Top Banner
Interview Questions for Desktop Support Interview Questions for Desktop Support Technician/Analyst General Questions Q. What desktop operating systems are you familiar with? A. Before you answer this question, you should have some background information on what operating systems are used within the organization you are interviewing with. Undoubtedly, you will be asked to elaborate on your skill set with each of these operating systems so it’s best to tailor your elaboration to the operating systems that are relevant to the hiring manager. This being said, don’t leave out mentioning experience in other operating systems. You never know whether the company may be evaluating the migration to a different OS. Q. Have you used imaging software before? How do you find these tools useful? A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that you’ve used. Hiring managers want to assess your in-depth knowledge and experience with using these tools. This means talking about how you use their various feature sets. (If you have an opinion, you probably know the product pretty well.) Q. What are the pitfalls of using imaging software? A. This question is meant to assess how well you know these products. For example, discussing the importance of testing the image demonstrates that you use these tools on a regular basis. Q. Have you used any software distribution tools? If so, which ones and how were they used? A. Like imaging software, software distribution tools are an important part of your job. Hiring managers are looking for knowledge that these tools exist and how they can be used to support your organization. Q. What do you like most about desktop support? A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the job: being busy, working with different people, and the challenges of learning new operating systems and configurations. Q. What do you like least about desktop support? A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here would be not being able to resolve a problem in a timely manner for reasons outside your control, such as hardware failure. Stick to things outside of your control for the best response. Q. When solving a desktop problem, do you prefer to work with the end-user, your peers, or on your own? A. This is another question to determine your fit within the organization. Hiring managers understand that to be successful as a support technician you will have to work in a team environment. This means working with other employees, vendors, and end-users on a constant basis. Q. Can you describe a situation where you have had to deal with a difficult person? How did you handle it? Would you do anything differently? A. Desktop support can be very demanding some days. End-users only see their own
60
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Desktop Level 2 Question_Network

Interview Questions for Desktop SupportInterview Questions for Desktop Support Technician/Analyst

General QuestionsQ. What desktop operating systems are you familiar with?A. Before you answer this question, you should have some background information on what operating systems are used within the organization you are interviewing with. Undoubtedly, you will be asked to elaborate on your skill set with each of these operating systems so it’s best to tailor your elaboration to the operating systems that are relevant to the hiring manager. This being said, don’t leave out mentioning experience in other operating systems. You never know whether the company may be evaluating the migration to a different OS.Q. Have you used imaging software before? How do you find these tools useful?A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that you’ve used. Hiring managers want to assess your in-depth knowledge and experience with using these tools. This means talking about how you use their various feature sets. (If you have an opinion, you probably know the product pretty well.)Q. What are the pitfalls of using imaging software?A. This question is meant to assess how well you know these products. For example, discussing the importance of testing the image demonstrates that you use these tools on a regular basis.Q. Have you used any software distribution tools? If so, which ones and how were they used?A. Like imaging software, software distribution tools are an important part of your job. Hiring managers are looking for knowledge that these tools exist and how they can be used to support your organization.Q. What do you like most about desktop support?A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the job: being busy, working with different people, and the challenges of learning new operating systems and configurations.Q. What do you like least about desktop support?A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here would be not being able to resolve a problem in a timely manner for reasons outside your control, such as hardware failure. Stick to things outside of your control for the best response.Q. When solving a desktop problem, do you prefer to work with the end-user, your peers, or on your own?A. This is another question to determine your fit within the organization. Hiring managers understand that to be successful as a support technician you will have to work in a team environment. This means working with other employees, vendors, and end-users on a constant basis.Q. Can you describe a situation where you have had to deal with a difficult person? How did you handle it? Would you do anything differently?A. Desktop support can be very demanding some days. End-users only see their own priority needs and often are not interested in other demands on your time. This question explores how you deal with a difficult end-user by understanding their problem, assessing priorities, and communicating a timeframe for resolution. Often good communication can help both sides come to an agreement. Make sure you have an example with a successful outcome.

Page 2: Desktop Level 2 Question_Network

Q. How would you say you are able to handle stress?A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress. Sometimes from the answer, they can also determine whether you are prone to stress. When responding, some techniques for handling stress that you may want to talk about include continually evaluating what’s on your plate and prioritizing, communicating with your manager on what your priorities are, and making sure that you take a break to reenergize, particularly at lunch time.Q. What do you see yourself doing two or three years from now?A. Hiring managers want you to stick around. They realize that you will not be in this position forever, and they want to make sure there’s a desire to move up within the organization as well as the right fit. They ask this question to see whether there’s a growth path for you possible within the organization. As a desktop technician, natural growth paths are team leads, quality assurance, engineering positions, and entry-level development. Be honest about where you want to be in two to three years, and ask the interviewer whether they see your career path as a possibility.Q. How do you learn new technologies?A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning technology on their own and who has the foresight to look for training opportunities. Besides the traditional books and manuals, don’t forget to include user groups, eLearning subscriptions, and IT professional sites such as CramSession.Q. How do you prioritize tasks and manage your time?A. What hiring managers want to know is whether you have time-management skills. Everyone manages their time differently, but think about how you handle e-mail, when you check voice mail, how you respond to pages, when you research and document, and how you pick up new trouble tickets.Q. Imagine the following situation: you receive three simultaneous calls from three vicepresidents who need assistance immediately. How do you manage these conflictingpriorities?A. Obviously this is a trick question. What the hiring manager is trying to assess is how you set expectations with each of the individuals, knowing very well that you won’t be able to assist all of them at the same time. They are also looking for how you will prioritize each of these incidents, including seeking assistance from peers and supervisors in order to meet user expectations. Don’t allow the “tyranny of the urgent” to divert you from managementestablished support priorities.Q. How would you handle a user who continually misdiagnoses their PC issues?A. By asking this question, the hiring manager is assessing your customer service skills. In this situation, you may want to discuss that the key is to not offend the user and turn them off to your support services. In handling this situation, you would pay particular attention to ways you can build trust with the user and lead them to the right resolution to their problem.These components may include:

Acknowledging the user’s diagnosis Asking the user to reproduce the problem Finding a solution that works

Q. How do you handle setting up new employees?A. This question is used by the hiring manager to assess your knowledge of common practices within the IT department, such as setting up new users. Obviously, the IT department plays a critical role in the productivity of the new employee. The role of the desktop technician is to help ease the new employee into the resources available to them and get them up to speed quickly. In responding to this question, you may want to talk about some of the tools you’ve used inthe past to help users acquaint themselves with their new environment. Some tools that help are:

Page 3: Desktop Level 2 Question_Network

A new-user welcome letter that is customized to the specific user with all their relevant information including telephone extension, how to access voice mail, and how to log in. It might also include a FAQ on getting help.

A “Getting to Know Your Helpdesk” document that provides an orientation to helpdesk service, such as how to contact the helpdesk, its hours of operation, what is and what is not supported by the helpdesk, and answers to common new-user questions.

Technical QuestionsQ. What questions would you ask to help isolate a user’s problem?A. This question is used by the hiring manger to assess your problem-solving abilities. The following represent some of the common questions that you would ask the end-user to help diagnose a situation:

When did the problem first start? Has the system ever worked properly? What was the last thing done to the system prior to the failure? Is the issue intermittent or ongoing/constant? Are there any error messages? If so, what are the specific error messages? Has any new hardware been added to the system? Has any new software been added to the system, including downloads from the Internet? Has anything changed with the system (for example, has it been moved) since the issue

presented itself? Has anyone else had access to the system? Are there any environmental factors that could be causing the issue? Have you done any troubleshooting on the system on your own? Have you checked all the cables/connections for a tight fit?

Q. What are the main differences between the following operating systems?A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you know more than just the current version because there will always be a user who has a problem with an older version. By asking this question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The following provides a concise summary of some of the major differences.Windows 2000 and XP

Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the hands of consumers. The major changes include the following:

Device driver rollback Remote control (single-user terminal services) New Start menu, control panel, and user interface elements Fast user switching Encrypted file system support for redirected folders Better support for roaming wireless networking Enhanced policies Credential Manager Personal firewall

Q. What are typical virus sources and how do you prevent virus attacks?A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections:

Use anti-virus software. Perform regular updates to the virus software definition files and scan engines. Verify

updates have succeeded.

Page 4: Desktop Level 2 Question_Network

Perform regularly scheduled virus checks. Configure software to check all files, not just program files. Educate users on virus attacks, their consequences, and how to prevent them. Know where all software came from. Do regular backups. Develop reporting mechanisms to inform server administrators of observed desktop

infections and how these could impact the server environment (such as deletions or corruption of files on public shares, hidden payload files that might have been uploaded to servers, and so on).

Q. What are some of the guidelines you would recommend for implementing security at the user level?A. Security is a major part of the desktop technician’s day-to-day responsibilities. As the closest point of contact to the end-users, technicians need to be savvy on the different methods for enforcing security. Some of the top techniques are included below.

Anti-virus software:

Ensure that all users install and regularly use anti-virus software on their PCs. Instruct users to immediately notify the helpdesk when they suspect they’ve contracted a

virus.Password security:

Instruct users not to give out their passwords. Instruct users not to write down their passwords. Instruct users to make sure their password cannot be easily guessed by using a combination

of alphanumeric characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { } / ? < > , ; : \ | ` ’ ” .).

Instruct users to change their password if they think there is even a slight chance someone knows it.

Instruct users to ensure their password is at least eight characters long. Instruct users not to use a variation of their user ID. Regularly change passwords on Administrator accounts on PCs (NT, Windows 2000 and XP)

Desktop security:

Instruct users not to leave their workstation logged in overnight. Instruct users to enable screen savers that automatically lock their PC when there is no

activity on it for more than five minutes.

What is picking and packing in computer networkingAs far as I know this term is used for items that needs to be picked from various locations in a warehouse whenever a customer fills the shopping cart and & submits the list for purchase.

What are port numbers for telnet , ftp, http and rpcTelnet : Remote login works on port number 23.

Allows you to establish remote session on the server. Does not support Graphical User Interface (GUI) interface but supports only through commands, i:e; command line utility. And provides very little security.

FTP : File Transfer Protocol works on port number 20/21.FTP works on Application Layer Protocol and is used to transfer files securely between TCP/IP systems, providing file security. More secured because of user authentication and user logons and

Page 5: Desktop Level 2 Question_Network

uses two types of connections (Data and Control Connection). FTP uses many commands and FTP uses TCP,i:e; 20 port number for data connection and 21 for control connection.

HTTP : Hypertext Transfer Protocol works on port number 80. HTTP is used to transfer hypertext files across internet. Requires an HTTP client program on one end and HTTP server program on other end.

RPC : Remote Procedure Calls works on port number 135.RPC is used for remote administration. Its function is to forward application function call to a remote system over the network. It can be used in IPv6 or IPng (IP version 6 or IP next generation which uses 128 - bit IP addressing).

Networking questionsWhat is stub area? what is mean by area? what is cost of osPF ? what is vpn ? what is vlan what is gre ? what is hsrp? tell me diffrence between isdn & atm ? what is mean by dtp?

IIS server backupHi, Its too simply to IIS backup. Take the system state backup in that only IIS will be consider, if the server is IIS.

You want to connect a cable modem to a switch. Which cable would you use?Straight cable.

If we use different devices we can use straight cable.If we use same devices we can use cross cable

For connecting the Switch to Modem we use standard cable in any version of UDP (cat 1.2.3.4.5.5e.6)

Which intermediary device regenerates data signals ?Basically when our signal is weak (on a network) then we should have a repeater device. This device used to regenerate the weak signal.

What is difference between ipv4 & ipv6 ?IPv4 means Internet Protocol version 4, whereas IPv6 means Internet Protocol version 6.

IPv4 is 32 bits IP address that we use commonly, it can be 192.168.8.1, 10.3.4.5 or other 32 bits IP addresses. IPv4 can support up to 232 addresses, however the 32 bits IPv4 addresses are finishing to be used in near future, so IPv6 is developed as a replacement.

IPv6 is 128 bits, can support up to 2128 addresses to fulfill future needs with better security and network related features. Here are some examples of IPv6 address:1050:0:0:0:5:600:300c:326b ff06::c3 0:0:0:0:0:0:192.1.56.10

The most important difference is that it has a larger address space. IPv6 uses 128 bits, instead of the 32 bits used in an IPv4 address. 

Page 6: Desktop Level 2 Question_Network

Ans :-There is major difference between IP V.4 and IP V.6 such as -1.In IP V.4 is a 32 bits IP Address but IP v.6 128 bits IP Address.2.IP v.4 is a Decimal Format, but IP V.6 is Hexa-Decimal Number.3.IP V.4 has 4 Octets, but IP V.6 has 16 Octets.4.IP V.4 is supported by Operating System, but IP V.6 is supported by only some Operating System.5.In IP V.4 only limited number of IP Address are available, but in IP V.6 a number of IP Addresses are available.

Role of active directoryActive Directory will represent a major advance over NT 4.0's simple domain model, since the domains within Active Directory will be able to form a multi-level tree structure. Customers will be able to establish two-way transitive trust relationships among these domains. Lower-level domains trust all the higher-level domains within the hierarchical tree. This arrangement will make trust relationships easier to manage and will make possible the delegation of administrative authority from higher to lower levels within the tree. Active Directory will bear on security in two ways. First, Active Directory will be the repository for security policy information for the enterprise. For example, Active Directory will be able to store domain-wide password restrictions and system access privileges. Second, Active Directory will incorporate the object-based security model, controlling each user or group's right to read or update objects within the directory. The directory will therefore be able to hold such important items as encrypted passwords and user certificates with the assurance that only authorized users will be able to read or change them.

What is the advantage of subnetting an ip address?Subnetting is a best technique for network.When we split a large n/w into small n/w it is a called Subnetting. with the help of subnetting we can reduce the N/w congetion. Because all coputer broadcast for transmission. So we break huge network into small network and now broadcasting will be done only small network. 

Wth the help of subnetting we can save money. Because we buy an single IP address from ISP and  encrese the IP address from Subnetting. 

That's why we can say that subnetting is best tool for encrese bandwidth and save the money.

Subnetting is a technique using which we can create segments in a large netwroks.

lets go by an example..where we have private ip address n/w 10.0.0.0 /8.What this means is that we will have 2^24 -2 address in the same network..so broadcast will go to all the addresses in this n/w.But if we subnet the n/w we can create multiple n/ws ...since by default routers won't allow broadcasts to be sent to other n/w..we can manage our n/ws in a better way.

If a problem is occured in any specific segment..it won't affect other segments.

We can also save precious ip addresses in a network using subnetting.

What is router?it is used for communication between two VLAN'sA router is a OSI layer 3 device used to connect devices belonging to different networks

How does dora process works in dhcp?DORA stands for Discover Offer Request Ack 

Page 7: Desktop Level 2 Question_Network

When there is request been sent from the client and there should be a response should be sent from the the server, So the process discovering the request been sent from which client and send the Ack to the client from te server that the request is been accecpted 

How will you check if router goes down?As a engg, in client place router goes down & client do not know anything about it, how will you check it & how you will make it up (by siting in your office)? What are all precheck you will do in client place & what cmd you will use to check it?

Every router has a LED to indicate whether the connection to the internet is healthy/not.If the connection is healthy i.e. smooth n going.... then the LED glows GreenIf the connection is unhealthy i.e. the router goes down / there is some disruption in the n/w path.. then the LED glows Amber (Yellowish Orange)

Can infrastructure master and GLobal catalog be on same domain?no because Infrastructure master performs its task by comparing its state against the state of a GC - and updates other DCs in the same domain based on the outcome. Effectively, the update would never took place since no differences would be detected.

