203 Technical Questions PDF
203 Technical Questions PDF
Router Switch
Router works on Network Layer (layer 3 Switch works on Data Link Layer (layer 2
of OSI model) of OSI model)
Router is used to connect different Switch is used to connect computers or
networks. networking devices in a LAN
Router uses Packets. Switch uses Frames.
Numbers of ports are less (i.e. port Numbers of ports are more (i.e. port
density is low) e.g. 2,4,5,8. density is high) e.g. 24, 48.
It is used in LAN, MAN and WAN. It is used in LAN
In router, every port has its own Switch has one broadcast domain.
broadcast domain.
It uses IP address. It uses MAC address.
Its manufacturers are Cisco, Netgear, Its manufacturers are Cisco, D-Link and
Linksys, Asus, TP-Link, D-Link. Juniper.
Ans – As many ports are there in a switch that many collision domains are there.
For example switch with 24 ports has 24 collision domains.
Ans – A collision domain is, as name implies, a part of a network where packet
collisions can occur. A collision occurs when two devices send a packet at the
same time on the shared network segment.
6. What is broadcast domain?
Ans – Star.
9. What is a star topology?
Ans – A star topology is a topology for a LAN in which all nodes (computers) are
individually connected to a central point, like a hub or a switch. A star takes more
cable than e.g. a bus, but the benefit is that a cable fails; only one node will be
brought down.
Ans – A bus topology is a topology for a LAN in which all nodes (computers) are
connected to a coaxial cable in a liner method, the coaxial cable is also known as
203 Technical Questions Page 2
backbone or trunk which needs to be terminated at the both ends. If a backbone
is broken, the entire segment fails.
In its most simple description, cloud computing is taking services and moving
them outside an organization’s firewall. Applications, storage and other services
are accessed via the Web.
Ans – An application is any program or group of programs that is designed for the
end users. Application software include such as database programs, word
processors, Web browsers and spreadsheets.
Ans –
CAT 5 CAT 6
It supports data transfers up to 100 It can go up to 10 Gbps in data transfer
Mbps in an Ethernet Networks. speeds in an Ethernet Network.
It’s frequency is 100 MHz. It’s frequency is 250 MHz.
It is not able to tackle crosstalk issues It significantly reduces crosstalk issues
due to its limitations. due to protective shielding.
17. What is the forward DNS lookup and reverse DNS lookup?
Ans – Forward DNS lookup is used to convert the human meaningful name
(domain name) which is easy to understand format to computer meaningful name
(IP address), however Reverse DNS lookup works in reverse way to convert IP
address to domain name.
Ans – For sending mails i.e. outgoing or uploading, we use SMTP (Simple Mail
Transfer Protocol) and for receiving mails i.e. incoming or downloading, we use
either POP (Post Office Protocol) or IMAP (Internet Message Access Protocol).
Ans –
POP IMAP
Have to download all messages at once. Can view just message headers and
then choose which messages to
download.
Must download all messages. Delete or move a message without
having to download it.
Must download entire message, Download only the body of a message.
including attachments.
Ans –
Ans – Straight cable is used to connect different types of networking devices e.g.
switch to router while cross cable is used to connect similar types of devices e.g.
router to router.
Ans – POP3
POP3 (Post Office Protocol version 3) is
used to download mails. SMTP
By default port number is 110 SMTP (Simple Mail Transfer Protocol) is
used to send mails.
By default port number is 25
Ans – A router is a network layer device which operates at the network layer of
OSI model. It is used to connect two or more different networks and different
geographical locations. Router is a networking device that forwards data packets
between computer networks. Routers perform the traffic directing functions on
the Internet.
Ans - Wi-Fi Protected Access (WPA) is a security standard for users of computing
devices equipped with wireless internet connections. It provides more
sophisticated data encryption and better user authentication than Wired
Equivalent Privacy (WEP), original Wi-Fi security standard. There are 2 types of
WPA, WPA and WPA2. WPA2 is advanced and more secured compared to WPA.
Ans – Wi-Fi is the technology for radio wireless local area networking devices
based on IEEE 802.11 standards. Devices that can use Wi-Fi technologies include
desktops, laptops, smart phones and tablets, smart TVs, digital audio players and
modern printers. Wi-Fi compatible devices can connect to the internet via
wireless LAN or wireless access point. Such an access point has range of about 20
meters (66 feet).
Ans – Your password should meet the following criteria to be complex and more
secure,
A) It should be non-dictionary word.
B) It should be the combination of upper case (capital letters), lower case
(small letters), numbers and special characters.
