Techinal Questions

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Techinal Questions as PDF for free.

More details

  • Words: 3,783
  • Pages: 9
Technical Questions 1)

Define BIOS?

Ans) Basic Input/Output System is the program which starts up your computer and communicates between the devices in your computer (such as your hard drive and graphics card) and the system. BIOS is normally stored in an EPROM chip (Erasable Programmable Read Only Memory).

2)

What is Device Manager?

Ans) Device Manager is an OS feature that lets you view and change the properties of all devices attached to your computer. To get to the device manager in Windows, right click on my computer icon, choose properties, and then click on the device manager tab. From there you can select a variety of management options.

3)

What is a virus?

Ans) A program or a piece of code that is loaded onto our computer without our knowledge and runs against our wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. 4)

What are Temporary Internet Files?

Ans) Temporary Internet Files are, in fact, the cache of the Internet Explorer. This means that when you load a web page with Internet Explorer, it is saved on your computer so that if you later decide to open the same page again, it will open a lot faster. Temporary Internet Files improve speed of web browsing and also make possible so called offline browsing, which gives you the ability to open the web pages from cache even when you are not connected to the Internet. Despite all these positive things about Temporary Internet Files, they have one big drawback: they compromise your privacy. Everyone with access to your computer can look into your Temporary Internet Files folder and see the sites that you have visited in the past. You can manually delete the contents of Temporary Internet Files folder Windows XP or Windows 2000 -- C:\Documents and Settings\<username>\Local Settings\Temporary Internet Files\ Windows Me, Windows 98, Windows NT or Windows 95 -- C:\Windows\Temporary Internet Files\ C:\Windows\Profiles\<username>\Temporary Internet Files\ How to delete Temporary Internet Files? To delete Temporary Internet Files manually, do the following things:

1.

Start Internet Explorer and click Tools menu, then select Internet Options... from this menu. This will open the Internet Options window.

2.

Click General tab and then find in the section Temporary Internet Files the button Delete Files... and click it. A new dialog box opens.

3.

In the Delete Files dialog box, click to select the Delete all offline content check box if you want to delete all Web page content that you have made available offline.

4.

Click OK to delete the files. Note that if you are doing this for the first time, the deleting can take a large amount of time, so be patient.

5)

What are Cookies?

Ans) A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server. The main purpose of cookies is to identify users and possibly prepare customized Web pages for them. When you enter a Web site using cookies, you may be asked to fill out a form providing such information as your name and interests. This information is packaged into a cookie and sent to your Web browser which stores it for later use. The next time you go to the same Web site, your browser will send the cookie to the Web server. The server can use this information to present you with custom Web pages. So, for example, instead of seeing just a generic welcome page you might see a welcome page with your name on it.

6)

Bluetooth and Infrared

Ans) Infrared technology is what most TV remotes use. The distance an infrared signal can travel varies based on the strength of the remote, but is usually less than 50 feet for household electronics. In order for an infrared signal to be detected, there must be a direct line of sight between the transmitter (remote) and the receiver (TV). If there is a wall or large object between them, the signal will not pass through it. Bluetooth, on the other hand, uses a radio frequency, which allows transmission through walls and other objects. The standard range of a Class 3 Bluetooth device is about 30 ft., which makes it ideal for syncing PDAs with computers, using wireless cell phone headsets, and enabling hands free cell phone use inside Bluetooth-enabled automobiles. Because Bluetooth technology is based on a standard 2.4 GHz frequency, different Bluetooth devices can typically communicate with each other, regardless of the manufacturer. Most infrared devices only work with proprietary equipment. While Bluetooth is well on its way to replacing infrared in many different areas, the technology is not meant to be used for wireless networking. Instead, Wi-Fi technology, which has a larger range and higher bandwidth than Bluetooth, is the standard that most wireless networking equipment uses.