Mac address and ip addressWhy we want mac address as well as ip addresswhy one address is not enough in net work

mac adress is the physical adress of a computer.which is 48 bit.but ip adress is the logical adress assinged to   perticular computer .there is two version of ip adress ipv4(32 bit) and ipv6(64 bit).if u type ipconfig/all from the command promt of a computer u can find that both adress.

IP Address : Its a 32-bit unique numeric identifier assigned to every host on the network. Its a logical address of any TCP/IP host or a machine (computer).

IP address helps a system to be uniquely identified on the network. We can check the IP address of any computer by typing the following in the command prompt : ipconfig and hit enter.

MAC Address : Its a 48-bit unique address embedded or encoded on the network card (NIC). MAC address is also called ethernet address, hardware address and physical address.

We can check the MAC address of any computer by typing the following in the command prompt : ipconfig /all and hit enter. This command helps to view the IP address and MAC address of the computer simultaneously.

Internet connection issueIf someone finds that their internet connectivity is down, how would you fix the problem?:I would ask them to do the following steps.

Step 1. Reset / Restart the Modem. If no connection then

Step 2. Reset Network Connection / Restart the PCIf not connection then

Step 3. Call up the Internet Service Provider and log a complaint.

Page 8: Desktop Level 2 Question_Network

If someone is using a laptop they may have accidentally turned their wifi connection off. This is fixed by:

Looking for the wifi connection button on the top row of the keyboard. It looks similar to the letter A surrounded by parenthesis. Push it to turn the wifi connection back on.

A user can log on to the network but has no internet connection? Explain what could be the problem.Check that user account is part of appropriate security groupcheck the proxy settings of the network.

if after checking both doesn't worktry refreshing the group policy and reinstall the client software (browser)

First of all check weather the user account has appropriate membership on the domain to access internetif that is OK please check the proxy settings of the web browser

if that is OK too try to refresh the group policy of the client and run the login script to make sure all permissions are refreshed .

if after following all these steps no connectivity please reinstall the browser or repair it an restart the PC

First check the user account's membership in ADif account is allowed to access internet check proxy settingsif proxy settings are all ok update the group policy of the client machine and rerun the login script if does not work reinstall the client software

EthernetWhat is the differnce b/w ethernet and internet?

Internet is global network or in other words we can say it is WAN. But Ethernet is a medium that is used to connect computers in a LAN. These computers may be hosts or clients.

Ethernet is a physical and data link layer technology for LANs. IP use Ethernet as their transmission medium. Data travels over Ethernet inside protocol units called frames.

The Internet is a global system of interconnected computer networks that use the standard TCP/IP to serve billions of users worldwide. It is a network of networks

Acl and firewallHow does a firewall differ from acl?

ACL Manager lets you control routers and firewalls from your PC . Deploy the same access list to different device types such as Cisco and Juniper. Save time and money in router ACL management. Manage thousands of routers from a single application. Minimize errors in ACL deployment.

A ACL is a Active Control List - So you specify a rule in a list of rules that data on a certain ip and or port can access another port and or ip address.  In essence its more like a rule in a router, allow everything to flow unless you specifically want it to do something else.

Page 9: Desktop Level 2 Question_Network

Where as a firewall acts as a inbetween between a trusted network and a untrusted one, so you could make a firewall not allow any traffic into your network except that on port 80 or even except traffic from a certain IP address.What is ads & adsl?ADS stands for Active Directory Services.  Generally anything to do with authentication against an Active Directory to workstations or network shares as well as global and security group membership is covered under ADS.

ADSL is short for Asynchronous Digital Subscriber Line.  DSL is a very common broadband Internet access method in use all over the place.  Asynchronous means that the rate of download is different from, and in my experience always greater than, the rate of upload.  It is also possible to have SDSL.  That would be Synchronous where the rate of download and upload is the same.

Cache modeWhat is cache mode? Wat is the use of cache mode?While configuring Exchange mail client in outlook for the user. there it shows two modes:

1. Cache Exchange Mode

2. Offline Mode

1. Cache Exchange Mode:  Cached mode is generally faster when you're connected and reduces network traffic (especially useful across slower links). Also can require less effort by the user and less impact on their productivity [not as much time spent waiting for synchronizations to finish].

2. Offline Mode: is used to configure mail a/c in mobiles users.

It stores a copy of your network mailbox, including your messages and other information  on your local drive. This allows you to use GroupWise whether or not your network or Post Office Agent is available. Because you are not connected to the network all the time, this mode cuts down on network traffic and has the best performance. A connection is made automatically to retrieve and send new messages. All updates are performed in the background so your work is not interrupted.

You should use this mode if you have enough disk space on your local drive to store your mailbox.

What is rsa

Rivest Shaver Hadelman is an algorithm used in Encryption & decryption of the data, in Information Security.

Remote Supervisor Adapter.Allows remote control of hardware and operating systems.

Technical support job questionsAsked By: anurag.netdeveloper | Asked On: Feb 18th, 2011

1.When their is virus in your comp-(it shutdown the comp in 1min)what is the action that needs to be taken? 2.Can you connect two monitors to one comp? 3.What is the mac address? 4.Where do you use apply dgma? 5.How do u define network? 6.What do u do when u get an error message "page...

Page 10: Desktop Level 2 Question_Network

Protocol configurationWhat is meant by protocol configuration? What are the available types?Protocol means set rules applying to system which is in network to communicate to another system. General protocol use in between PC-to-PC communication is TCP/IP.

The other protocols are FTP,SMTP,POP,HTTP,HTTPS etc.

The other protocols use in network are RIP,IGRP,EIGRP,OSPF,BGP,IS-IS etc called as routing protocols. These protocols used for communication in between routers.

Multiple active directory forestsWhat might be some valid reasons for maintaining multiple active directory forests?The multiple active directory forests are implemented when there is a big environment with multiple domains.1. Security 2. Better Management.

Configure dns

configure DNS for Active Directory. Here is the procedure.

1. Click Start --> Settings --> Control Panel.

2. Double-click Add/Remove Programs and then click Add/Remove Windows Components.

3. In Components, select Networking Services and then click Details.

4. In Subcomponents of Networking Services, select the Domain Name System (DNS) check box, click OK, and then click Next.

5. In Copy Files From, type the full path to the Windows 2000 distribution files and then click OK.

To host Active Directory, you must properly configure DNS with a zone for the Active Directory namespace. You should create both zone types for a proper DNS implementation for your Active Directory namespace — that is, a forward lookup zone and a reverse lookup zone. Read on to discover how.

Creating a forward lookup zone

To create a forward lookup zone:

1. Click Start --> Programs --> Administrative Tools --> DNS.

Windows 2000 launches the DNS Microsoft Management Console, from which you can perform your DNS administration.

2. Expand the DNS server.

3. Right-click the Forward Lookup Zone folder and choose New Zone.

4. Click Next to continue when the New Zone wizard appears.

The wizard takes the pain out of DNS administration.

5. Ensure that Standard Primary is selected and click Next.

6. Ensure that Forward Lookup Zone is selected and click Next.

7. At the New Zone page, type the name of your zone (for example, fordummies.com) and click Next.

Page 11: Desktop Level 2 Question_Network

8. Select Create a New File With This File Name and click Next.

9. Click Finish.

Creating a reverse lookup zone

To create a reverse lookup zone:

1. Click Start --> Programs --> Administrative Tools --> DNS.

2. Expand the DNS server.

3. Right-click your server and choose New Zone.

4. Click Next to continue when the New Zone wizard appears.

5. Ensure that Standard Primary is selected and click Next.

6. Ensure that Reverse Lookup Zone is selected and click Next.

7. Ensure that Network ID is selected, type your network ID in the Network ID field, and click Next.

8. Select Create a New File With This File Name and click Next.

9. Click Finish.

As far as Active Directory is concerned, your DNS server is almost ready. You should now configure the forward and reverse lookup zones for dynamic updating so that you do not get stuck creating all the records required for Active Directory yourself!

GatewayWhat is a gateway? How does it work?A gateway is a network point that acts as an entrance to another network.

Every device in the network is configured with gateway address. The gateway address should be on the same subnet.

Configure managable switch1. Setup utility that comes with the package via an ethernet connection.2. 2. Local console management in terminal emulation program via a rs-232 cable connection.

Ad replicationHow does active directory replication work?

Active Directory,the Directory service that is included with the Microsoft Winows 2000 and 2003,is a distributed directory service.Objects in the Directory are distributed across the domain controllers in a forest, and all the domain controllers in a domain can be updated directly,this is called Multimaster.REPLICATION is the process by which the changes made on one domain controller are synchronized with all the other domian controllres in the domain or the forest.Data integrity is maintained by tracking the changes made on each dc and updating other domain controllers in a systematic way.For any further information you can also refer to the following microsoft articles:-How Active Directory Replication Topology Workshttp://technet2.microsoft.com/windowsserver/en/library/c238f32b-4400-4a0c-b4fb-7b0febecfc731033.mspx?mfr=true How the Active Directory Replication Model Workshttp://technet2.microsoft.com/windowsserver/en/library/1465d773-b763-45ec-b971-c23cdc27400e1033.mspx?mfr=true

Active Directory also includes a replication feature. Replication ensures that changes to a domain controller are reflected in all domain controllers within a domain. A domain controller stores a replica of the domain directory. Each domain can contain one or more domaincontrollers.Within a site, Active Directory

Page 12: Desktop Level 2 Question_Network

automatically generates a ring topology for replication among domain controllers in the same domain. The topology defines the path for directory updates to flow from one domain controller to another until all receive the directory updates .

Within a site, replication between domain controllers happens automatically.The ring structure ensures that there are at least two replication paths from one domaincontroller to another. Therefore, if one domain controller is down temporarily, replicationstill continues to all other domain controllers.Active Directory periodically analyzes the replication topology within a site to ensurethat it is still efficient. If you add or remove a domain controller from the network or asite, Active Directory reconfigures the topology to reflect the change.

GLobal catalogHow would you go about optimizing GLobal catalog server placement in a campus environment?usually you should have one per site if that is not possible you would want it centered in your network

What is the network topology of the systems you are most used to dealing with?Advantage of wi-fi technologyAsked By: dilip agrawal | Asked On: Jan 10th, 2008Network topology is the way in what way the networking had been done!Topologies are of different typesBus topology, ring, star, mesh...

Here many are out of focus!

Presently most of the Network Admin's prefer for Star topology only!Bcoz of time consumption will be less.. so that network will be faster!

What is cutting edge technology?

What is meant by active directory?Asked By: umj5782 | Asked On: Oct 24th, 2007

8 answersAnswered by: Anil Kumar on: Jan 22nd, 2012

Active Directory is the brain of the windows server. It is a database file which stores the objects. Objects are nothing but users, printers, computers.....etc.Answered by: shajan on: Jan 5th, 2012

Active directory is a secure hirachical database which maintains the informations about user, computer, printer and network connected devices etc.Answer Question  Select Best Answer

Active directory sysvol folderAsked By: sarunhere | Asked On: Jan 28th, 2008

6 answers

What is the sysvol folder?Answered by: Augustinprabhu on: Dec 14th, 2011

All database of active directory stored in sysvol folder & its only created on NTFS partition The Active Directory Database is Stored in %SYSTEM ROOT%NDTS folderAnswered by: Arunkumar on: Sep 20th, 2011

All active directory data base security related information store in SYSVOL folder and its only created on NTFS partition. B: The Sysvol folder on a Windows domain controller is used to replicate fil...Answer Question  Select Best Answer

Page 13: Desktop Level 2 Question_Network

What is disk scheduling algorithm?Asked By: pollarnets | Asked On: Aug 15th, 2011

1 answerAnswered by: Lokesh M on: Dec 9th, 2011

Disk scheduling algorithms are algorithms designed and used for scheduling disk operations Disk scheduling algorithms dramatically increase disk performance Disk scheduling algorithms aims to minimiz...Answer Question  Select Best Answer

Windows server 2003 and windows server 2008Asked By: alpesh.suthar | Asked On: Oct 13th, 2011

1 answer

What is the difference between windows server 2003 and windows server 2008 ?Answered by: Syed Muhammad Owais Qadri on: Dec 9th, 2011

Here i would like to share the difference between servers edition, have a look... 1)2008 is combination of vista and windows 2003r2. Some new services are introduced in it 1. RODC one new domain cont...Answer Question  Select Best Answer

Locality of referenceAsked By: glory agarwal | Asked On: Aug 27th, 2011

1 answer

What does locality of reference mean in term of operating systemAnswered by: Lokesh M on: Nov 30th, 2011

In order to run a computer, several data locations needs to be referenced in a short period of time. Such data locations consists are in relatively well predictable clusters. This concept of frequentl...Answer Question  Select Best Answer

How do you handle a unhappy customer?Asked By: shavonte | Asked On: Oct 31st, 2008

2 answersAnswered by: Nitin Laxman Bobade on: Nov 22nd, 2011

This is a common problem faced by a everyone working in support team. 1. don't try to argue with him. 2. try to understand the issues or problems he is facing. 3 .don't promise him heaven and eart...Answered by: segotoke on: Dec 4th, 2008

First listen to customer give time to explain the problem and from there you have to give a customer a smiling voice and provide the solutionAnswer Question  Select Best Answer

Active directory ad databaseAsked By: sarunhere | Asked On: Jan 28th, 2008

4 answers

Where is the ad database held? What other folders are related to ad?Answered by: Dipti ranjan Barik on: Sep 14th, 2011

The directory database is ntds.dit contains on the folder: c:\windows tds and there is a folder sysvol contains information of registry setting and group policy settings.Answered by: kimskshen on: Sep 11th, 2011

C:WINDOWS tds tds.ditAnswer Question  Select Best Answer

What is a proxy server and what are its functions?Asked By: SiziRose | Asked On: Apr 26th, 2011

1 answerAnswered by: Shafi23 on: Sep 6th, 2011

proxy server is used for sharing the internet.Answer Question  Select Best Answer

Role of dns in windows 2003Asked By: ravila23 | Asked On: Feb 21st, 2008

Page 14: Desktop Level 2 Question_Network

4 answers

Explain the role of dns in windows 2003 server.Answered by: Shafi23 on: Sep 6th, 2011

DNS is used for resolving IP address to FQDN and FQDN to ip address.Answered by: petkar on: Jun 17th, 2010

actually DNS name resolution system we not able to remember machines by ip address we remember they as a computer name and machine dont understand name, it only understand ip for that perpose we use D...Answer Question  Select Best Answer

What are the alarms in solaris UNIX ?Asked By: jpreddy | Asked On: Aug 30th, 2011

Answer Question

How many max tape drives having a media server?Asked By: ramesh | Asked On: Aug 19th, 2011

Answer Question

Can raid be constructed by using different size hard disks?Asked By: sunilbaglur | Asked On: May 5th, 2011

1 answerAnswered by: Sabu on: Aug 3rd, 2011

Yes it is possible but if you configure raid 1 you will get only the least size HDDAnswer Question  Select Best Answer

What is the use of terminal server?Asked By: waugh_ananda | Asked On: Feb 23rd, 2008

4 answers

Without having the terminal server installed we can get the desktop of a system on a remote system through remote desktop connection by enabling remote desktop. Then what is use of terminal service?Answered by: munees on: Jul 27th, 2011

To allow the server to run Multi - session client mode for applications through remote desktop protocol or for Remote terminal services.Answered by: Pravin Bargode on: Jun 30th, 2011