Ans – A PST file, or Personal Storage Table (.pst) file, is a Microsoft Outlook Data
File that stores a user’s outlook data for POP3, IMAP and web-based email
accounts, including all mail folders and the items within the folders, such as email
attachments, to do items appointments, contacts and more.
Ans – An OST file (.ost) is an offline folder file in Microsoft Outlook. Offline folders
make it possible for the user to work offline and then to synchronize changes with
the Exchange server the next time they connect. The ability to work offline is
useful in environment with limited or unreliable connectivity.
33. What is difference between .pst and .ost?
Ans –
OST flie
OST stands for Offline Storage Table PST file
OST is offline storage folder PST stands for Personal Storage Table
OST files only support Microsoft Exchange PST is online storage folder
Server PST files can be used with Exchange setup but
not recommended. Apart from Exchange
server, it is also compatible with other servers.
OST files enable users the options to read, PST files don’t have this facility.
view, reply and compose emails even in offline
mode.
Ans – Static ip address is given to the device manually and does not change.
Dynamic ip address is obtained from DHCP server and this may get changed. In
the absence of DHCHP server operating system gives ip address through APIPA
(Automatic Private IP Address) range is from 169.254.0.1 to 169.254.255.254.
Ans – In IT, a protocol is the special set of rules that end points in a
telecommunication connection use when they communicate. Protocols specify
interactions between the communicating devices.
Ans – Subnetting is the practice of dividing network into two or more smaller
networks. It increases routing efficiency, enhances the security of the network
and reduces the size of the broadcast domain.
203 Technical Questions Page 9
40. What is the difference between shared printer and network printer?
Ans – Shared printer is physically connected to the one of the computer in the
network while network printer is connected to the networking device like switch.
Shared printer can’t be accessed when connected pc is turned off whereas
network printer is always available.
Ans – A software program responsible for managing all print jobs currently is
being sent to the computer printer or print server. The print spooler program may
allow a user to delete a print job being processed or otherwise manage the print
jobs currently waiting to be printed.
Ans – The terms 32-bit and 64-bit refer to the way a computer’s processor,
handles information. The 64-bit version of Windows handles large amount of
RAM more effectively than 32-bit system. Using 64-bit one can do a lot in
multitasking, user can easily switch between various applications without any
windows hanging problem.
Ans – Heavy outlook pst data file size or old items in Microsoft Outlook makes it
slower and archiving email in outlook helps to overcome from such issues.
Archiving means saving or backing up the old items of outlook such as messages,
contacts, tasks, calendars and other outlook database.
Ans – It means users are allowed to obtain and view possibly alter the source
code for the operating system kernel and its associated programs. In other words,
it is not a secret and you do not have to pay a license fee and sign a Non-
Disclosure Agreement (NDA) to work with or look at the source code. Some
203 Technical Questions Page 10
popular open source operating systems are Ubuntu, Linux Lite, Fedora, Linux
Mint, Solus, Xubuntu, Chrome OS, and React OS etc.
Ans –
A) Windows 7 Starter
B) Windows 7 Home Basic
C) Windows 7 Home Premium
D) Windows 7 Professional
E) Windows 7 Enterprise
F) Windows 7 Ultimate
Ans – Active Directory (AD) is the directory service that Microsoft developed for
Windows domain networks. It is included in most Windows Server operating
systems as a set of processes and services. A server running Active Directory
Domain Services (AD DS) is called a domain controller. It authenticates and
authorizes all users and computers in a Windows domain type network –
assigning and enforcing security policies for all computers and installing or
updating software.
Ans –
DOMAIN WORKGROUP
203 Technical Questions Page 11
One or more computers are servers and All computers are peers.
remaining are clients.
If you have a user account on the Each computer has set of accounts
domain, you can logon to any computer which can logon on local computer
on the domain. only.
There can be 100 plus computers in the Typically not more than 20-30
domain. computers in the workgroup.
Ans –
SATA PATA
Full form is Serial Advanced Technology Full form is Parallel Advanced
Attachment. Technology Attachment.
Speed is 150 Mbps for SATA 1, 300 Speed is 100/133 Mbps.
Mbps for SATA 2 and 600 Mbps for
SATA 3.
Number of pins of data cable is 7. Number of pins of data cable is 40.
Number of pins of power cable is 15. Number of pins of power cable is 4.
55. What is over clocking? What are the advantages of over clocking?
56. What is heat sink and what is the use in the system?
Ans – Jumper is the metal bridge that closes an electric circuit. A jumper consists
of a plastic plug that fits over a pair of pins. It is used to change board’s
parameters.