7)

Windows file system in all OS

Ans) In computing, a file system is a method for storing and organizing computer files and the data they contain to make it easy to find and access them. File systems may use

a storage device such as a hard disk or CD-ROM and involve maintaining the physical location of the files 8)

TCP/IP

Ans) "Transmission control protocol/Internet protocol." TCP/IP is a combined set of protocols that perform the transfers of data between two computers. Communication protocol used on the Internet. (Transmission Control Protocol/Internet Protocol) - A set of rules that establish the method with which data is transmitted over the Internet between two computers. Transmission Control Protocol/Internet Protocol. A group of protocols that specify how computers communicate over the Internet. All computers on the Internet need TCP/IP software. TCP/IP is the standard communications protocol (language) required for computers on the Internet. 9)

Modem

Ans) A device that allows computers to exchange data over phone lines. Short for modulator/demodulator. A communications device that converts one form of a signal to another that is suitable for transmission over communication circuits, typically from digital to analog and then from analog to digital. 10)

Internet

Ans) A network of computer networks which operates world-wide using a common set of communications protocols. 11)

WWW

Ans) An acronym which stands for "World Wide Web". Computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol 12)

Control Panel

Ans) A program used to change some setting in the operating system or computer. Control panels allow for changing keyboard and mouse sensitivity, speaker volume, display colors and resolution as well as modem, network and printer settings. Control panels are part of most operating systems, but also come with peripheral devices to allow fine tuning of particular features.

13)What is Arpanet ?

The Advanced Research Projects Agency Network (ARPANET) developed by ARPA of the United States Department of Defense was the world's first operational packet switching network, and the predecessor of the global Internet. Packet switching, now the dominant basis for both data and voice communication worldwide, was a new and important concept in data communications. Previously, data communications was based on the idea of circuit switching, as in the old typical telephone

circuit, where a dedicated circuit is tied up for the duration of the call and communication is only possible with the single party on the other end of the circuit. With packet switching, a system could use one communication link to communicate with more than one machine by assembling data into packets. Not only could the link be shared (much as a single mail person can be used to post letters to different destinations), but each packet could be routed independently of other packets. This was a major advancement.

14) What is Search Engine ? A search engine is an information retrieval system designed to help find information stored on a computer system, such as on the World Wide Web, inside a corporate or proprietary network, or in a personal computer. The search engine allows one to ask for content meeting specific criteria (typically those containing a given word or phrase) and retrieves a list of items that match those criteria. This list is often sorted with respect to some measure of relevance of the results. Search engines use regularly updated indexes to operate quickly and efficiently. Without further qualification, search engine usually refers to a Web search engine, which searches for information on the public Web. Other kinds of search engine are enterprise search engines, which search on intranets, personal search engines, and mobile search engines. Different selection and relevance criteria may apply in different environments, or for different uses. Some search engines also mine data available in newsgroups, databases, or open directories. Unlike Web directories, which are maintained by human editors, search engines operate algorithmically or are a mixture of algorthmic and human input.

15) What is FireWall ? A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections set and configured by the organization's security policy. Firewalls can either be hardware and/or software based.

16) What is Web Server ? A computer that is responsible for accepting HTTP requests from clients, which are known as Web browsers, and serving them HTTP responses along with optional data contents, which usually are Web pages such as HTML documents and linked objects (images, etc.).

17) What is Web Browser ? A web browser is a software application that enables a user to display and interact with text, images, and other information typically located on a web page at a website on the

World Wide Web or a local area network. Text and images on a web page can contain hyperlinks to other web pages at the same or different website. Web browsers allow a user to quickly and easily access information provided on many web pages at many websites by traversing these links. Web browsers format HTML information for display, so the appearance of a web page may differ between browsers. Some of the web browsers available for personal computers include Internet Explorer, Mozilla Firefox, Safari, Opera, and Netscape in order of descending popularity (as of August 2006). Web browsers are the most commonly used type of HTTP user agent. Although browsers are typically used to access the World Wide Web, they can also be used to access information provided by web servers in private networks or content in file systems. 18) What is IP Address ? An IP address (Internet Protocol address) is a unique address that certain electronic devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address. Any participating network device—including routers, computers, time-servers, printers, Internet fax machines, and some telephones—can have their own unique address. An IP address can also be thought of as the equivalent of a street address or a phone number (compare: VoIP (voice over (the) internet protocol)) for a computer or other network device on the Internet. Just as each street address and phone number uniquely identifies a building or telephone, an IP address can uniquely identify a specific computer or other network device on a network. IP addresses can appear to be shared by multiple client devices either because they are part of a shared hosting web server environment or because a proxy server (e.g., an ISP or anonymizer service) acts as an intermediary agent on behalf of its customers, in which case the real originating IP addresses might be hidden from the server receiving a request. The analogy to telephone systems would be the use of predial numbers (proxy) and extensions (shared). IP addresses are managed and created by the Internet Assigned Numbers Authority (IANA). The IANA generally allocates super-blocks to Regional Internet Registries, who in turn allocate smaller blocks to Internet service providers and enterprises. 19) What is Client Server ? Client-server is computing architecture which separates a client from a server, and is almost always implemented over a computer network. Each client or server connected to a network can also be referred to as a node. The most basic type of client-server architecture employs only two types of nodes: clients and servers. This type of architecture is sometimes referred to as two-tier. Each instance of the client software can send data requests to one or more connected servers. In turn, the servers can accept these requests, process them, and return the requested information to the client. Although this concept can be applied for a variety of reasons to many different kinds of applications, the architecture remains fundamentally the same. These days, clients are most often web browsers, although that has not always been the case. Servers typically include web servers, database servers and mail servers.