Terminal services is a component of microsoft windows operating systems (both client and server versions) that allows a user to access application or data stored on a remote computer over a network co...Answer Question  Select Best Answer

Active directory partitionsAsked By: sunilbaglur | Asked On: May 5th, 2011

2 answers

What are active directory partitions? How many directory partitions are there in ad database.Answered by: CHITARANJAN SATHUA on: Jul 15th, 2011

there are 4 Partition in AD (1)Schema partition (2)Configuration partition (2)Domain partition (3) Application partitionAnswered by: CHITARANJAN SATHUA on: Jul 15th, 2011

There are (1)Domain Partion (2)Application Partion (3)Schema Partition (4)Configure PartitionAnswer Question  Select Best Answer

Transferring domain controller to another windows 2003 server to make domain controllerAsked By: vravis | Asked On: Jan 2nd, 2008

6 answers

Hi all,i have one DC running on windows 2003 with its objects, but now I want to transfer it to another machine, without having changing from previous system's permission and object resources. ????Answered by: saurabh.seth14 on: Oct 19th, 2009

Page 15: Desktop Level 2 Question_Network

As your 1st DC would be GCSOn a new machine of win 2003 make an ADC (Additional domain controller) by Typing dcpromo in RUN and following the instructions.When your ADC will be made on new Win 200...Answered by: mukeshch.srivastava on: Nov 2nd, 2008

Join the new machine in domain.Run dcpromo on this machine.Transfer all the roles on the new DC.Ensure that we have properly configured the new machine as DNS and have also made the required changes o...Answer Question  Select Best Answer

What is the requirement and work of active directory?Asked By: SURENDRA | Asked On: Nov 27th, 2007

2 answersAnswered by: mspaul on: Jan 2nd, 2009

Here is a quick list of what you must have: An NTFS partition with enough free space An Administrator's username and password The correct operating system version A NIC Properly conf...Answered by: kiranopatil on: Jan 17th, 2008

Requirement for Active Directory1)NTFS partition with enough Free space2)Administrator's username and password3)Correct Operatiing system version4)Nic5)Properly configured TCP/IP (IP address, subn...Answer Question  Select Best Answer

Server and protocol questionsAsked By: ismail | Asked On: Sep 1st, 2007

3 answers

Which protocol does ads require?What is the scope of dhcp server?What is the difference between 2000 server and 2003 server?What is the difference between domain and domain name server?How does a protocol work?What is a isp and how it works?How can we configure a router over switch and which ip address...Answered by: khurramjol on: Apr 22nd, 2010

Q. Which protocol does ADS require?Answer: LDAP for directory sercices and kerberos for Authentication.Q.What is the scope of DHCP server?Answer: Scope determines which IP addresses are provided to th...Answered by: mukeshch.srivastava on: Nov 2nd, 2008

1) Doamin rename is not possible in windows 2000 2) windows 2k - IIS 5 and windows 2k3 - II6 3) Terminal service are enhanced in win2k3 4) Windows 2k doesn't have 64 bit version 5) DNS Stub zone h...Answer Question  Select Best Answer

What is the advantage of using application server?Asked By: gvp.java | Asked On: Jun 9th, 2007

2 answersAnswered by: Ndana on: Mar 10th, 2010

To access many services like mail serviceAnswered by: vipin on: Jul 2nd, 2007

To avoid installing application on every machine.To centralise the database of the application.Easy to manage the application ie installing,patching,etc..Answer Question  Select Best Answer

How do you backup active directory?Asked By: sunilbaglur | Asked On: May 7th, 2011

Answer Question

What is external network in clustering?Asked By: sunilbaglur | Asked On: May 5th, 2011

How to enable log rotation in http server ?Asked By: kirankumar samudrala | Asked On: Apr 16th, 2011Answer Question

Page 16: Desktop Level 2 Question_Network

Heap sizeAsked By: kirankumar samudrala | Asked On: Apr 16th, 2011

How to increase a heap size through command line and explain the parameters ?Answer Question

Windows XP machine communicationAsked By: msid82 | Asked On: Nov 6th, 2010

How a windows XP machine communicates to the network and in what order?Answer Question

How do you set the security to the firewall?Asked By: kryzacs | Asked On: Jan 13th, 2010

1 answerAnswered by: manoharjr on: Aug 14th, 2010

Firewall is an appliance set at the gateway of your network to protect your network from kind of vulnerabilities (Security Threats).It is a kind of Operating System (OS) to make your own rules to prot...Answer Question  Select Best Answer

Mirrored volumeAsked By: suresh262 | Asked On: Dec 26th, 2008

2 answers

How to configure mirrored volume in windows 2003 server?Answered by: petkar on: Jun 19th, 2010

for create mirror volume firstly the disk must be dynamic after that only we able to create mirror volume. Answered by: roshan55 on: Jul 12th, 2009

Open Computer Management (Local).In the console tree, click Computer Management (Local), click Storage, and then click Disk Management.Right-click the unallocated space on one of the dynamic disks on ...Answer Question  Select Best Answer

Windows 2003 command line toolsAsked By: ravila23 | Asked On: Feb 21st, 2008

4 answers

What are some of the command-line tools available for managing a windows 2003 server/active directory environment?Answered by: Ndana on: Mar 10th, 2010

CSVDE, LIDFDE, GPupdateAnswered by: syed_nrp on: May 31st, 2009

Command Line Tools 1) GPupdate 2) Where 3) SystemInfo 4) CSVDE 5) LDIFDE 6) CMDCONS 7) Ipconfig 8) RoboCopy 9) CMDHere10) PathPingAnswer Question  Select Best Answer

How to find problem in server for taking support of event logsAsked By: narendra desale | Asked On: Jul 18th, 2008

1 answerAnswered by: yogeshe84 on: Feb 22nd, 2010

Page 17: Desktop Level 2 Question_Network

To access the Event Viewer, select the Programs | Administrative Tools | Computer Management from the Start menu. When the Computer Management console loads, navigate through the console tree to Compu...Answer Question  Select Best Answer

KerberosAsked By: mohamedbuh | Asked On: Nov 20th, 2008

1 answer

What is kerberos? Which version is currently used by windows? How does kerberos work?Answered by: simple_anagh on: Aug 13th, 2009

Kerberos is an authentication machine which provide authentication to acessing of special type of secured networks it is bascially used in bank accountsAnswer Question  Select Best Answer

Windows 2003 server r2Asked By: ravila23 | Asked On: Feb 21st, 2008

1 answer

Describe the changes included with windows 2003 server r2.Answered by: suman reddy kancharla on: Aug 12th, 2009

The follwing are the improvements that we find in Windows server 2003 R2:A) Identity and access managementB) Branch office Server managementC) Storage set-up and managementD) Application development i...Answer Question  Select Best Answer

Microsoft outlook questionsAsked By: khaledp | Asked On: Jul 10th, 2008

3 answers

1. What is the difference between Microsoft outlook and Microsoft outlook express?2. What is the default ports number in outlook for pop3 / http / smtp? 3. What is the meaning of pst in outlooks and what it’s function? 4. How can you backup the data of Microsoft outlook? 5. What will the pst file contain...Answered by: mohitdns on: Jun 30th, 2009

1. What is the difference between Microsoft Outlook and Microsoft Outlook express? Outlook express is the default mail client in Windows. it is less secure & have no option for PST.MS outlook is ver...Answered by: syed_nrp on: Jun 11th, 2009

Microsoft outlook *.pst more specility ,  outlook express *.dbx less specilitypop3  110, http 80,smtp 25A PST file is a personal folder file in Microsoft Outlook.PST stands for personal stor...Answer Question  Select Best Answer

Server 2003 restore pointAsked By: farhatu | Asked On: Apr 24th, 2009

1 answer

How to create restore point in server 2003?Answered by: RHARRISON on: Jun 19th, 2009

Download the file windowsreference.com/files/AddSystemRestore.zip and extract it Double click on AddSystemRestoreEntries.reg (This will add some values to the registry). Click on Yes to continue Then...Answer Question  Select Best Answer

2003 server user's drive mappingAsked By: Mrcrosado | Asked On: Jul 18th, 2008

2 answers

How can a mapping a user to its directory folder: meaning I want the user to have access to a drive call "g"......ThanksAnswered by: kishore1942 on: Jun 4th, 2009

If you have acess to the domain. go the Active Directory Users and Computers. select the user-> properties->go to profile-> home folder->connect in the TO field type the drive or folder pathAnswered by: suji_jj on: Nov 24th, 2008

Page 18: Desktop Level 2 Question_Network

Try to use the net use command to map the g : drive

Eg:net use g: Drive Nameshared Folder NameAnswer Question  Select Best Answer

Tree and forestAsked By: ravila23 | Asked On: Feb 21st, 2008

4 answers

Explain what is meant by a tree and a forest, and how they differ.Answered by: syed_nrp on: May 31st, 2009

Hi friends,                         Tree creates two types of Child tree and eac...Answered by: nicenanda4u on: Mar 2nd, 2009

A tree is a network that any two nodes (servers) are connected by only one path. There are no cycles in this network.A forest is a network that contains no cycles, and each connected component (i.e. g...Answer Question  Select Best Answer

Windows administrationAsked By: najibakhtar | Asked On: Jun 16th, 2008

1 answer

What are the steps to create a child domain in windows 2003 advance serverAnswered by: francom on: Jan 12th, 2009

You can create a new child domain under Windows Server 2003 using the steps below: 1. On the member server, you want to turn into a domain controller, click Start, and click Run and launch the Ac...Answer Question  Select Best Answer

How to configure Microsoft exchange in windows 2000 serverAsked By: Rukmangathan | Asked On: Oct 17th, 2007

1 answerAnswered by: mukeshch.srivastava on: Nov 2nd, 2008

Assuming this will be the First Exchange install.Make sure that Windows 2000 Server is part of the Active Directory.We have proper reposne for the nslookup from this box.Install IIS along with the com...Answer Question  Select Best Answer

Active directoryAsked By: lrossi | Asked On: Apr 23rd, 2008

1 answer

Explain about active directory & ldap with industry usageAnswered by: abbu143 on: Oct 19th, 2008

An Active Directory is a centralized database where it contains information about objects like users, groups, computers, printers, OUs, contacts and shared folders. LDAP - Light Weight Directory Acc...Answer Question  Select Best Answer

Windows 2003 server policy and organizational unitAsked By: johnnytawil | Asked On: Oct 25th, 2007

2 answers

How to create a policy and organizational unit in windows 2003 server?How to apply users to the policy and organizational unit in windows 2003 serverAnswered by: Big Al on: May 12th, 2008

to create an OU in active directory users and computers you would right click your domain and select new then OU name it what you want....to create or assign a GPO to said OU you can right click the O...Answered by: Hiteshkumar Darji on: Apr 24th, 2008

Policy is collection of users settings and configuration.Through policy you can deny and permit user for specific settings.Ou is collection of objects its behave like folder through which you can mana...Answer Question  Select Best Answer

Page 19: Desktop Level 2 Question_Network

Window's admin questionsAsked By: pearl_guy69 | Asked On: Apr 23rd, 2008

1 answer

1) what is dns & dns records?2) what is replication ? 3) how you troubleshoot replication problem?4)how u configure group policy ?5)what is relay agent?Answered by: RAVIR on: May 12th, 2008

dNSAnswer Question  Select Best Answer

What is vss and what is its functionality?What is cvs and what is its functionality?Asked By: SIVAKUMAR | Asked On: Aug 20th, 2007

1 answerAnswered by: brian4gb on: Mar 4th, 2008

VSS - Visual Source Safe (from MS)CVS - Content Versions System (opensource)In a nutshell, both of these keep track of all work and all changes done in a set of files (e.g. application source code), a...Answer Question  Select Best Answer

What are the different version in windows 2003 and the differences between themAsked By: b.adams0620 | Asked On: Jul 29th, 2007

1 answer

Hi to all!!! I am currently finishing getting my degree as a network security professional/administrator. I am working with a book "network + guide to networking, 4th edition by tamara banks. I am confused about the windows server 2003 and the different editions. There is standard edition, web edition,...Answered by: jasbir22 on: Jan 24th, 2008

sorry for so late reply..i jus checked it today...Yes , You would need to install each different Edition

Active directoryAsked By: Subratag | Asked On: Jan 28th, 2008

3 answers

What is the name of activedirectory fileAnswered by: ramaprasanna on: Feb 3rd, 2009

NTDS.ditAnswered by: rob86 on: Dec 19th, 2008

There are five files in ADebd.chkebd.logntds.ditreg1.logreg2.log

What is difference between layer 2 switch and layer 3 switch ?Asked By: Dheeraj Choudhary | Asked On: Mar 13th, 2006

32 answersAnswered by: Killerookami on: Feb 3rd, 2012

A layer two switch can only switch traffic, while a layer 3 switch can route traffic via physical interfaces and VLAN interfaces. Layer three switches can also run routing protocols such as oaf and bg...Answered by: blackhat on: Feb 3rd, 2012

Layer 2 switch in unmanageable. It is just used to connect the network segments. It has only one broadcast domain for each port and collision domain as many ports are there. while layer 3 switch is m...Answer Question  Select Best Answer

What is protocol? How many types of protocols are there?Asked By: prasadekonex | Asked On: Jul 23rd, 2007

Page 20: Desktop Level 2 Question_Network

16 answersAnswered by: blackHat on: Feb 3rd, 2012

In few words protocols are just set of rules and regulation which are defined by to send data on internet in a specific manner. If we talk about sending data on internet, it is done by OSI model s net...Answered by: satinder on: Jan 18th, 2012

Protocols are set of rules.Answer Question  Select Best Answer

Increase internet speedAsked By: dhananjaym | Asked On: Jan 11th, 2010

4 answers

List any four ways of increasing internet speedAnswered by: viki on: Jan 27th, 2012

this is an technique which increases 20% of Internet,,,,, Actually Windows reserves 20% of bandwidth for its updates.checking it will contribute the reserved bandwidth.. 1.In RUN type GPEDIT.MSC 2....Answered by: venmalathy on: Sep 12th, 2011

Thanks for the sharing about increasing the Internet speed...Basically my Internet was slow,so i have searched for tips to increase the speed of the Internet,i got the tips here i used the tips to inc...Answer Question  Select Best Answer

Can somebody give me a clear calculation and explanation why 2 is 10 in binary digits?Asked By: tdj | Asked On: Apr 1st, 2006

10 answersAnswered by: sujit on: Jan 27th, 2012

Binary counting is like "16 8 4 2 1" so if no. is 2 then it will 00010 but you can write is "10" if the no. will be 7 then binary will be 111 and if it will be 18 then 10010, so whatever no. you are t...Answered by: tituxjec on: Mar 6th, 2009

Do not take it as '10' rather take it as '1' and then '0'. Refer to binary notation and you will be more clearAnswer Question  Select Best Answer

Dns server is downAsked By: rajasmanish | Asked On: Feb 3rd, 2011

3 answers

If dns server is down, what steps will you take to troubleshoot?Answered by: sbmk_bala on: Dec 22nd, 2011

DNS Means Domain Name Service DNS Server down means server is not available at that pont of time, there will be a lot of causes for that. DNS Server converts human fiendly loguage in to ip addresses w...Answered by: Mahi on: Sep 19th, 2011

1. Verify that the server computer has a valid functioning network connection. First, check that related Server hardware (cables and network adapters) are working properly at the client using basic ...Answer Question  Select Best Answer