58. What do you use to connect two computers without using switch?
Ans – Cross cables are used to connect two computers without using switch.
Ans – The configuration has striping, but no redundancy of data. It offers the best
performance, but no fault-tolerance.
Ans – RAID level 1 is also known as disk mirroring, this configuration consists of at
least two disks. There is no striping. In case of failure of one disk, data can be
retrieved from other disk means there is fault tolerance.
Ans – Network Address Translation (NAT) is the process where a network device,
usually a firewall or router, assigns a public ip address to a computer (or a group
of computers) inside a private network. The main use of NAT is to limit the
number of public ip addresses an organization or company must use, for both
economy and security purposes.
Ans – Boot.ini is used to decide which operating system options are displayed
during the start-up process.
Ans – A hub sends network traffic to all the ports that it is connected to. A switch
sends traffic only to a particular port it is set for.
Ans – A default gateway is the IP address of the router in the network. In any
case, if the users want to switch on to another network, or if they cannot locate
their particular network then the query will be forwarded to default gateway.
68. How to resolve no print issue?
Ans – PC Migration is the process of transferring the entire user environment (e.g.
personal documents and settings) between two computers.
71. How to resolve no internet issue?
72. What are the basic troubleshooting steps for no print issue?
73.What is a processor?
Ans- A processor is the main component of the computer which accepts the
instructions from the input devices, process on that instruction and sends the
output to the output devices.
( ) is a point-to-point processor
QPI- Quick Path InterconnectQPI
interconnects developed by Intel which replaced the front-side bus (FSB).
Ans - If the SMPS fan is working fine after shorting the PS_ON signal (Green) with
any Ground (Black), initially the SMPS is working fine.
Ans - A hard disk is the primary permanent storage device which hosts the
operating system as well as data.
107. What are the different types of HDD?
Ans –
E) USB
110. What is the difference between SATA and SSD hard disk?
Ans -
Ans –
CD DVD
Full form is Compact Disk Full form is Digital Versatile Disc
Capacity is 700 MB Capacity is 4.7 GB
Ans – The different types of monitor are CRT, TFT, LCD, LED and plasma.
Ans – Pixels are the tiny dots (.) on the screen. The more number of pixels means
the more clarity.
114. What is the printer?
Ans – Printer is an output device which converts soft copy into hard copy.
115. What are the types of printer?
Ans – Scanner is an input device which converts a hard copy into soft copy.
118. What are the types of scanner?
Ans – BIOS (Basic Input Output System) is a program or firmware which is loaded
in CMOS chip located on the motherboard. It performs the basic maintenance of
the system by checking all the hardware connected to the system and loads the
operating system.
120. What is the POST?
Ans – When the power is turned on, POST (Power On Self Test) is the diagnostic
testing sequence that a computer’s basic input/output system ( or “starting
program” ) runs to determine if the computer keyboard, RAM, disk drives and
other hardware are working correctly.
Ans – The following steps are there to reset BIOS by using CMOS battery,
A) Turn off PC and disconnect cabinet’s power cord from power socket.
B) By opening cabinet remove CMOS battery from motherboard. Connect
power cord and start the PC.
C) Now again turn off PC install CMOS battery connect power cord and turn on
PC.
RAM - 1 GB
HDD - 16 GB
Ans – The client operating system is the system that works within desktop
computers and various portable devices. Windows 98, Windows 2000
Professional, Windows-XP, Windows Vista, Windows 7, Windows 8 and Windows
10 are the client operating systems of Microsoft.
129. What is server operating system? Name some server OS?
Ans –
203 Technical Questions Page 28
A) Windows 10 Home
B) Windows 10 Pro
C) Windows 10 Enterprise
D) Windows 10 Education
Ans – Dual boot system is a computer system in which two operating systems are
installed on the same hard drive, allowing either operating system to be loaded
and given control. When you turn the computer on, a boot manager program
displays a menu, allowing you to choose the operating system you wish to use.
132. What is the Bitlocker?
Ans – Bitlocker is the full disk encryption feature included with selected editions
of Windows Vista and later. It is designed to protect data by providing encryption
for entire volume.
133. What is Bitlocker To Go?
Ans – Bitlocker To Go allows you to protect data stored on USB storage devices.
134. What is Parental Control?
Ans – Quota is used to specify storage limit on a drive for the users.
Ans – The Windows Update utility is used to keep your Windows-based computer
up-to-date with the latest patches. These updates will close security holes in your
computer and hopefully prevent you from being hacked or infected with viruses.
