Free download networking questions and answers pdf


















OST file is used when we use outlook in cached exchanged mode. Outlook express useds odb file. What do you do when you get blue screen in a computer?

How do you troubleshoot it? BSOD stands for blue screen of Death. If it boots up than the problemis with one of the devices or drivers. RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need.

VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. A reboot of the computer fixes the problem. What to do to resolve this issue? Update the network card driver. How to recover the data? Install another system. Insall the OS with the lates pathces, Antivirus with latest updates.

Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system. A link refers to the connectivity between two devices. It includes the type of cables and protocols used in order for one device to be able to communicate with the other.

Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports. Why we use it?

Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so. Switches which can be administered are calledmanageable switches.

For example we can create VLAN for on such switch. A network card, network adapter or NIC network interface controller is a piece of computer hardware designed to allow computers to communicate over a computer network.

Devices like Modem, Mouse, Keyboard etc can be connected. Broadband offer high-speed Internet access and allows telephone calls and a permanent Internet connection to share a single phone line simultaneously whereas in Dialup connection either Internet connection or telephone call can made at given time. Or, less formally, a network that uses routers and public communications links. Remote Access Services RAS refers to any combination of hardware and software to enable the remote access to tools or information that typically reside on a network of IT devices.

Email clients download your emails onto your computer. Using a specialized email program such as Outlook Express or Apple Mail has the advantage of giving you complete control over your email; every email you receive is placed on your computer and you can keep as many large file attachments as you want.

Checking your email through our webmail is similar to using Hotmail or Yahoo! When you are not online, you are not able to see your email. RAM is the most common type of memory found in computers and other devices, such as printers.

Pronounced rahm, acronym for read-only memory, computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read. If the sender of any message cannot be identified then the message is moved into a spam quarantine folder.

Messages deposited in the spam quarantine folder can be inspected and either deleted or approved at your leisure. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Antivirus is a software program which helps protect a computer against being infected by a virus. The Internet however, is really based on IP addresses.

Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www. Used without parameters, IPConfig displays the IP address, subnet mask, and default gateway for all adapters. It can help you determine why your connections to a given server might be poor, and can often help you figure out where exactly the problem is.

It also shows you how systems are connected to each other, letting you see how your ISP connects to the Internet as well as how the target system is connected. If the first octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then that address is a Class B address. OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to determine the best possible path for data exchange.

Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who want to steal data or computer viruses that can wipe out data in an instant. It also prevents other users from external networks from gaining access to the private network.

Star topology consists of a central hub that connects to nodes. This is one of the easiest to setup and maintain. Gateways provide connectivity between two or more network segments. It is usually a computer that runs the gateway software and provides translation services. This translation is a key in allowing different systems to communicate on the network.

One major disadvantage of star topology is that once the central hub or switch get damaged, the entire network becomes unusable. Red Ray Disk.

Which one is the result of the output given by a computer. Data B. Istruction C. Information D. ROM B. RAM C. DVD D. Hard Disk. The printed output from a computer is called. Copy B. Soft Copy C. Hard Copy D. An operating system B. A processing device C. Application software D. An input device. Tracking B. Formatting C. It happens within a secure ,password protected network. Answer: Network Topology is refers to the way computers and its peripheral environment is configured to form networks.

Answer: Here all nodes are connected to a hub. Packets sent to the hub. Again packets are sent by Hub to the destination. Answer: Here all nodes are connected in a circle. Token is used for transferring data from computers. Here nodes waits for token to send. Answer: These are the larger one connections of networks. How do we connect two devices? By the help of connecting links only.



0コメント

  • 1000 / 1000