A manager cannot print to network printer but all other users can, what will you do to fix the issue?Asked By: ramraje | Asked On: Mar 4th, 2011

2 answersAnswered by: sbmk_bala on: Dec 22nd, 2011

Find out the ip of printer Ping the ip from manager system. If it is successfull go to no issue with cables and then go to settings re-configure the printer.Answered by: IronHyde on: Dec 8th, 2011

Check managers network connection Check RJ45 connector if cabled network Check whether a network printer is installed in the Managers PC

Page 21: Desktop Level 2 Question_Network

Answer Question  Select Best Answer

Why do we need ip address when the mac address is unique? Can't we communicate only with mac address?Asked By: Nazeer | Asked On: Apr 4th, 2007

11 answersAnswered by: gaurav on: Nov 18th, 2011

the function of mac address and ip address different mac address is physical address which is not work on Internet. but ip address is used to communicate with in world. no we cannot communicate only w...Answered by: Syed Zeeshan on: Nov 16th, 2011

Ip address is just used for transferring information from one Network to another Network.It will just transfer the information from one network to another. Whereas,the Mac Address is actually respons...Answer Question  Select Best Answer

How to configure dhcp server?Asked By: elambarithi | Asked On: Nov 19th, 2005

12 answersAnswered by: Vijay Sharma on: Nov 10th, 2011

How To Install and Configure a DHCP Server : http://support.microsoft.com/kb/323416Answered by: hema on: Sep 9th, 2011

DHCP stands for Dynamic Host Configuration ProtocolAnswer Question  Select Best Answer

Name 5 reasons why a user might not be able to logon to the network.Asked By: ramraje | Asked On: Mar 4th, 2011

1 answerAnswered by: Swati on: Oct 17th, 2011

may not remember the id or password right. the password might have expired. may not be choosing the right domain name at the log on screen. computer might not be added to the n/w domain. LAN n/w m...Answer Question  Select Best Answer

Why do we use subnet mask? What are its uses?Asked By: Bashur | Asked On: Aug 25th, 2006

14 answersAnswered by: Devang on: Sep 23rd, 2011

We use sub netting for divide a huge network in subnetwork or some user use for some security reasonsAnswered by: naveemb on: Sep 27th, 2008

I don't see the reason why a subnet mask has to be used with default networks like Class A-B-C..., unless you a using subnetting.the reason i say this becasue with the default networks, the ip add...Answer Question  Select Best Answer

Which layer are used in router and switchAsked By: Nilesh | Asked On: Jul 11th, 2007

3 answersAnswered by: amuthan on: Sep 19th, 2011

Router used in network layer and layer 2. Switches are used in data link layer.Answered by: vijay on: Oct 11th, 2007

Hi ,You are right Routers work in the Network layer.Answer Question  Select Best Answer

What is the full form of "ping" (network commnd) ?Asked By: vaghela vipul | Asked On: Jul 9th, 2007

8 answersAnswered by: amuthan on: Sep 19th, 2011

Packet InterNet Groper

Page 22: Desktop Level 2 Question_Network

Answered by: iyyappan on: Aug 16th, 2011

packet internet groperAnswer Question  Select Best Answer

Encryption operation performed at what layer1.Presentation layer2.Physical layer3.Transport layerAsked By: s.shanmugaraja | Asked On: Oct 3rd, 2006

13 answersAnswered by: kabelo matsane on: Sep 17th, 2011

1. Presentation LayerAnswered by: k prasanth kumar on: Feb 26th, 2007

presentation layerAnswer Question  Select Best Answer

What is difference between tcp/ip and udp?Asked By: Raja | Asked On: Nov 2nd, 2006

31 answersAnswered by: pankaj on: Sep 11th, 2011

TCP/IP is connection oriented protocol eg:-smtp, icmp, ftp. UDP is connection less protocol eg:-tftp, dns, telnetAnswered by: Vinod on: Aug 26th, 2011

The difference between TCP and UDP is just like a Postman & Courier boy... TCP provides us acknowledgement of data transmission BUT UDP doesn't provide us any acknowledgement of data transmission..Answer Question  Select Best Answer

How to configure a router?Asked By: samdeep m jethwa | Asked On: Sep 12th, 2006

23 answersAnswered by: murahari on: Sep 8th, 2011

how to configer images in siebel crm configaration?Answered by: choyal on: Apr 3rd, 2009

You can config your computer also as router because router is third layer device that is Network Layer device and in your computer you also have this layer First step: Give two more IP to our computer...Answer Question  Select Best Answer

Lan wan technologyAsked By: sudhir kashid | Asked On: Dec 19th, 2008

3 answers

Which tcp/ip mode layer support both lan & wan technology?Answered by: Anil on: Aug 31st, 2011

In Layer 2Answered by: mridu.asdm on: May 31st, 2010

Layer 1 which is Physical LayerAnswer Question  Select Best Answer

Old configuration routerAsked By: rameshrgen | Asked On: Jun 28th, 2009

1 answer

Your are an network admin for an corporate office. You have received a router from your head office which have an older configuratiuon. So what will you do when you want to use those routers?Answered by: Anil on: Aug 31st, 2011

Upgrade the IOS to New versionAnswer Question  Select Best Answer

What is difference between public ip and priVATe ip?Asked By: Goldie | Asked On: Sep 12th, 2006

22 answersAnswered by: kavimani-hit on: Aug 23rd, 2011

Page 23: Desktop Level 2 Question_Network

public IP's are provided by the standard ISP providers they can't be used by every one private IP's are provided with the home,institution just to enable connectivity b/w two systems private IP's r...Answered by: gowrishankar6015 on: May 29th, 2011

public ip's are assigned by isp provider to users. private ip's are locally assigned for corporate office. Ex for public ip-internet. ex for private ip-domainAnswer Question  Select Best Answer

What is the difference between a unc and drive mapping?Asked By: ramraje | Asked On: Mar 4th, 2011

1 answerAnswered by: Ramkumar on: Jul 28th, 2011

Basically UNC stands for Universal naming convention / Uniform Naming convention and it specifies a common syntax to describe the location of a Network resource such as shared file , Directory or prin...Answer Question  Select Best Answer

What is a dns ? How it works ?Asked By: Amol | Asked On: Mar 24th, 2006

13 answersAnswered by: karvinkar fawad on: Jul 27th, 2011

domain name system is a database system that translates a computer fully qualified domain name into an ip addressAnswered by: tabrezkhan on: Jul 21st, 2011

DNS stand for domain naming system, it resolves Fully Qualified Domain Name(FQDN) into it's ip address and vice versa.

What is duplex? Explain half and full duplex.Asked By: imtiazgi | Asked On: Mar 22nd, 2011

1 answerAnswered by: uma on: Jul 13th, 2011

The ways of communicating is expressed in terms of simplex, duplex... simplex is one way communication...example is ur pager... information s sent by a person by making a call to the nearest exchange....Answer Question  Select Best Answer

What is split horizon rule?Asked By: imtiazgi | Asked On: Mar 22nd, 2011

1 answerAnswered by: Syed Jawwad on: Jul 13th, 2011

Split horizon rule says that "routing updates can not be sent back to an interface from where it is received". This prevents loops in the network.Answer Question  Select Best Answer

In trojan horse how can we avoid the system from its effect?Asked By: vasanthakumar | Asked On: Jan 16th, 2006

10 answersAnswered by: Vishal Haha on: Jul 3rd, 2011

Enable firewall, and do one port scanAnswered by: mpagi on: Jun 2nd, 2010

Here are the 5 things you need to do right now to get rid of trojan horse virus and avoid it returning:1. Make sure your anti-virus software is up-to-date and includes all the latest patches and virus...Answer Question  Select Best Answer

What is the printer registry file name?Asked By: ramraje | Asked On: Mar 4th, 2011

1 answerAnswered by: sankarpalla on: May 20th, 2011

Printers.{2227A280-3AEA-1069-A2DE-08002B30309D}Answer Question  Select Best Answer

Page 24: Desktop Level 2 Question_Network

Difference b/w subnetmask and default gatewayAsked By: raghu | Asked On: Jan 18th, 2007

5 answersAnswered by: singhathakur on: Feb 12th, 2008

Computers understands, thes are in a same network with the help of netmask while in case of lan server ip work the gateway for clients. Answered by: Mohammed Younus on: Mar 15th, 2007

looking toward the Subnetmask only we can Identify to which Class does this Ip belongs and using subnet mask we can divide Large N/W into smaller N/W.Gateway is the Particular unique IP  Assigned...Answer Question  Select Best Answer

Why we are using priVATe ip in the lan?Asked By: prabakaran | Asked On: Mar 17th, 2006

4 answersAnswered by: Ashish Mittal on: Oct 17th, 2007

Hi,    We are using the private range in our network because with the help of that we can easily differentiate it from the outside network. There are some specific range of the private ipClass C- 1...Answered by: Ajit on: May 13th, 2006

HiI want to add one thing that whan we r using private ip address (which r free for every user ,while public ip 's are paid ip's provided by the isp) if we want to connect with internet we have to use...Answer Question  Select Best Answer

What is the difference between bri and pri port?Asked By: ravi | Asked On: Sep 6th, 2006

9 answersAnswered by: priyakalai on: Jul 30th, 2009

PRI: ExpensiveBRI: Less costPRI: Large scale service suitable for companiesBRI: Small service suitable for home and small businessAnswered by: brijesh_p2003 on: Jan 23rd, 2009

Basic rate interface, it is a only two channel of 64 kbps, BRI using only video conference system, 

PRI.... primary rate interface its is a 30 channel, Answer Question  Select Best Answer

Name another way of joining a pc to domain?Asked By: ramraje | Asked On: Mar 4th, 2011

Answer Question

Webpage loginAsked By: rajasmanish | Asked On: Feb 3rd, 2011

Assume there are around 100 users at a place, when they type any web address in the browser, all of them get the error message as "page cannot be displayed". What could be the cause of this error? How will you troubleshoot it?Answer Question

Server restartsAsked By: rajasmanish | Asked On: Feb 3rd, 2011

If the server restarts often automatically? What could be the cause? How will you troubleshoot it?Answer Question

Domain controllerAsked By: rajasmanish | Asked On: Feb 3rd, 2011

Assume there are 2 domain controllers, one has 3 roles and the second domain controller has 2 roles. If the domain controller with 3 roles goes down, can the users who are under that domain controller login?

Page 25: Desktop Level 2 Question_Network

Answer Question

Peer to peer networkingAsked By: rajivsinghpratap | Asked On: Jan 8th, 2011

What is peer to peer networking?Answer Question

Connect to a token ringAsked By: fhumulani | Asked On: Apr 19th, 2010

2 answers

You need to connect a token ring segment to an ethernet segment. Would you use a router, a brouter, or a bridge? JustifyAnswered by: khushimehta on: Nov 20th, 2010

The Ethernet to Token Ring Bridge enables adevice with an Ethernet output to be connectedto a Token Ring network.Answered by: Jvachon on: Jun 1st, 2010

BridgeAnswer Question  Select Best Answer

In tcp/ip udp is connection less , why?Asked By: raju mahana | Asked On: Sep 30th, 2006

7 answersAnswered by: castawayback on: Oct 2nd, 2010

I know that for TCP/IP: the session layer will send SYN to start a connection with the peer end.but as UDP/IP is a connectionless protocol, I think it doesn't use session layer, right?Answered by: silversurfer on: Jun 15th, 2008

Main reason is that the internet is made of so many heterogeneous networks that it isalmost impossible to create a connection from the source to the destination without knowing the nature of tehe netw...Answer Question  Select Best Answer

Describe the osi model?Asked By: deepakkumarpatel | Asked On: Feb 4th, 2006

5 answersAnswered by: gagan on: Mar 31st, 2007

it provides modularity. if suppose performance of one layer can be improved we need not throw the whole model but just change that layer. e.g. if something in a computer goes wrong we can change that ...Answered by: dipankar on: Sep 3rd, 2006

Why do need such type of models, What is its significance?Answer Question  Select Best Answer

What is the difference between networking and remote networkingAsked By: sheriff .T | Asked On: May 22nd, 2007

2 answers

Definition of networking and remote networking; detailed answerAnswered by: shiva6950 on: Jun 19th, 2010

Networking:  network is group of devices.like hosts,routers,switches,hubs etc used to communicate each others. and share the information .remotenetwork:Is a collection or group of ...Answered by: yaseen.yadwad on: Jul 29th, 2007

The main difference between networking and remote n/w, is the network which we use in offices or other places locally such LAN or INTRANET and remote n/wkg is one in which we use RAS or TERMINAL Servi...Answer Question  Select Best Answer

Network layerAsked By: Mosupi | Asked On: Sep 30th, 2009

2 answers

Page 26: Desktop Level 2 Question_Network

Is the network layer address important to a transparent learning bridge? Why or why not?Answered by: delbhoi on: May 25th, 2010

No because in layer 2 switching it is the MAC address of the sending device that is used to determine  the destination of the frame being switched.Answered by: Kamlesh Singh Bisht on: Oct 21st, 2009

No, because bridge work in data-link layerAnswer Question  Select Best Answer

What do you check first when your network connection is not working? bios o/p devices i/p devicesAsked By: pummy | Asked On: Jul 16th, 2007

2 answersAnswered by: rinku_prd on: May 19th, 2010

If all went well, you should get output resembling the following: ... From here you can treat the ndis0 device like any other network interface (e.g., dc0). .... sure the device is not conflicti...Answered by: worldexporterusa on: Jul 17th, 2007

O/P devices.In system tray an icon of n/w, will show us a message of Connection Status.Answer Question  Select Best Answer

What is trojan horse? How to save a system from that?Asked By: sheik Mytheen | Asked On: Feb 6th, 2006

9 answersAnswered by: ravinbab on: May 5th, 2010

The Trojan is not actually a virus it is a powerful hacking tool used to get the full control of any system without any intimation.Answered by: sindhu85 on: Jan 29th, 2008

i understood what you wanna say but exactly how does viruses attack computers,i want to know the mechanism.Answer Question  Select Best Answer

FirewallAsked By: anilyashsoni | Asked On: Nov 11th, 2009

1 answer

A firewall is implemented in 1. Routers which connect internet to internet2. Bridges used in an intranet3. Expensive modems4. User's application programsAnswered by: Efren on: May 5th, 2010

A firewall could be software or hardware. An example of software is the one that reside on your desktop operating systems like Windows XP. A hardware example is CISCO Pix firewall which is usually con...