138. What is the firewall? What are the inbound and outbound rules?
Ans – Firewalls provide the security by limiting access to your computer and
network, a firewall is also useful for allowing remote access to a private network
through secure authentication certificates and logins. Inbound rules are used to
filter the traffic that comes to your computer/network and outbound rules are
used to filter the traffic that leaves your computer/network.
139. What is UAC?
Ans – User Account Control (UAC) is a feature in Windows that can help to
prevent unauthorized changes to your computer. UAC does this by asking you for
permission or an administrator’s password before performing actions that could
potentially affect your computer’s operation or that change settings that affects
other users.
Ans - The password reset disk is essentially a small file that can be used to reset
your password, even if you have changed your password since creating the reset
disk.
141. What is virtual Memory?
Ans - A computer virus is a program or piece of code that is loaded onto your
computer without your knowledge and runs against your wishes and it can
damage your data and Operating System. Boot Sector Virus, Browser Hijacker,
Direct Action Virus, File injector virus, Macro Virus, Multipartite virus,
Polymorphic virus, Resident Virus and Web scripting are the famous viruses.
144. What is kernel?
Ans – Kernel is the core and essential part of computer operating system that
provides basic services for all parts of OS.
145. What is the file system?
Ans – Computers use particular kinds of file systems to store and organize data on
media, such as a hard drive, CDs, DVDs, flash drives etc. Generally there are most
common two types of file systems in Windows i.e. FAT (File Allocation Table) and
NTFS (New Technology File System).
146. What is the difference between FAT & NTFS file systems?
Ans –
Ans – Virtual Hard Disk (VHD) is a disk image file format for storing the complete
contents of the hard drive.
148. What is the Compression and Encryption?
Ans –
A) Compression: - Compression is the process of reducing the size of a file by
encoding its data information more efficiently.
B) Encryption: - Encryption is the most effective way to achieve data security.
To read an encrypted file, you must have access to a secret key or password
that enables you to decrypt it.
Ans – Applocker is a new feature in Windows Operating System that allows you to
specify which users or groups can run particular applications in the computer. If
you use Applocker, you can create rules to allow or deny applications from
running.
150. What is the Device Manager?
Ans –
A) Basic Disk: - A basic disk uses primary partitions, extended partitions and
logical drives to organize data. Basic disks can have either four partitions or
three primaries and one extended partition. The extended partition can
contain multiple logical drives (up to 128 logical drives are supported). A
basic disk can be easily converted into Dynamic Disk.
B) Dynamic Disk: - Dynamic disks provide features that basic disks do not, such
as the ability to create volumes that span multiple disks (spanned and
striped volumes) and the ability to create fault-tolerant volumes (mirrored
and RAID-5 volumes). All volumes on dynamic disks are known as dynamic
volumes. Dynamic disk cannot be easily converted into Basic Disk.
Ans – Pop-up Blocker is a feature in internet Explorer that allows you to block
pop-ups from appearing when you browse a web page.
153. What is the VNC (Virtual Network Computing) software? Name any
5?
Ans – VNC works on a client/server model: A VNC viewer (or client) is installed on
the local computer and connects to the server component, which must be
installed on the remote computer. The server transmits a duplicate of the remote
computer's display screen to the viewer.
Team viewer, Show my PC, Ammy Admin, LogMeIn, imPCremote, TightVNC and
Aeroadmin are famous VNC software.
Ans -
Anti-virus software is a program or set of programs that are designed to prevent,
search for, detect, and remove software viruses, and other malicious software
like worms, Trojans, adware, and more.
156. What is System Repair Disk?
Ans
A -
system repair disc can be used to boot your computer. It also contains
Windows system recovery tools that can help you in recovering Windows from a
serious error or restore your computer from a system image.
157. What is System Restore Point?
Ans - System Restore is a feature in Microsoft Windows that allows the user to
revert their computer's state to that of a previous point in time, which can be
used to recover from system malfunctions or other problems.
158. What is Disk Clean up?
Ans –
A) Remove the RAM, rub it with eraser and re-insert.
B) If a BSOD still occurs, try using that RAM on another system.
C) Every BSOD has a unique code; try searching it on Google to find a solution.
162. What is the use of safe mode? When should we use in Windows?
Ans – Often, we have to start Windows in safe mode in order to remove spyware
or for troubleshooting driver problems and other diagnostic problems. Only
specific programs and files with limited driver support are needed to run the
operating system. This will allow you to attempt to remove viruses, change bad
drivers and perform other diagnostic tasks that cannot be done in normal mode.
163. What is a network? What are the types of network?
Ans - A group of devices which are connected to each other through some media
is called a network. LAN, MAN and WAN are the types of network.
