capable of listing currently running processes and killing them, or creating a new process. 
How long will it take to install windows XP in the computer?
Depends on RAM and Processor I would say more than 25-45 mins  



What is DSL Cable port?
DSL - digital subscriber loop/ digital subscriber line
DSL can be used at the same time and on the same telephone line with regular telephone, as it uses high frequency, while regular telephone uses low frequency  
What is Phone line and modem line?
Both r the same 
What is Bios?
In computing, the Basic Input/output System (BIOS)[1] , also known as the System BIOS, is a de facto standard defining a firmware interface for IBM PC Compatible computers.[2]
The BIOS is boot firmware, designed to be the first code run by a PC when powered on. The initial function of the BIOS is to identify, test, and initialize system devices such as the video display card, hard disk, and floppy disk and other hardware. This is to prepare the machine into a known state, so that software stored on compatible media can be loaded, executed, and given control of the PC.[3] This process is known as booting, or booting up, which is short for bootstrapping 
How do you insert a hard disk in a CPU
Connect it to IDE bus or EIDE bus if available or connect to sata port (stupid question) 
To find IP address:à StartàRunàType CommandàDOS Screenà Type ipconfigà Enter 
§  ISDN::à Integrated services Digital Network (Broadband connection through telephones)
§  SMPT::à Simple mail Transfer Protocol (for Sending mail)
§  POP3 :à Post Office Protocol (for receiving mails)
§  Default mail client :à Outlook Express
§  Firewall:à It protects the system from hackers.
§  Antivirus:à It protects the system against virus-attack.
       
Top of Form



2 comments:

  1. I have read some just right stuff here. Definitely price bookmarking for revisiting.

    I wonder how much effort you set to make this type of excellent informative
    site.
    my page: ppt Repair

    ReplyDelete
    Replies
    1. Thanks...Hope the above content might useful for many like you. Let them also know and let'em check this.share this with u r frnds..

      Delete

Write your openion about my blog spot..To get automatic facebook updates like my Pagehttps://www.facebook.com/shivashankar4u ..It takes only 1 min to write the comment and to like the page.. Thanks.