Token ringAsked By: tshepiso | Asked On: Apr 12th, 2010

You need to connect a token ring segment to an ethernet segment. Would you use a router, a brouter, or a bridge? Explain your answer?Answer Question

Switch technologyAsked By: pippars | Asked On: Mar 1st, 2009

2 answers

Explain what is packet switched, cell switched and circuit switched technology?Answered by: genius_mjk on: Mar 27th, 2010

Circuit Switching: In this type of switching the data which is being transmitted follow the path a particular dedicated path which is set during connection establishment.  Once the connection is ...Answered by: ersunitasingh on: Jun 14th, 2009

When the packet is moved from one device to another device on a single network is known as packet switching.Circuit switching is provide a dedicated path between sender and receiver. But packet switch...Answer Question  Select Best Answer

Page 27: Desktop Level 2 Question_Network

Network setupAsked By: Rukiee | Asked On: Aug 30th, 2009

1 answer

How will you configure 2 domains dhcp server using 2 switches and only 1 dsl router?Answered by: Atul Deshpande on: Sep 9th, 2009

There are two diffrent network. Each network having one switch. We can attch router between two switch using RIP protocols & comunicate between two diffrent network.Answer Question  Select Best Answer

Classless routingAsked By: rameshrgen | Asked On: Jun 28th, 2009

1 answer

Which routing protocol will used for classless routing?Answered by: contactorazi on: Jul 14th, 2009

Classless routing is the type of routing in which we can forward the subnetted networks.The different types of routing protocols that support classless routing are 1)OSPF (Open Shortest Path First)2)I...Answer Question  Select Best Answer

Pop3Asked By: vivekpatel93 | Asked On: Feb 8th, 2009

2 answers

Explain what is pop3. How does is differ from pop?Answered by: ashishrs on: Jun 8th, 2009

Post Office Protocol or POP is the protocol which describes the rules to fetch email messages from a server to local email client like outlook. POP3 is the third version and is standard now. There ar...Answered by: kumar.sikar on: May 5th, 2009

POP stands for Post Office Protocol. This is used to describe how e-mail clients interact with mail servers. The POP3 Server is a type of mail server used for incoming mail. In simple terms, POP serve...Answer Question  Select Best Answer

If you have 3 pc's with static ip's and there is one pc workstation that has ftp going through a router, how would you ftp to that workstation and only that one from the outside in? 2. You have a laptop...Asked By: Daniel Mamo | Asked On: Oct 2nd, 2006

3 answersAnswered by: ashishrs on: Jun 8th, 2009

1. If the workstation has static public IP then it is simple. Type ftp://abcd in FTP client running on outside computer connecting to internet where abcd is the IP-address of the workstation.If th...Answered by: Boti Curry on: Jan 5th, 2007

I am going to make a few assumptions to this vague question. I am assuming that the the FTP workstation is running FTP server and all IP addresses are publically routable IP addressess. Now it is quit...Answer Question  Select Best Answer

Ip address over mac addressAsked By: shabo | Asked On: Jan 26th, 2009

2 answers

Why we need ip address over mac address?Answered by: kumar.sikar on: May 5th, 2009

IP Address is the Address of a network which is given By network InfraStructure but MAC Address is already give on LAN Card Chip and it is not changable.Answered by: contact_richa_at on: Apr 23rd, 2009

MAC Address is the physical address that is usually stored in Network card .IP Address is a logical address of the computer.In Networking Data Link Layer creates frames by writing MAC address into the...Answer Question  Select Best Answer

Page 28: Desktop Level 2 Question_Network

Ip addressesAsked By: sandeeprana23 | Asked On: Dec 16th, 2008

2 answers

How many ip addresses we can give to a system that having windows XP professional ? And why ?Answered by: vinitogupta on: Mar 25th, 2009

You can assign as many as IP Address to XP machine as much as NIC you have installed in your machine.you can also team the NIC and assign single IP address to configure network traffice balancing for ...Answered by: himanshu1234in on: Dec 28th, 2008

We can put only one IP address in a single LAN cardAnswer Question  Select Best Answer

Access a file on another computerAsked By: rajeev.k.nanda | Asked On: Aug 25th, 2008

2 answers

A person would like to access a file on another computer (connected via lan) while working with safe mode. What should he do?Answered by: vinitogupta on: Mar 25th, 2009

A person can access a file on another computer in safe mode if a person is using safe mode with networking, if a person is only using safe mode then network drivers wont be enable due to which a perso...Answered by: ameetsaha on: Sep 2nd, 2008

Start the computer with "safe mode with networking". While starting the computer press F8  and four five option will come the choose the above option then hope you will access that particular file th...Answer Question  Select Best Answer

What is the difference between tcp/ip and netbeui protocol?Asked By: vickeyab | Asked On: Nov 9th, 2007

3 answersAnswered by: vinitogupta on: Mar 25th, 2009

A protocol like NetBEUI does not use any logical addressing, and isn’t routable. because when a router comes across a NetBEUI packet, it has no way of determining where the destination host resides,...Answered by: MotoRooter on: Sep 10th, 2008

Even though they are both network protocols, TCP/IP works on large, routed networks, and is used on the vast majority of modern enterprise networks, as well as the Internet. NetBEUI is an outdate...Answer Question  Select Best Answer

Explain practical uses of active directory.What is printer server?Asked By: Vikas Srivastava | Asked On: Jul 26th, 2007

2 answersAnswered by: vinitogupta on: Mar 25th, 2009

Active Directory is an implementation of LDAP directory services by Microsoft for use in Windows environments. Active Directory allows administrators to assign enterprise-wide policies, deploy program...Answered by: amarjeet7 on: Sep 6th, 2007

Active directory As per name its the directory of active objects in you Domain. Active directory first time introduced in windows 2000 family, In active directory we can maintain all user records, pri...Answer Question  Select Best Answer

What is dhcp server?Asked By: Rohit | Asked On: Aug 28th, 2007

3 answersAnswered by: vinitogupta on: Mar 25th, 2009

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such a...Answered by: silvimasss on: Jul 7th, 2008

Page 29: Desktop Level 2 Question_Network

4 steps:a) IP request, (b) IP offer, © IP selection and (d) acknowledgement.Answer Question  Select Best Answer

Network delayAsked By: preetibulbul | Asked On: Dec 29th, 2007

4 answers

User(s) are complaining of delays when using the network. What would you do?Answered by: vinitogupta on: Mar 25th, 2009

Check the network connectivity, check the traffic, check server from which user's workstation is requesting dataAnswered by: brijesh_p2003 on: May 28th, 2008

1  first you have to cheack network cable from swtich to your wrokstation. 

2  second you have to cheack oplink cable from router to swtich.Answer Question  Select Best Answer

Encoding and modulationAsked By: Mudasir | Asked On: Mar 10th, 2009

What are data encoding and modulation? How do they differ from one another?Answer Question

Client ftp accessAsked By: sudhir kashid | Asked On: Dec 19th, 2008

1 answer

A client that has a ftp access should also have--------------?Answered by: gowthambaalaji on: Feb 24th, 2009

internet connectionAnswer Question  Select Best Answer

Negotiation in network protocolsAsked By: Unkle_Ravi | Asked On: Feb 8th, 2009

What does "negotiation" mean while discussing the network protocols? Is "negotiation"' connection oriented? Give an example.Answer Question

Socket programmingAsked By: PurtiPahuja | Asked On: Feb 7th, 2009

What happens if both the server and the client attempt to write a message onto their sockets immediately after the tcp connection has been established? What happens if both of them try to read a message from their sockets immediately after the tcp connection has been established?Answer Question

Acls drawbackAsked By: farzand_ali_548 | Asked On: Sep 1st, 2008

1 answer

What are the disadvantages of acl compared to a firewall?Answered by: dcapote on: Feb 3rd, 2009

Firewalls have many additional features/benefits such as Statefull Packet Inspection.Answer Question  Select Best Answer

S2s vpn intermittent disconnectionAsked By: imvarun | Asked On: Jan 26th, 2009

Page 30: Desktop Level 2 Question_Network

When user is facing intermittent disconnection while connecting client network from a your priVATe network using the c2s vpn with cisco vpm dialer? Brief the trobleshooting steps to resolve this issue?Answer Question

Loop back plugAsked By: sudhir kashid | Asked On: Dec 19th, 2008

1 answer

What is a hardware loopback plug?Answered by: Astro Rat on: Jan 14th, 2009

Hardware loopback connectors are simple devices that redirect outgoing transmissions from a system directly back into it. Hardware loopback connectors are used in conjunction with diagnostic software ...

Internet and telephone network topologyAsked By: sudhir kashid | Asked On: Dec 19th, 2008

Which topology is mostly used as the internet & telephone network?Answer Question

Ip v6Asked By: kcrao | Asked On: Nov 7th, 2008

1 answer

In ipv6, what is the difference between 6in 4 and 6 to 4Answered by: muradkhalifa on: Dec 11th, 2008

IPv4 means Internet Protocol version 4IPv6 means Internet Protocol version 6IPv4 is 32 bits IP address that we use commonly, it can be 192.168.8.1, 10.3.4.5 or other 32 bits IP addresses. IPv4 can sup...Answer Question  Select Best Answer

Class a networkingAsked By: Laxmidhar123 | Asked On: Dec 7th, 2008

1 answer

Which of the following is the class a network.1) 128.14.0.0 ii) 127.0.0.0 iii) 127.8.0.0 iv) 127.4.5.0Answered by: steveprakash2k3 on: Dec 8th, 2008

i) 128.14.0.0 =======> This is Class Bii) 127.0.0.0 =======> This is Loop Back iii) 127.8.0.0 =======> This is Loop Back iv) 127.4.5.0 =======> This is Loop BackAnswer Question  Select Best Answer

What is the difference between windows server 2003 and windows server 2000 and operating system ?Asked By: kamal | Asked On: Aug 4th, 2006

21 answersAnswered by: Luking for answers on: Dec 5th, 2008

One more important difference is Win 2003 supports Volume shadow copy featurewhich is not in windows 2000..A NEW TOOL TO RECOVER FILES Window 2003 server includes IIS server in it.Answered by: kapooranil14 on: Nov 10th, 2008

Windows Server 2000 has three editions and does not include managment snap-inwhile Windows Server 2003 has 4 editions as followsStandard editionWeb editionEnterprise editionData center editionIt has m...Answer Question  Select Best Answer

What is the difference between layer 3 switch and router?Asked By: mahesh | Asked On: Apr 4th, 2006

15 answersAnswered by: chinmay_lp on: Oct 13th, 2008

Page 31: Desktop Level 2 Question_Network

Router - Basically routers are use to connect different n/w's together.Routers  communicate between two or more  networks.L3 Switch - L3 switches are just like L2 switches.but there is a...Answered by: M.Alam on: Nov 10th, 2007

A Layer3 switch can handle a network divided in multiple segments running on different subnets, as it can perform routing  too.Whereas for such networks we need a Layer2 switch for inter-segment c...Answer Question  Select Best Answer

What is ftp & udp?What is the different version of ip?Asked By: Ashish Kumar | Asked On: Oct 5th, 2007

5 answersAnswered by: vinit mishra on: Oct 9th, 2008

FTP means File Transfer Protocol & UDP is User Datagram Protocol.Both are usefull for transfering Data.but FTP is more Secure in compare of UDP.Answered by: waugh_ananda on: Feb 23rd, 2008

Dear Sandesh, IP is 32 bit (not byte) and IPv6 is 128 bit in lengthAnswer Question  Select Best Answer

Distance vector routing algorithmAsked By: rajesh_domadiya | Asked On: Jun 2nd, 2008

1 answer

Explain distance vector routing algorithm with the help of suitable example.Answered by: Tanu_shree on: Sep 13th, 2008

Distance Vector Routing Algorithms calculate a best route to reach a destination based solely on distance. Eg. RIP. RIP calculates the reachability based on hop count. Its different from link state al...Answer Question  Select Best Answer

How is the collission domain & broadcast domain related to the data rate in ethernet network?Asked By: kiran | Asked On: May 15th, 2007

4 answersAnswered by: Dushyant111 on: Aug 30th, 2008

Both are virtual group, collision domain are group of computer in a network that share bandwith c/a collision domain, collision domain decrease the data rate.Broadcast domain are the group of com. in ...Answered by: tinku on: Nov 22nd, 2007

Collision Domain: If you have 10 Ticket counters in a Reservation counter, you can reduce the rush, similarly, a switch can provide 24 ports to avoid colission of data.Broadcast Domain: is based on nu...Answer Question  Select Best Answer

Bgp protocolAsked By: ds9313031975 | Asked On: May 10th, 2008

1 answer

What is the features of bgp protocol? How it is different to other protocolAnswered by: amnfrs on: Jul 29th, 2008

Border Gateway Protocol is the core routing protocol .It works by maintaining a table of IP networks which designate network reachability among autonomous systems (AS). It is described as a ...Answer Question  Select Best Answer

What is hpov? How does it works? What are its monitoring tools?Asked By: Munish Gopal | Asked On: Sep 19th, 2007

2 answersAnswered by: infe12 on: May 30th, 2008

HPOV - HP OpenView is tool related to service desk operations where tickets will be logged in case of a IT related issue. This tools maintains the CMDB of a particular organisation by which a ticket c...Answered by: karthikeyan.r on: Oct 23rd, 2007

Page 32: Desktop Level 2 Question_Network

HP Open View is a suite of business computer management or "e-services" programs from Hewlett-Packard, which states that the suite is "among the world's 20 largest software busine...Answer Question  Select Best Answer

What is tcp/ip?Asked By: somyata | Asked On: Feb 5th, 2006

18 answersAnswered by: sthil_007 on: Apr 22nd, 2008

TCP/IP - Transmission Control Protocol/Internet Protocol. The dominant protocol suite in the worldwide Internet, TCP is Layer 4, the transport layer. IP is Layer 3, the network layer.Answered by: JITHINRAJ on: Oct 25th, 2007

The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite TCP provides reliable, in-order delivery of a stream of bytes, making it suitable for applications l...Answer Question  Select Best Answer

Why is the broadcast model of transmission suitable for a lanAsked By: kiran | Asked On: May 12th, 2007

1 answerAnswered by: singhathakur on: Feb 11th, 2008

Hi        This is sutable method for discover the destination address.Answer Question  Select Best Answer

Can we have 2 dhcp servers within 1 network ? If no why ? If yes ip address will conflict or not.Asked By: Pramod | Asked On: Jul 21st, 2007

7 answersAnswered by: singhathakur on: Feb 11th, 2008

hi we can have 2 more dhcp in a same network but each dhcp server should be diffrent ip address.other wise network will be colide.Answered by: anit vohra on: Nov 21st, 2007

Yes, we can create as much scopes on the same network. For this what we have to do:- First we can create more than one scope and afterwards we have to create superscope, and merge as much scopes in th...Answer Question  Select Best Answer

If printing is given print from two different computers in a network which one will be preferrenced first. Pcs are in domain first.Asked By: sonimanish78 | Asked On: Jul 14th, 2007

2 answersAnswered by: hina ellahi on: Jan 29th, 2008

on the basis of FIRST COME FIRST SERVER printer will fullfill the need of that user whose's command comes first Answered by: deepak_19_bca on: Oct 26th, 2007

Printer is based on spoling which give FCFS(FIRST COME FIRST SERVE) therefore one who gives his print command first will take the printout firstAnswer Question  Select Best Answer

Combine tcp/ip and sna trafficAsked By: preetibulbul | Asked On: Dec 29th, 2007

Name some of the ways of combining tcp/ip traffic & sna traffic over the same linkAnswer Question

I have been called up for the tech interview on next week for the post of network engineer. Help me out the procedure and what they are looking for the said position from us?Asked By: Vijay | Asked On: Nov 2nd, 2006

3 answers

Page 33: Desktop Level 2 Question_Network

Answered by: sarunhere on: Dec 26th, 2007

Ya Every answer is correct still you have to prepare some basic LikeDNSDHCPWINSTrouble shooting with networkRouter conceptand Domain Conceptif you know mail server it will be good for you

Best of luckAnswered by: vmshenoy on: Jan 8th, 2007

hi vijay first of all best of luck for ur interview!1)u should have idea of OSI layers2) should know abt some basic commands like PING,IPconfig3)should know abt IP addresses.4)which type of IP cl...Answer Question  Select Best Answer

What is intra-vlan how does it work why do we use the router in between the two switch?Where we make vlan if we enable one trunking on each side of switch then why do we uses the routerwhat is supernating?Asked By: deepakpant1982 | Asked On: Jul 6th, 2007

1 answerAnswered by: Benjamin200975 on: Dec 7th, 2007

Virtual LANs (VLANs) divide one physical network into multiple broadcast domains. But, VLAN-enabled switches cannot by themselves, forward traffic across VLAN boundaries. So you need to have routing b...Answer Question  Select Best Answer

What are the network monitoring tools? Like what tools do you use to monitor network connections?Asked By: Ambi | Asked On: Oct 2nd, 2006

7 answersAnswered by: fatuchi on: Nov 22nd, 2007

Network monitoring tools are different from network tools like ping, tracert  etc.Network monitoring tools are usually software we need to install and setup in our workstation or server to monitor th...Answered by: aryanone on: Jan 26th, 2007

Netmon is used to monitor networkAnswer Question  Select Best Answer

What is the difference between win 2000 ads and win 2003 ads?Asked By: sunilbaglur | Asked On: Aug 11th, 2006

9 answersAnswered by: RAKSHIT SHARMA on: Nov 19th, 2007

1) In 2000 we cannot rename domain where as in 2003 we can rename domain.2) 2000 supports IIS 5.0 and 2003 supports IIS 6.0 . 3) 2000 supports 4-node ...Answered by: ahmad on: May 3rd, 2007

There are many features in windows 2003 domain controller as compares to windows 2000 DC like 1- We can create cross forest link trust . 2- Can rename domain name. 3- More scaleable 4- Have th...Answer Question  Select Best Answer

In roaming profile how to give only excel permission to particular user?Asked By: ravi | Asked On: Jul 19th, 2006

4 answersAnswered by: bharath on: Nov 16th, 2007

roaming profile is created by admin on server,can be accessed on any computer throughout the network and can make changes from any computer in network and the changes updated in server.to give excel p...

