Q-1) What is safe mode ? How do you get to it and what is it used for ?
Ans:-In order to reach safe mode, Computer must be restarted and by pressing F8 key before the OS loads you will arrive at the selection screen at which you will scroll up to select "Safe Mode". Safe mode is used to troubleshoot driver issues, hardware issues and remove viruses or unwanted software. In windows 10 the combination key is "Shift + Restart".
Ans:-In order to reach safe mode, Computer must be restarted and by pressing F8 key before the OS loads you will arrive at the selection screen at which you will scroll up to select "Safe Mode". Safe mode is used to troubleshoot driver issues, hardware issues and remove viruses or unwanted software. In windows 10 the combination key is "Shift + Restart".
Q-2) Why do you want to work as desktop support specialist ?
Ans:- I've loved solving computer problems since I was a child. I remember opening my childhood computer and toys to look at what's going on inside them and I tried to understand how they worked. I think desktop support provides me an opportunity to refine my problem-solving skills in the area of IT.
Q-3) What is Networking ?
Ans:- – A computer networking is a set of computers. Computers on a network are
called as nodes. The connection between computers can be done via cabling,
most commonly the Ethernet cables or wirelessly through radio waves.
Connected computers can share resources, like access to internet, printers, file
servers and others. A network is a multipurpose connection, which allows a single
computer to do more.
Q-4) What is the difference between Router and Switch ?
Ans:-
Q-5) How many collision domains are there in switch?
Ans:- As many ports are there in a switch that many collision domains are there.
For example switch with 24 ports has 24 collision domains.
Q-6) How many broadcast domains are there in a switch?
Ans:- Only one broadcast domain is there in any switch.
Q-7) What is collision domain?
Ans:- A collision domain is, as name implies, a part of a network where packet
collisions can occur. A collision occurs when two devices send a packet at the
same time on the shared network segment.
Q-8) What is broadcast domain?
Ans:- A broadcast domain is a domain in which a broadcast is forwarded. A
broadcast domain contains all devices that can reach each other at the data link
layer (OSI layer 2) by using broadcast.
Q-9) What is Topology? What are the different types of topologies?
Ans:- A topology determines the physical arrangement of the devices in a
network. Different types of topologies are bus, star, ring, partial mesh, full mesh,
tree and hybrid topologies.
Q-10) What is a star topology?
Ans:- A star topology is a topology for a LAN in which all nodes (computers) are
individually connected to a central point, like a hub or a switch. A star takes more
cable than e.g. a bus, but the benefit is that a cable fails; only one node will be
brought down.
Q-11) What is a bus topology?
Ans:- A bus topology is a topology for a LAN in which all nodes (computers) are
connected to a coaxial cable in a liner method, the coaxial cable is also known as backbone or trunk which needs to be terminated at the both ends. If a backbone
is broken, the entire segment fails.
Q-12) What is cloud computing?
Ans:- Cloud computing is a type of computing that relies on shared computing
resources rather than having local servers or personal devices to handle
applications.
In its most simple description, cloud computing is taking services and moving
them outside an organization’s firewall. Applications, storage and other services
are accessed via the Web.
Q-13) What is E-mail Client? Name of any 5?
Ans:- E-mail client is an application which allows you to store mails locally on your
computer so that you can access previously stored mail even you are not
connected to internet. MS-Outlook, Windows-Mail, Mozilla Thunderbird, Lotus
notes, Postbox and Apple mail are some famous email clients.
Q-14) What is Office 365?
Ans:- Microsoft Office 365 is Software as a Service (SaaS) solution that includes
Microsoft Office and other services, such as email and collaboration, from
Microsoft's cloud server. Microsoft Office 365 provides desktop functionalities
and is available by subscription.
Q-15) What are the different ways to share the internet?
Ans:- Followings are the ways to share the internet
A) Internet Connection Sharing (ICS)
B) Network Address Translation
C) Proxy
Q-16) What is the MAC filtering?
Ans:- MAC Filtering refers to a security access control method whereby the 48-bit
address assigned to each network card is used to determine access to the
network.
Q-17) What is SSID in wireless network?
Ans:- SSID is the name assigned to a Wi-Fi (wireless) network. All devices in the
network must use this case-sensitive name to communicate over Wi- Fi. Wireless
routers and access points have a default SSID, which may be the manufacturer’s
name, such as “Linksys” or “netgear” or simply “default”. Some devices use their
model number as the SSID. Using browser, the SSID (and password) can be
manually changed in the device’s configuration settings.
Q-18) What is the deference between Ad-Hoc and Infrastructure wireless
Network?
Ans:- In Ad-hoc network devices are connected in wireless network using their
LAN cards and Access Point or Wireless Router is not required in Ad-Hoc.
In Infrastructure network devices are connected in network through Wireless
Access Point of Wireless Route.
Q-19) What are the ways to secure wireless network?
Ans:- Following are the way to secure wireless Network
- Change the default setting of wireless router (IP Address, SSID, Admin Password etc)
- Configure Network Password
- Enable encryption
- Configure MAC filtering
- Disable SSID broadcast
- Configure 802.1x
- Physical security of Wireless Router/Access Point
Define the following…
A. SSID- SSID is technical term for a wireless network name. When you
set up a wireless network, you give it a name that is called SSID. SSID
is a case sensitive, 32 alphanumeric.
B. Mac Filtering refers to a security access control method whereby the
48-bit address assigned to each network card is used to determine
access to the network.
C. WEP and WPA are the encryption method used in wireless network.
WEP provides 56 or 128-bit encryption whereas WPA provides 256-
bit encryption.
Q-20) What is the difference between wired and wireless LAN?
Q-21) What is a Telnet?
Ans:- Telnet is an application protocol for accessing remote computers.
Through Telnet, an administrator or another user can access other computers
remotely.
Q-22) What is ping command?
Ans:- The Packet Internet Gopher (Ping) command helps to verify IP-level
connectivity. When troubleshooting, you can use ping to send an ICMP echo
request to a target host name or IP address.
Q-23) What is use of tracert command?
Ans:- Tracert command can show you the path of packet from your computer to
the Destination. It will list all the routers it passes through until it reaches its
destination.
Q-24) What is the use of pathping command?
Ans:- The pathping command is a route tracing tool that combines features of
the ping and tracert commands. The pathping command sends packets to each
router on the way to a final destination over a period of time .
Q-25) What is a switch?
Ans:- A Switch operates of the Data link layer of OSI model. It connects multiple
devices together in a single network segment. It is called an intelligent network
device because it creates own MAC address table to forward the frame to the appropriate destination. It operates in full duplex mode and provides guaranteed
bandwidth to the connected device.
Q-26) What is a router?
Ans:- Router is a network layer device which communicates deferent networks
which may be near or very far. A router sends or forwards the packets to the
destination network using the best route.
Q-27) What is FTP?
Ans:- The File Transfer Protocol (FTP) is a standard network protocol used to
transfer computer files from one host to another host over a TCP-based network.
Q-28) What is difference between HTTP and HTTPS?
Q-29) What are differences between TCP and UDP?
No comments:
Post a Comment