The interaction between client and server is often described using sequence diagrams. Sequence diagrams are standardized in the UML. 20) What is domain name system ? On the Internet, the Domain Name System (DNS) associates various sorts of information with so-called domain names; most importantly, it serves as the "phone book" for the Internet: it translates human-readable computer hostnames, e.g. en.wikipedia.org, into the IP addresses that networking equipment needs for delivering information. It also stores other information such as the list of mail exchange servers that accept e-mail for a given domain. In providing a worldwide keyword-based redirection service, DNS is an essential component of contemporary Internet use. 21) What is Proxy Server ? In computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by making requests to other servers. A client connects to the proxy server, requesting a file, connection, web page, or other resource available from a different server. A proxy server provides the resource by connecting to the specified server, with some exceptions: A proxy server may alter the client's request or the server's response. A proxy server may service the request without contacting the specified server. (A proxy server that passes all requests and replies unmodified is not called a proxy server. It is a gateway.) A proxy server can be placed in the user's local computer, or at specific key points between the user and the destination servers or the Internet. 22) What is URL ? Uniform Resource Locator' (URL) is a technical, Web-related term used in two distinct meanings: • •

In popular usage, it is a widespread synonym for Uniform Resource Identifier (URI) — many popular and technical texts will use the term "URL" when referring to URI; Strictly, the idea of a uniform syntax for global identifiers of network-retrievable documents was the core idea of the World Wide Web. In the early times, these identifiers were variously called "document names", "Web addresses" and "Uniform Resource Locators". These names were misleading, however, because not all identifiers were locators, and even for those that were, this was not {| class="wikitable"

|- their defining |} characteristic. Nevertheless, by the time the RFC 1630 formally defined the term "URI" as a generic term best suited to the concept, the term "URL" had gained widespread popularity, which has continued to this day. 23) What is MainFrame? Mainframe may refer to one of the following: • •

Mainframe computer, large data processing systems Mainframe Entertainment, a Canadian computer animation and design company.

• • • • • •

o Mainframe is the city that the CGI cartoon ReBoot takes place in. Mainframe (band), a 1980s Electropop band Mainframe is the name of two fictional characters from Marvel Comics o Mainframe (comics) appears in the series A-Next o Mainframe appears in the Guardians of the Galaxy series An Autobot character in the Transformers series. A character in the G.I. Joe universe. A character from the game Gunman Chronicles. Computer games originally played on Mainframe type computers

24) What are the types of Domain Name Sytem ? i) Generic domain name sytem-.com,.org ii) Country domain name system-.in,.us 26) Difference between internet and intranet ? An intranet is a private computer network that uses Internet protocols, network connectivity to securely share part of an organization's information or operations with its employees. Sometimes the term refers only to the most visible service, the internal website. The same concepts and technologies of the Internet such as clients and servers running on the Internet protocol suite are used to build an intranet. HTTP and other Internet protocols are commonly used as well, FTP.There is often an attempt to use Internet technologies to provide new interfaces with corporate 'legacy' data and information systems. The Internet is a worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other documents of the world wide web. 27) Classes of IP Address ? Class A-0.0.0.0 to 127.255.255.255 Class B-128.0.0.0 to 191.255.255.255 Class C-192.0.0.0 to 223.255.255.255 Class D-224.0.0.0 to 239.255.255.255 Class E-240.0.0.0 to 247.255.255.255 28) What is HTML ? HTML, short for Hypertext Markup Language, is the predominant markup language for the creation of web pages. It provides a means to describe the structure of text-based information in a document — by denoting certain text as headings, paragraphs, lists, and so on — and to supplement that text with interactive forms, embedded images, and other