Page 34: Desktop Level 2 Question_Network

Answered by: kesi reddy on: Mar 31st, 2007

roaming profile:first we have create a one text document with sharing permissions.go to ads and select pretricluar user right click/properties.mentioned profile path system name/ share folder// user n...

What is spanning tree? How it works in vlan ?Asked By: prashant | Asked On: Sep 24th, 2007

1 answerAnswered by: Gaurav Mehta on: Oct 15th, 2007

Spanning tree  protocols main taks is to stop network loops from occurring on your layer 2 network.Network loops create broadcast storms and are responsible for additional overhead on the network...Answer Question  Select Best Answer

What is ras server?Asked By: ravi | Asked On: Sep 6th, 2006

5 answersAnswered by: ch.sridhar on: Sep 12th, 2007

Remote Access ServerRemote access is the ability to get access to a computer or a network from a remote distance. In corporations, people at branch offices, telecommuters, and people who are traveling...Answered by: biraj n mishra on: Jan 19th, 2007

RAS stand for Remote Access Service.in RAS maximum 2 users can remotely acess the PC not more than taht.if u want to acess more user then we have to make licenceAnswer Question  Select Best Answer

What is pulse code modulation.Asked By: PARVEEN | Asked On: Jul 15th, 2007

1 answerAnswered by: Benerjee on: Sep 3rd, 2007

(PCM) a way to convert sound or analog information to binary information (0s and 1s) by taking samples of the sound and record the resulting number as binary information. Used on all CDs, DVD-Audio, a...Answer Question  Select Best Answer

How to configure clients from 2000ads server?Asked By: pvr_23 | Asked On: Feb 25th, 2006

4 answersAnswered by: rabindra kandher on: Aug 31st, 2007

to add a client system at first we need to type of configuration logical & physical . at 1st we have to check all the client system including domain server properly connected with the hub or switc...Answered by: sac on: May 3rd, 2007

For configuring client from 2000 ads serverYou need to take the following step Right click on My Computer - Properties - In Computer Name Tab - Click on change TabThen in domain box type the nam...Answer Question  Select Best Answer

In which layer does rarp work? WhyAsked By: hameed | Asked On: Jul 18th, 2007

1 answerAnswered by: chandar on: Aug 5th, 2007

Hi,RARP is Reverse Address Resolution Protocol. 

This protocol is working in Datalink layer. Coz it is made so to work, in that layer to find the DLCI number in a WAN Link.Answer Question  Select Best Answer

Page 35: Desktop Level 2 Question_Network

What are all the technical steps behind when data transmission from server to server via a router and switch?Asked By: praba | Asked On: Nov 25th, 2005

2 answersAnswered by: Sumit Sinha on: Jul 14th, 2007

The communication is between two SERVERS. But to a server can communicate with a client only. so if both system are behaving as server then first of all on both system a client should run as well.Now ...Answered by: mitul patel on: Jun 10th, 2006

hi,i am giving answer by considering switch and router.switch is a layer2 device(data link layer) while router is a layer 3 device(network layer). now tcp/ip is a peer-peer protocol suite, which means...Answer Question  Select Best Answer

How is EIgrp better than ospf?Asked By: Sunit Agarwal | Asked On: Jul 5th, 2007

1 answer

EIgrp is better than osPFAnswered by: deepak pant on: Jul 6th, 2007

I will give you the difference between then you can understand why it is better OSPF (Open Shortest Path First) it's link state protocol which sending hello packet to it's neighbours give bes...Answer Question  Select Best Answer

What is network simulator?Asked By: Pushpa | Asked On: May 15th, 2007

1 answerAnswered by: sindhu on: Jun 21st, 2007

A Network Simulator is an object oriented, event driven discrete simulator written in C++, with an object oriented tool command language (OTCL) interpreter as a front end.Answer Question  Select Best Answer

What is difference between domain and work group?Asked By: Anshul Mayriya | Asked On: Mar 29th, 2007

1 answerAnswered by: deepakyadavj on: Jun 1st, 2007

Workgroup:1. All computers are peers; no computer has control over another computer.2. Each computer has a set of user accounts. To use any computer in the       &nb...Answer Question  Select Best Answer

What is terminal service?Asked By: narottam | Asked On: May 9th, 2006

4 answersAnswered by: lucky_2friends on: Apr 23rd, 2007

Windows 2000 Terminal ServicesTerminal services may be provided by Windows 2000 server computers. Terminal services can allow remote computers to run desktops and applications on a server as though i...Answered by: bhanu prakash on: Oct 3rd, 2006

Terminal ServicesFirstly you have to configure Terminal Service in Control panel , Add/Remove Programme.IN Terminal Sevices you can configure your Server and Client PC's through Terminal service from ...Answer Question  Select Best Answer

What is difference between terminal service and remote desktop?Asked By: saravanan | Asked On: Apr 11th, 2006

5 answersAnswered by: kesi reddy on: Mar 31st, 2007

DNS:Domain name server,Domain name server resolves client to  client communicate by host names.it converts ip   adderss to host names  Dhcp:Dynamic host co0nfiguration protocol.it assigns ip addre...Answered by: nacromancer on: Feb 24th, 2007

Page 36: Desktop Level 2 Question_Network

hiyaDNS as ya knw Domain name Server reslove ip in names vice versaDHCP is dynamic host control protocol...dynamiclly assign ipz to machines...in windows jst enbalin dhcp option but in linux hve to co...Answer Question  Select Best Answer

How can we configure mail-server in win2003adsAsked By: prabhakar | Asked On: Feb 19th, 2007

1 answerAnswered by: mehraban_b on: Mar 22nd, 2007

Open http://127.0.0.1/mail in IE at server.IIS service should be running in control panel/svcs.msc, port 25 (smtp), and 110(pop3) should be open. Answer Question  Select Best Answer

What is the difference between packet switched, cell switched and circuit switched technology?Asked By: rajaphy47 | Asked On: Feb 23rd, 2007

1 answerAnswered by: saranyamahendran on: Mar 10th, 2007

hai         packet switch: here the packets send by the user takes differrent path each time it is send. circuit switch : ...Answer Question  Select Best Answer

What is frame relay?Asked By: rajaphy47 | Asked On: Feb 13th, 2007

1 answerAnswered by: khushbu on: Feb 13th, 2007

Frame relay is a packet switching technology. It will operate in the data link layer.Answer Question  Select Best Answer

How can I control the usb ports through network?Asked By: SATHISH | Asked On: Jun 28th, 2006

5 answersAnswered by: ramesh on: Dec 4th, 2006

registry edit use gpedit run scriptAnswered by: gaurav on: Aug 10th, 2006

through group policy or  through remote desktop to local PCAnswer Question  Select Best Answer

What is the difference between remote desktop sharing and desktop sharing through net meeting?Asked By: Shahzad Siddiqui | Asked On: Aug 26th, 2006

2 answersAnswered by: kelve on: Oct 19th, 2006

Remote desktop sharing means you can access the remote desktop and share the screen in local. But any command you enter would be executed by remote. Desktop Sharing through Netmeeting means ...Answered by: bhanu prakash on: Oct 3rd, 2006

Remote desktop Sharing  means  sharing any pc and server's from any system by Connecting through Terminal services and enable the Remote Desktop Connection in all the pc's and type the IP ad...Answer Question  Select Best Answer

If in a company with 80 computers with wireless network .All are using wireless internet.What is bandwidth per user?Asked By: vijendra singh | Asked On: May 10th, 2006

4 answersAnswered by: Niranjan on: Oct 17th, 2006

Page 37: Desktop Level 2 Question_Network

Firstly, the type of wireless network is not mentioned clearly. Still I have some observations as per experience.Case:1The bandwidth per user in a 80 computers in a wireless network depends on the con...Answered by: Davis on: Aug 21st, 2006

At least try to understand the question. The question is 'What will be the bandwidth, not the range..'Answer Question  Select Best Answer

What is patch management ?Asked By: Deven | Asked On: May 10th, 2006

1 answerAnswered by: shridhar76 on: May 16th, 2006

Hi, Patch management is an area of systems management that involves acquiring, testing, and installing multiple patches (code changes) to an administered computer system. Patch management tasks i...Answer Question  Select Best Answer

What is daemon? How does it differ from the cron batch process? When a cron initiates a command can the command which runs in background be termed as daemon? Also when I run a command with "&" at the end...Asked By: geek_zubi | Asked On: Mar 31st, 2006

2 answersAnswered by: geek_zubi on: Apr 13th, 2006

Cool........Thanks for your prompt replyAnswered by: Bibin Thomas on: Apr 12th, 2006

A Daemon is a process which runs in the backgorund which doesn need any user interaction. Once started it keeps on running and oing its neccessary tasks. A Chron Batch process.... Now these are one of...

Which type protocols are used in sending mail attachment?Asked By: vazid | Asked On: Sep 9th, 2006

19 answersAnswered by: jimsachin on: Jan 10th, 2012

IMAP, POP3, SMTP and HTTP email protocolsAnswered by: jitendra on: Sep 15th, 2011

POP3Answer Question  Select Best Answer

End-to-end connectivity is provided from host-to-host in 1. The network layer 2. The transport layer 3. The session layer 4. It is a combined functionality of the network and data...Asked By: Rujul | Asked On: Mar 9th, 2007

5 answersAnswered by: vijay on: Nov 1st, 2011

4Answered by: bhagyashri on: Oct 17th, 2011

Transport layerAnswer Question  Select Best Answer

What is the router?How will it work?Asked By: suresh | Asked On: May 27th, 2006

10 answersAnswered by: Shafi23 on: Sep 7th, 2011

router is a device used for communication between 2 VLAN'sAnswered by: san_microsoft on: Mar 6th, 2008

1. router is layer 3 device.2. it's working on netwrk layer.2. router forword packet from one network to another n/w.3. router by default break up broadcast domain & collision domain.4. router...Answer Question  Select Best Answer

Client server application

Page 38: Desktop Level 2 Question_Network

Asked By: Psneha | Asked On: Feb 15th, 20104 answers

Which of the following is not a client server application? a) internet chatb) web browsingc) pingd) e mailAnswered by: syed on: Aug 25th, 2011

obviously PING bcoz Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) it doesn't provide servicesAnswered by: sri on: Aug 11th, 2011

internet chatAnswer Question  Select Best Answer

Remote desktop connectionAsked By: Azhar Afridi | Asked On: May 12th, 2008

6 answers

Can we establish remote desktop connection without having net connectivity in a lan ?Answered by: shashi kant on: Aug 14th, 2011

yes it is possible LAN is use for local area network. remote desktop is a feature by just writing the cmd mstsc you can establish remote desktop connection.Answered by: sunilbaglur on: Sep 24th, 2010

First you have to enable Remote Desktop from Client which will make users connect to that computer. for that follow steps.1. Right click my computer 2. Go to Properties3. Go to Remote tab4. Enable (ch...Answer Question  Select Best Answer

How to work tcp/ip?Asked By: venu_v6 | Asked On: Nov 5th, 2005

6 answersAnswered by: amit.k.s on: Aug 10th, 2011

TCP/IP works as the media in two or more system.Answered by: Ashish on: Nov 22nd, 2006

TCP/IP is the model  but the working of TCP IP isTCP is responsible for the establishing the connectionIP is responsible to fowrward the data packet to the network   Answer Question  Select Best Answer

Which prefix does priVATe afi use?Asked By: tonakis | Asked On: May 18th, 2007

2 answersAnswered by: renmark on: Jul 15th, 2011

49Answered by: Wizou on: Nov 9th, 2007

The response is 49 !!!;)

This was a question of Cisco in Cisco Networking Academy !Answer Question  Select Best Answer

What is client/server?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

4 answers

Clients and servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called client/server.Answered by: gagan1174 on: Jul 4th, 2011

in client server network, the server acts as a powerful computer while there can be number of clients.the server provides the services to all these clients.the server may contain the database and it m...Answered by: Vinay J on: Mar 1st, 2007

Page 39: Desktop Level 2 Question_Network

the server which can give a service to requested system.The Client is that which can take the service to a severs.Answer Question  Select Best Answer

How does replication takes place between two sitesAsked By: praveenmna | Asked On: Apr 27th, 2007

1 answerAnswered by: Rajesh kumar. S on: May 7th, 2007

For connection objects to be created between two sites, however, we should enable replica & schedule time on the console...Answer Question  Select Best Answer

What is meant by 3-tier architecture?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

1 answer

In 3-tier client/server systems, the application logic (or process) lives in the middle tier and it is separated from the data and the user interface. In theory, the 3-tier client/server systems are more scalable, robust and flexible.Example:            ...Answered by: vinitogupta on: Feb 7th, 2007

A special type of client/server architecture consisting of three well-defined and separate processes, each running on a different platform: 1. The user interface, which runs on the user's computer (th...Answer Question  Select Best Answer

What is meant by 2-tier architecture?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

3 answers

In 2-tier client/server systems, the application logic is EIther burried inside the user interface on the client or within the database on the server.Example: file servers and database servers with stored procedures.Answered by: vinitogupta on: Feb 7th, 2007

Refers to client/server architectures in which the user interface runs on the client and the database is stored on the server. The actual application logic can run on either the client or the server.Answered by: kedar on: Dec 16th, 2005

In two tier architecture, the business logic layer is either clubbed with the presentation layer or with the persistence layer making either the client fat or the server fat respectively.Answer Question  Select Best Answer

What is groupware server?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

1 answer

Groupware addresses the management of semi-structured information such as text, image, mail, bulletin boards and the flow of work. These client/server systems have people in direct contact with other people.Answered by: vinitogupta on: Feb 7th, 2007

A groupware server is software designed to enable users to collaborate, regardless of location, via the Internet or a corporate intranet and to work together in a virtual atmosphere.Answer Question  Select Best Answer

How would you apply a new patch to all the computers on lan from the server.Asked By: kbbabu2279 | Asked On: Mar 18th, 2007

2 answers

How would you apply a new patch to all the computers on lan from the server. Say it is an update patch and the only machine accessible to you is the cpu of the server and you have all the ip of the connected systems and remember none of the clients have a cd rom or other device than the hard drive with...Answered by: prathore on: Apr 21st, 2011

We can deploy the patch as a package on server and make it available for the clients to install. 

Page 40: Desktop Level 2 Question_Network

Answered by: raj on: Jun 6th, 2007

For this we can install Patch Management Sotftware on server and we can make schedule to install the patch on the computers.Answer Question  Select Best Answer

What will happen if we have two dhcp servers in our network. Will there be any problem. How does it work?Asked By: Monalisa Saha | Asked On: Sep 1st, 2006

3 answersAnswered by: mc.chandrakiran on: Sep 16th, 2010

If we are usung two DHCP Servers in a network for assigning IP's. They use 80:20 Rule in assigning ip's to the machines. i.e. Server1 uses 80% ips from his ippool and Server2 assigns 20% ips f...Answered by: sudhir.akondi on: Jun 10th, 2008

a more elaborate answer would be this:  If there are two DHCP servers in a network, both the servers would receive the DISCOVER messages unicast by the Relay Agent or broadcast by the client. Dep...Answer Question  Select Best Answer

GranAsked By: santhosh.kanchanapally | Asked On: Apr 16th, 2008

1 answer

Explain about gran?. Explain briefly all the topics that are related to gran?Answered by: Mr. Phantom on: Jul 28th, 2010

Abbreviation for GSM Radio Access Network.It manages the network between your Cell phone and its Core Network.Answer Question  Select Best Answer

Client server networkAsked By: dhananjaym | Asked On: Jan 11th, 2010

1 answer

Explain working of client server network systemAnswered by: ashok_kumar on: Jul 12th, 2010

A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients r...Answer Question  Select Best Answer

Find every mail server connected to the internetAsked By: razamca | Asked On: Mar 8th, 2010

1 answer

If you were asked to find every mail server connected to the internet, what would you do? What criteria would you use to determine if your solution is the best? What process would you follow? Make any assumptions you need to. What are the critical assumptions?Answered by: Santosh91 on: Jun 23rd, 2010

I will prefer to use Ping command to find out the same.If I am able to ping the Public IPs set for the Servers then it stats that every server is connected to the Internet.Hope this is one of the righ...Answer Question  Select Best Answer

Broadcast ipAsked By: supriya.160 | Asked On: Apr 24th, 2009

3 answers

What is a broadcast ip ?How will you identify a broadcast ip in an address range or in a working network topology?Answered by: manishtripathi on: Mar 21st, 2010

Pick any one IP address of the IP address range provided and the subnet mask. Cnvert both in binary. Now reverse the subnet mask and place 0s where is 1s, 1s where is 0s. perform an OR operation betwe...Answered by: afsalgafoor on: Dec 22nd, 2009

Page 41: Desktop Level 2 Question_Network

Just look the value of subnet mask; it will divide IP address into two parts, Network part and Host part, by noting the value of all 1 in octect belongs to network part and remaining for hos...Answer Question  Select Best Answer

Replace dns serverAsked By: mohitdns | Asked On: Jul 8th, 2009

1 answer

If we wanted to replace the dns server that has configured for web hosting also. What changes are needed? Site should be up within 30 minuts.Answered by: lalit.study on: Oct 23rd, 2009

Select another global catalog server, transfer all primary services like DNS, WINS, DHCP to another(Secondary) server.Answer Question  Select Best Answer

What is meant by asymmetrical protocols?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

1 answer

There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a service. Servers are passively awaiting for requests from clients.Answered by: Gunvant on: Sep 6th, 2009

When, for every request there is a response that protocol is symmetrical protocol and when this is not true, that protocol would be Asymmetrical protocol

What is udp?Asked By: pllaxman | Asked On: Feb 11th, 2008

2 answers

What is the full form of udp? How it works? What is the use of udp?Answered by: devender singh on: Aug 19th, 2009

UDP is a protocol (User Datagram Protocol) and it is a part of the internet protocol suite. It is responsible for carry massage through internet.Answered by: singhathakur on: Feb 12th, 2008

UDP is connection less protocol UDP dose not provide mechanisms for error detection and error correction between the source and the destination.Because of this, UDP utilized bandwidth more efficiently...Answer Question  Select Best Answer

Network termsAsked By: krishna_5883 | Asked On: May 2nd, 2008

3 answers

What is the definition: dns, domain, domain controller, dhcp, vpn, serverAnswered by: somashekharcn on: Jul 16th, 2009

This All concepts I will explain one by one 1. DNS - Domain Naming Services, where this is running that computer we called as DNS server, the main purpose of using this is normally human beings rememb...Answered by: singhsatish15 on: Sep 4th, 2008

DNS: It stands for Domain Naming System. It is used to resolve FQDN to IP and IP to FQDN. It used boot P protocol.Domain: It is a logical grouping of computers, Groups, Users, which centerlized databa...Answer Question  Select Best Answer

What is fsmo?Asked By: ashu | Asked On: Jun 22nd, 2007

2 answersAnswered by: somashekharcn on: Jul 16th, 2009

FSMO - Flexible single master operation FSMO have Total 5 master, 2 master in forest level and 3 masters in Domain level. Forest Level Masters 1. Schema Master 2. Domain Naming Master. Domain Level Ma...Answered by: govindaraju on: Oct 29th, 2007

flexible single master operation.

Page 42: Desktop Level 2 Question_Network

Answer Question  Select Best Answer

What is collision domain and broadcast domain? What is the difference between collision domain and broadcast domain?Asked By: sriram.koyelada | Asked On: Feb 9th, 2007

2 answersAnswered by: sharadpalyekar on: Jun 26th, 2009

Collision domain measures the numbers of nodes impacted when a network collision occurs. When you segment a LAN (using a bridge or switch for example) you're in effect establishing a collision domain ...Answered by: sixthzenz on: Apr 9th, 2008

A collision domain measures the numbers of nodes impacted when a network collision occurs. When you segment a LAN (using a bridge or switch for example), you're in effect establishing a collision ...Answer Question  Select Best Answer

What are the two types of oltp?Asked By: Interview Candidate | Asked On: Jul 14th, 2005

6 answers

Tp lite, based on stored procedures.Tp heavy, based on the tp monitors.Answered by: kr_kanna07 on: Feb 23rd, 2009

Online Transaction Propcessing (OLTP),Online Complex Processing(OLCP) and Online Analytical Processing(OLAP).Answered by: srinivas on: Jan 15th, 2007

Hi,OLTP : IN-LINE TRANSACTION PROCESSINGIT DON'T HAVE ANY TYPES.IT MAINTAIN CURRENT DATA ONLY.IT PERFORM DML OPERATIONS LIKE INSERT ,DELETE AND UPDATEOK BYESRINIVAS.JAnswer Question  Select Best Answer

Tombstone objectAsked By: manishtripathi | Asked On: Nov 16th, 2008

1 answer

What is tombstone object in windows server 2003 active directory, how can we recover a deleted item using tombstone?Answered by: drum4ravi on: Dec 9th, 2008

When Active Directory deletes an object from the directory, it does not physically remove the object from the database. Instead, Active Directory marks the object as deleted by setting the object'...Answer Question  Select Best Answer

Windows 2k3 clustering and laod balancingAsked By: arunmws | Asked On: Nov 9th, 2008

What is the difference in server 2000 clustering and server 2003 clustering /what is load balancing in 2003 server ?Answer Question

What is the difference between a domain controller and a member serverAsked By: dimple.saudimple | Asked On: Aug 14th, 2007

2 answersAnswered by: rtnath on: Oct 13th, 2008

DC is a Domain controller in Windows Server and it authenticates the users and the computers to join the domain. Member server is an ordinary server where no authentication is stored and there will be...Answered by: Suveer on: Sep 24th, 2007

Page 43: Desktop Level 2 Question_Network

Domain controllers are typically referred as DC. Domain controller is a server based on MS windows or Windows NT which is responsible for allowing host access to domain resources. Domain controller is...Answer Question  Select Best Answer

Gui testingAsked By: qakenyang | Asked On: Jun 9th, 2008

2 answers

When you get a url,how do you start to test a web based software application?Answered by: Animesh Srivastava on: Aug 29th, 2008

Web-based application security is a major concern for all developers. Taking the time to secure your application development may involve nothing more than avoiding these common application security m...Answered by: silk9274 on: Jul 8th, 2008

Graphical User interfaceAnswer Question  Select Best Answer

What is tandem server? Why and where you use it?Asked By: Sachin | Asked On: Jun 29th, 2007

1 answerAnswered by: laxmy_tandem on: Aug 19th, 2008

Tandem servers are non stop , fault tolerant servers which are used for applications which need heavy transaction processing.(OLTP).  Answer Question  Select Best Answer

Regarding usbAsked By: rajesh_thenpalli | Asked On: Dec 15th, 2007

1 answer

When I connect my usb system finds it but when I try to open it the system shows thatinsert a disk in the drive .What is the problem.Its properties shows the device is working fine what is the problemAnswered by: janardhan Reddy Manukonda on: Jul 15th, 2008

USB port is ok, but the disk trying to open is full of virus. right click to that and select open.Answer Question  Select Best Answer

What is fragmentation?Asked By: Asif Karim | Asked On: Sep 25th, 2007

1 answerAnswered by: sudhir.akondi on: Jun 10th, 2008

 I guess you are referring to IP Fragementation. Every interface has a Maximum transmit capacity based on it's buffer and internal devicestructure. This is denoted by something known as ...Answer Question  Select Best Answer

How many domains can add or create with-in a forest (2000 or 2003)?Asked By: vhemadriv | Asked On: Feb 13th, 2008

1 answerAnswered by: namrata sharma on: Jun 4th, 2008

There can be one or more domain trees in the forest, though the first domain is designated as the forest root domain  Answer Question  Select Best Answer

Contemporary information technologyAsked By: leighcurran | Asked On: Jun 4th, 2008

What is contemporary information technology?Answer Question

Explain about the products in windows XP , server 2000, server 2003 and exchange servers?Asked By: sen | Asked On: Sep 23rd, 2006

Page 44: Desktop Level 2 Question_Network

4 answersAnswered by: amarjeet7 on: May 24th, 2008

Buddy PLease correct You Theory

Standard Edition 2003 can Support 64 Bit alsoAnswered by: Vidyadhar Kulkarni on: Oct 11th, 2007

Already any one has explained about Win-XP & Windows server 2000. I will explain you about Windows Server 2003.1. In Windows Server 2003 there are three versions i) Enterprise Edition :- It's the s...Answer Question  Select Best Answer

What is a web server?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

4 answers

This new model of client/server consists of thin, protable, "universal" clients that talk to superfat servers. In the simplet form, a web server returns documents when clients ask for them by name. The clients and server communicate using an rpc-like protocol called http.Answered by: Azhar Afridi on: May 12th, 2008

Thanx sandivigore........i m satisfied with ur answer.........Now, can u answer one more question??????

Can we do remote desktop connection without having net connection????????Answered by: sandivigore on: Mar 22nd, 2007

Bsically web server is a Server that host website and responds to HTTP request.  when a client request the web server by typing the web address in the address bar, the request is sent to the DNS ...Answer Question  Select Best Answer

What is the difference between trigger and rule?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

1 answer

The triggers are called implicitly by database generated events, while stored procedures are called explicitly by client applications.Answered by: prasad.khalatkar on: Mar 5th, 2008

Triggers Are Genrated when Some Invalid Data Filled In The Form, And Rules Are Deployed To The Particular Field It Allows Only Valid Entry. Answer Question  Select Best Answer

Domain group policyAsked By: ravila23 | Asked On: Feb 21st, 2008

1 answer

Does group policy that is associated with one domain automatically propagate to other domains in the forest? Why or why not?Answered by: prasad.khalatkar on: Mar 5th, 2008

Yes If It is In Transative Trust Or Not If Not In Trust.Answer Question  Select Best Answer

How do you recover password without formatting the windows system?Asked By: ankush sharma | Asked On: Oct 16th, 2007

2 answersAnswered by: prasad.khalatkar on: Mar 5th, 2008

If Your Computer Is On Domain Use Domains Power User Account To Reset The Password, And If Your Computer Is On Local Run The Another OS And Delete The Sam File.Answered by: Dipti Ranjan Biswal on: Nov 24th, 2007

If your operating system supports networking and your operating system is a client on a server then server can give the new password to this client.Answer Question  Select Best Answer

Page 45: Desktop Level 2 Question_Network

Server recovery optionsAsked By: ravila23 | Asked On: Feb 21st, 2008

1 answer

What are the recovery options for a server that won't boot?Answered by: gururam_2k8 on: Feb 29th, 2008

Hdisk problem means, run chkdiskOS problem means check the c:windowssystem32configsoftware.dat file

What is load balancing?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

3 answers

If the number of incoming clients requests exceeds the number of processes in a server class, the tp monitor may dynamically start new ones and this is called load balancing.Answered by: deven.pawar on: Feb 21st, 2008

Distributing processing and communications activity evenly across a computer network so that no single device is overwhelmed. Load balancing is especially important for networks where it's difficu...Answered by: singhathakur on: Feb 12th, 2008

If router recive multiple path with the same administrative distance and cost to a destination in this case load-balancing will be accur. In the case of load-blancing router use the round dropping pac...Answer Question  Select Best Answer

What is Microsoft isa server? Explain with real time usage where it's used.Asked By: Satyam Shah | Asked On: Jun 21st, 2007

1 answerAnswered by: sarunhere on: Dec 26th, 2007

ISA Server  isn't just a multilayer filtering firewall and Web caching server, it's also a secure remote access VPN server or gateway.ISA Server the best VPN choice for your network.Answer Question  Select Best Answer

Excel file displayed in HTML format when accessed through httpAsked By: gerald.amalraj | Asked On: Dec 13th, 2007

I have an excel file in a remote system, when I access this file using the below url path it displayed in webpage format(i.E .HTML format) why is it displayed in .HTML format?Http://localhost:8080/efirsthelp/web/print.XlsAnswer Question

What are the differences between the three models in client/server architecture?What are the implications for performance and cost between themAsked By: rads | Asked On: Nov 7th, 2007

Answer Question

What is a database server?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

2 answers

With a database server, the client passes SQL requests as messages to the database server. The results of each SQL command are returned over the network. The server uses its own processing power to find the request data instead of passing all the records back to the client and then getting it find its...Answered by: prashant bhartiya on: Nov 1st, 2007

Data base server is store database , any kind of date they can storeAnswered by: vinitogupta on: Feb 7th, 2007

a database server, performs tasks such as data analysis, storage, data manipulation, archiving, and other non-user specific tasks.Answer Question  Select Best Answer

Page 46: Desktop Level 2 Question_Network

What are the differences between tp lite and tp heavyAsked By: latinya | Asked On: Oct 25th, 2007

Answer Question

What are the differences between iis 5.0 and iis 6.0?Asked By: somavenki | Asked On: Oct 21st, 2007

Answer Question

What information is stored in exchange server?Asked By: praveenmna | Asked On: Jul 31st, 2007

1 answerAnswered by: Vidyadhar Kulkarni on: Oct 11th, 2007

Exchange server is used as office's mail server. It collects all the office mails and  exchanges the mails to perticular given mail addresses.In exchange server we have to give the perticular...Answer Question  Select Best Answer

What is the 9 series server, C class, p class, what is data procteter, blades serversAsked By: jayanthan.pb | Asked On: Jul 30th, 2007

Answer Question

Why should we use 'and' between subnet number and subnet mask ?Asked By: Ramya | Asked On: Jun 1st, 2007

Answer Question

What is a file server?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

2 answers

File servers are useful for sharing files across a network. With a file server, the client passes requests for file records over nerwork to file server.Answered by: sac on: May 4th, 2007

File server is a server that contain all data of a network which require to each user.All drive shared of that server and map on client. computers.Security & permission also created on that for user ...Answered by: Vinith John on: Aug 29th, 2006

File Server are those servers in which we can share files (in simple...)we can giv security permissions to all those files in fileservers...Answer Question  Select Best Answer

How to set up outlook web access in windows 2003 exchange environment?Asked By: sandivigore | Asked On: Mar 22nd, 2007

1 answerAnswered by: NIZAM on: Apr 2nd, 2007

Once exchnage server 2003 is installed on your server. OWA - outlook web access is also automatically installed.

 to access OWA : just type open IE  typ : http://your-ip/exchange

Answer Question  Select Best Answer

Which of the options is correct for the following question and explain those terms?Split horizon with poison reverse is asssociated witha)osPF b) bsp c)egp d)ripAsked By: ykbharat | Asked On: Feb 28th, 2007

Answer Question

What is meant by transparency?