objects. HTML is written in the form of labels (known as tags), surrounded by less-than (<) and greater-than signs (>). HTML can also describe, to some degree, the appearance and semantics of a document, and can include embedded scripting language code which can affect the behavior of web browsers and other HTML processors. HTML is also often used to refer to content of the MIME type text/html or even more broadly as a generic term for HTML whether in its XML-descended form (such as XHTML 1.0 and later) or its form descended directly from SGML (such as HTML 4.01 and earlier). 29)What is a VPN ? A virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. The idea of the VPN is to give the company the same capabilities at much lower cost by using the shared public infrastructure rather than a private one. 30) What is a broad band and a Dial-up internet connection? What is the difference between the two? Broad band is a type of data transmission in which a single medium (wire) can carry several channels at once. Cable TV, for example, uses broadband transmission. In contrast, baseband transmission allows only one signal at a time. Dialup access is a way of connecting a computer to the Internet using a modem and the telephone line. It is rather slow and blocks the telephone line. It Refers to connecting a device to a network via a modem and a public telephone network. Dial-up access is really just like a phone connection, except that the parties at the two ends are computer devices rather than people. Because dial-up access uses normal telephone lines, the quality of the connection is not always good and data rates are limited. In the past, the maximum data rate with dial-up access was 56 Kbps (56,000 bits per second), but new technologies such as ISDN are providing faster rates. 31) Define an internet browser. Software package used to view pages on the World Wide Web (including Netscape Navigator, Microsoft Internet Explorer and Mosaic). 32) What is Mosaic ? Mosaic is a web browser (client) for the World Wide Web written at the National Center for Supercomputing Applications (NCSA). Its development began in 1992 and officially ceased on January 7, 1997. 33) What is VOIP ? Voice over Internet Protocol. The technology used to transmit voice conversations over a data network using the Internet Protocol. Such data network may be the Internet or a corporate Intranet.

34) How do we change the system password? It can be changed only if the user logs in with the administrator privilege. At the contral panel the “user control” has to be used and upon entering the old password the new password can be entered. 35) How do we identify the version of the OS of the system ? Right click on “My Computer” and select “properties”. 36) What is http 404 error? The 404 or Not Found error message is an HTTP standard response code indicating that the client was able to communicate with the server but either the server could not find what was requested, or it was configured not to fulfill the request and not reveal the reason why. 404 errors should not be confused with "server not found" or similar errors, in which a connection to the destination server cannot be made at all. 37) What do you do when an internet page requested is not displayed? Firstly we need to check the HTTP status code displayed in the error page and cat accordingly. Verify for physical connections. Delete cookies and temporary internet files. Delete cache. Verify firewall settings and deactivate undesired restrictions. 38) Standard user end HTTP error codes? 400 Bad Request The request contains bad syntax or cannot be fulfilled. 401 Unauthorized Similar to 403 Forbidden, but specifically for use when authentication is possible but has failed or not yet been provided. See Basic access authentication and Digest access authentication. 402 Payment Required The original intention was that this code might be used as part of some form of digital cash or micropayment scheme, but that has not happened, and this code has never been used. 403 Forbidden The request was a legal request, but the server is refusing to respond to it. Unlike a 401 Unauthorized response, authenticating will make no difference. 404 Not Found 405 Method Not Allowed A request was made to a URL using a request method not supported by that URL; for example, using GET on a form which requires data to be presented via POST, or using PUT on a read-only resource 06 Not Acceptable 407 Proxy Authentication Required 408 Request Timeout 409 Conflict

Related Documents

Techinal Questions
June 2020 0
Questions
September 2019 34
Questions
October 2019 21
Questions
November 2019 17
Questions
April 2020 19