Page 47: Desktop Level 2 Question_Network

Asked By: Interview Candidate | Asked On: Mar 6th, 20051 answer

Transparency really means hiding the network and its servers from the users and even the application programmers.Answered by: vinitogupta on: Feb 7th, 2007

Transparency is usually considered to be a good characteristic of a system because it shields the user from the system's complexity.Answer Question  Select Best Answer

What is meant by middleware?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

1 answer

Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle of the client/server systems and it acts as a bridge between the clients and servers. It starts with the API set on the client side that is used to invoke...Answered by: vinitogupta on: Feb 7th, 2007

The term middleware is used to describe separate products that serve as the glue between two applications. Software that connects two otherwise separate applications. For example, there are a number o...Answer Question  Select Best Answer

What are the two broad classes of middleware?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

1 answer

General middlewareservice-specific middlewareAnswered by: vinitogupta on: Feb 7th, 2007

The term middleware is used to describe separate products that serve as the glue between two applications. It is, therefore, distinct from import and export features that may be built into one of the ...Answer Question  Select Best Answer

What are the characteristics of client/server?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

1 answer

Serviceshared resourcesasymmentrical protocolstransparency of locationmix-and-matchmessage based exchangesencapsulation of servicesscalabilityintegrityclient/server computing is the ultimate "open platform". It gives the freedom to mix-and-match components of almost any level. Clients and servers are...Answered by: vinitogupta on: Feb 7th, 2007

Characterstics are speak and listenAnswer Question  Select Best Answer

How many bootable files are there in windows 2000 with their functions?Asked By: mrgarg.1983 | Asked On: Jan 31st, 2007

Answer Question

Explain about hotfix?Asked By: sen | Asked On: Sep 23rd, 2006

2 answersAnswered by: Arpit on: Dec 14th, 2006

A hotfix is code (sometimes called a patch) that fixes a bug in a product. Users of the products may be notified by e-mail or obtain information about current hotfixes at a software vendor's Web site ...Answered by: Arpit on: Dec 14th, 2006

A hotfix is a single, cumulative package that includes one or more files that are used to address a problem in a product. Hotfixes address a specific customer situation and may not be distributed outs...Answer Question  Select Best Answer

What is meant by asymmetric multiprocessing (amp)?

Page 48: Desktop Level 2 Question_Network

Asked By: Interview Candidate | Asked On: Mar 6th, 20051 answer

It imposses hierarchy and a division of labour among processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions.Answered by: nani on: Oct 13th, 2006

asymmetric multi proceesing means each and every processer contain its own specific task.master processer assign tasks to slave processer.

What is the default subnet mask for an ipv6 address ?Asked By: kumar_pankaj | Asked On: Apr 26th, 2006

8 answers

Answered by: ED Kwiatkowski on: Jan 25th, 2012

IPV6 cannot subnet so there is no maskAnswered by: prasanna on: Nov 28th, 2011

255.255.255.255.0Answer Question  Select Best Answer

Printer driver replicationAsked By: sk_naresh | Asked On: Aug 4th, 2008

1 answer

What is printer driver replication and mapping?Answered by: Sree on: Dec 5th, 2011

Printer driver replication means if you have a network printer and if you want to share it among other Citrix servers, then we can replicate that driver to be used by all the Citrix servers or for few...Answer Question  Select Best Answer

What is the difference between domain & workgroup?Asked By: santanu987 | Asked On: Dec 14th, 2007

4 answers

Answered by: Kamlesh on: Nov 1st, 2011

Domain Name ServiceAnswered by: manoj shukla on: Oct 28th, 2011

workgroup is a small network and domain is a large network.Answer Question  Select Best Answer

Default port no. For telnet ___ ? snmp ____? ftp ____?Asked By: harsha548 | Asked On: Oct 6th, 2007

11 answers

Answered by: jitendra yadav on: Oct 29th, 2011

Telnet 23, snmp 25, ftp 20 and 21.Answered by: jitendra.yadav51 on: Oct 14th, 2011

telnet 23 snmp 21 ftp 10Answer Question  Select Best Answer

Page 49: Desktop Level 2 Question_Network

What is ost file?Asked By: sunilbaglur | Asked On: Jul 16th, 2006

2 answers

Answered by: viki on: Oct 20th, 2011

OST Conversion to PST software convert database and recover OST to PST with all emails, contacts, tasks, notes, calendar, journal and appointment, etc. OST to PST Conversion Utility easily understand ...Answered by: vikrant sharma sysnet global technologies on: Jul 27th, 2006

 In Microsoft Office Outlook 2003, a new offline folder file format is introduced that offers greater storage capacity for items and folders and supports multilingual Unicode data. An offlin...Answer Question  Select Best Answer

What is port addressAsked By: fahad | Asked On: Apr 11th, 2007

2 answers

Answered by: Bhabatosh Das on: Sep 16th, 2011

A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. For the Transmission Control Protocol and the User D...Answered by: Ashok Meti on: May 4th, 2007

Port address is transport layer ID (simillar to IP in Network Layer) which identify the application on the host.Answer Question  Select Best Answer

What is difference between baseband and broadband transmission?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

15 answers

In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.Answered by: NEERAJ SINGH on: Sep 5th, 2011

In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent ...Answered by: adityawalia9 on: Jun 15th, 2010

Baseband communication uses TDM.  Whole bandwidth is provided to one user at a time.This type of communication is basically used in LAN where data is transmitted in the form of packets (ETHERNET)...Answer Question  Select Best Answer

What are the types of transmission media?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

6 answers

Signals are usually transmitted over some transmission media that are broadly classified in to two categories.Guided media:these are those that provide a conduit from one device to another that

Page 50: Desktop Level 2 Question_Network

include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed...Answered by: Sarel on: Sep 5th, 2011

Types of transmission media's are: 1) Bounded media 2) Unbounded media Examples of transmission media. 1) Twisted pair, coax, fiber.Answered by: Sathyanarayanan on: Aug 16th, 2011

two types of transmission media.. 1) bounded media - using physical medias like cables...(twisted pair, coax, fiber optic) 2) unbounded media - transmission through radio waves, Bluetooth, WiFi etc..Answer Question  Select Best Answer

What is the difference between physical address and logical address?Asked By: viswanath | Asked On: Dec 19th, 2005

13 answers

  Read Best Answer

Editorial / Best Answer

Answered by: kalyan raghavanAnswered On : Jan 23rd, 2006

A Physical address is a 48-bit flat address burned into the ROM of the NIC card which is a Layer1 device of the OSI model. This iis divided into 24-bit vendor code and 24-bit serial address. This is unique for each system and cannot be changed.A Logical address is a 32- bit address assigned to each system in a network. This works in Layer-3 of OSI Model. This would be generally the IP address.Answered by: Thierry on: Sep 2nd, 2011

The Physical address is the MAC address the logical is the IP address.Answered by: Sathyanarayanan on: Aug 16th, 2011

Physical address is a MAC address on a NIC card that can not be changed.. logical address is an address tat we assign for a node on a network.. ex; IPImprove Answer

What is the role of network administrator?Asked By: joshianantsp | Asked On: Jan 30th, 2007

3 answers

Answered by: vijendersharma on: Aug 27th, 2011

Network administrator's main role is to control and manage the network and troubleshoot all network problems.Answered by: Karmpal on: Aug 24th, 2011

The role of a Network Engineer is as follow: To manage tasks associated with the upgrade or enhancement to the local area network (LAN), wide area networks (WAN) and Internet links. • To assist wit...Answer Question  Select Best Answer

What are the advantages and disadvantages of dhcp?Asked By: sunilbaglur | Asked On: Jul 16th, 2006

Page 51: Desktop Level 2 Question_Network

6 answers

Answered by: vizhiezhilan on: Aug 27th, 2011

Dynamically configures the IP addresses for the systems present in the network within the specified range only. Reservation of IP address in done here. makes administration at a single point. IP confl...Answered by: sunilbaglur on: May 27th, 2011

Advantages All the IP configuration information gets automatically configured for your client machine by the DHCP server. If you move your client machine to a different subnet, the client will sen...Answer Question  Select Best Answer

What are the types of protocols and what are its functions and for what purpose this protocol is used give me a brief explanation?Asked By: Venkatesh | Asked On: Sep 19th, 2006

6 answers

Answered by: Abhijith S R on: Aug 3rd, 2011

based on the type of networks,there can be 2 types of protocols,connection oriented protocol which is tcp and connectionless oriented protocol which udp.Answered by: ANKIT on: Dec 21st, 2006

Their are various type of protocols exactly no person can tell u all the names of protocols.various types of protocols like http,ftp,smtp,nntp,imap,ospf,udp,utp etc..The function of protocols is to pr...Answer Question  Select Best Answer

Network protocol testing questionAsked By: kirubakar | Asked On: Aug 3rd, 2011

What is the difference between networking and telecom domain ? Will network protocol testing will come under telecom domain?Answer Question

What is mesh network?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

5 answers

A network in which there are multiple network links between computers to provide multiple paths for data to travel.Answered by: GHUBIYH on: Aug 2nd, 2011

E: What is mesh network? In mesh network all host are connected to each other, but it takes huge amount of cable.Answered by: dharmendra1826 on: Oct 12th, 2007

In mesh network all host are connected to each other, but it takes huge amount of cabel.Answer Question  Select Best Answer

Which of the following iso level is more closely related to physical communications facilitiesAsked By: Rujul | Asked On: Mar 9th, 2007

4 answers

Page 52: Desktop Level 2 Question_Network

1. Application 2. Session 3. Network 4. Data linkAnswered by: Anil Biradar on: Jul 30th, 2011

Data Link LayerAnswered by: abhay katiyar on: Mar 26th, 2007

data link layer because frame made in data link layer after that frame converted in to signal form at the physical layer.Answer Question  Select Best Answer

What is raid?Asked By: Interview Candidate | Asked On: Jul 27th, 2005

5 answers

A method for providing fault tolerance by using multiple hard disk drives.Answered by: [email protected] on: Oct 12th, 2006

HIRAID:Redundent Array Of Inexpansive Drives;Besically raid can be done in either Software RAID or Hardware Raid.for h/W RAID we need raid controllers which is hot swappable.where as S/W Raid is done ...Answered by: Tanveer on: Mar 21st, 2006

Short for Redundant Array of Independent (or Inexpensive) Disks, a category of disk drives that employ two or more drives in combination for fault tolerance and performance. R...Answer Question  Select Best Answer

How can we create vpn to connect to branch office of the same office.What would be the preliminary requirement?Asked By: deependra | Asked On: Jun 15th, 2006

4 answers

Answered by: panditume on: Jul 7th, 2011

is a secure way of connecting to a private LAN at a remote location, using the Internet or any unsecure public network to transport the network data packets privately, using encryption.The VPN uses au...Answered by: Well wisher on: Feb 21st, 2007

Are you crazy, when you don’t know answer why you are writing nonsense.

 

I request to webmaster to block such an illiterate users post.

Answer Question  Select Best Answer

What is the difference between sd ram & ddr ram & ddr2 ram?Asked By: suraj | Asked On: Apr 20th, 2007

1 answer

I want answer in typical technical language with reference to computer.Answered by: panditume on: Jul 7th, 2011

SD RAM:SDRAM is Single Data Rate meaning that SDRAM can accept one command and transfer one word of data per clock cycle. Typical speeds of SDRAM are 100 and 133 MHz.DDR SDRAM:DDR SDRAM transfers d...

Page 53: Desktop Level 2 Question_Network

Answer Question  Select Best Answer

If you are given the ip address can u tell how many computers can be connected?What do you look at?Asked By: thabo | Asked On: Aug 9th, 2006

3 answers

Answered by: bhanuprakash on: Sep 30th, 2006

For Example in Class AIf IP address is 1.0.0.1 then Network bits is 8 bits and hosts bits are 24bits by calculating by formula 2n-2 (2power)Their fore for 1.0.0.1 the no computers can be connected ...Answered by: Phani kumar sarma on: Aug 11th, 2006

Normally in IP address in fourth tab usually they will give the serial number of the using computer. in that case we can say how many computers are there. if not its impossiable to say.Answer Question  Select Best Answer

What is proxy arp?Asked By: Interview Candidate | Asked On: Mar 6th, 2005

1 answer

It is using a router to answer arp requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.Answered by: panditume on: Jul 6th, 2011

Proxy ARP is the technique in which one host, usually a router, answers ARP requests intended for another machine. By "faking" its identity, the router accepts responsibility for routing...Difference between ntfs and fat32?Asked By: ravi_poo2002 | Asked On: Mar 24th, 2006

56 answers

  Read Best Answer

Editorial / Best Answer

Answered by: Aparna PatilAnswered On : Mar 24th, 2006

NTFS1)allows access local to w2k,w2k3,XP,win NT4 with SP4 & later may get access for somefile.2)Maximum size of partition is 2 Terabytes & more.3)Maximum File size is upto 16TB.4)File & folder Encryption is possible only in NTFS.FAT 321)Fat 32 Allows access to win 95,98,win millenium,win2k,xp on local partition.2)Maximum size of partition is upto 2 TB.3)Maximum File size is upto 4 GB.4)File & folder Encryption is not possible.Answered by: sanjay kumar prajapati on: Jan 7th, 2012

NTFS 1)allows access local to w2k,w2k3,XP,win NT4 with SP4 & later may get access for somefile. 2)Maximum size of partition is 2 Terabytes & more. 3)Maximum File size is upto 16TB. 4)File & folder...Answered by: vijayraj on: Jan 5th, 2012

Page 54: Desktop Level 2 Question_Network

fat32:- is limit for file name it contain 8 character ntfs:-over limit for fat32 ntfs contain a 8.3(expresion) long file nameWhat is the meaning of physical memory and virtual memory?Asked By: vanitha | Asked On: Mar 5th, 2006

12 answersAnswered by: mohamed Tausif on: Oct 16th, 2011

Wrong Ans ........bro ............. virtual memory is a feature of operating system that enables a process a memory(RAM) address space that is independent of other processes running, and USE THE SPACE...Answered by: Parthiban on: Oct 13th, 2011

Physical memory is the actual real memory used in RAM. Virtual memory as the name suggests is not real. The OS uses virtual memory as a memory management technique in which non-contiguous memory is pr...