164. What are benefits of network?
Ans –
A) Internet – The internet is a globally connected network system that uses
TCP/IP to transmit data via various types of media. It is a network of global
exchanges – including private, public business, academic and government
networks – connected by guided wireless and fiber-optic technologies.
B) Intranet – A privately maintained computer network that can be accessed
only by authorized persons, especially members or employees of the
organization that owns it.
C) Extranet – An extranet is a controlled private network allowing customers,
partners, vendors, suppliers and other businesses to gain information.
Ans –
Ans –
1. Email address
2. Password
Ans – There are two ways to take backup and restore as follows,
A) Import & Export
B) Copy & Paste
Ans –
IP Address MAC Address
Ans – IPv4
It’s a 32 bits address
32 bits are divided into 4 equal parts; IPv6
each part is having 8 bits called as an It’s a 128 bits address
octet. 128 bits are divided into 8 groups; each
Octets are separated by.(dot). group is having 16 bits and called a
IPv4 is written in decimal format. block
Blocks are separated by : (colon).
IPv4 is written in Hexadecimal format.
It uses subnet mask to determine It uses prefix to determine network and
network and host bits. host bits.
It is divided into 5 different classes. No classification.
173. What is port number of important protocols?
Ans –
Ans –
175. What is MAC address? How to check MAC address of the PC?
Ans - MAC address is the physical address of the device which is 48-bits address.
Ipconfig /all or getmac commands are used to check MAC address of the
computer.
176. What is IP address? What are the classes of IPv4?
Ans –
Class Ranges
A 0-126
B 128-191
C 192-223
178. What is subnet mask? What is the default subnet mask of class A, B
and C?
Ans –
185. Define Hub, Repeater, Switch, Router and Gateway? Tell me the OSI
layer of each device?
Ans –
Ans –
Dynamic Host Configuration Protocol (DHCP) Server is used to assign automatic
TCP/IP configuration to its client.
Domain Name System (DNS) server is use to translate Fully Qualified Domain
Names (FQDN) into IP addresses and IP address into Fully Qualified Domain
Name.
Windows Internet Name Service (WINS) is use to resolve NetBIOS name into IP
address.
Ans –
TCP UDP
TCP is the connection-oriented UDP is a connectionless protocol.
protocol.
TCP is reliable. UDP is unrealiable.
TCP is slow. UDP is fast.
203 Technical Questions Page 43
TCP does error checking UDP does error checking, but no
recovery options.
Acknowledgement is there. No acknowledgement.
TCP does flow control. UDP does not do flow control.
Ans – The File Transfer Protocol (FTP) is a standard network protocol used to
transfer computer files from one host to another host over a TCP-based network.
189. What is difference between HTTP and HTTPS?
Ans –
HTTP
HTTPS
HTTP (Hyper Text Transfer Protocol) is
HTTPS (Hyper Text Transfer Protocol) is
used in networking. It uses port no 80
used in networking. It uses port no.
for communication.
443.
It is unsecured.
It is secured.
No encryption.
It is encrypted.
No certificates required.
SSL certificate is needed.
Ans - A Switch operates of the Data link layer of OSI model. It connects multiple
devices together in a single network segment. It is called an intelligent network
device because it creates own MAC address table to forward the frame to the
Ans - The Packet Internet Gopher (Ping) command helps to verify IP-level
connectivity. When troubleshooting, you can use ping to send an ICMP echo request
to a target host name or IP address.
194. What is use of tracert command?
Ans - Tracertcommandcan show you the path of packet from your computer to
the Destination. It will list all the routers it passes through until it reaches its
destination.
195. What is the use of pathping command?
Ans - The pathping command is a route tracing tool that combines features of
the ping and tracert commands. The pathping command sends packets to each
router on the way to a final destination over a period of time
196. What is the difference between wired and wireless LAN?
Ans –
Ans - In Ad-hoc network devices are connected in wireless network using their
LAN cards and Access Point or Wireless Router is not required in Ad-Hoc.
In Infrastructure network devices are connected in network through Wireless
Access Point of Wireless Route.
Ans – SSID is the name assigned to a Wi-Fi (wireless) network. All devices in the
network must use this case-sensitive name to communicate over Wi- Fi. Wireless
routers and access points have a default SSID, which may be the manufacturer’s
name, such as “Linksys” or “netgear” or simply “default”. Some devices use their
model number as the SSID. Using browser, the SSID (and password) can be
manually changed in the device’s configuration settings.
Ans - MAC Filteringrefers to a security access control method whereby the 48-bit
address assigned to each network card is used to determine access to the
network.
200. What are the different ways to share the internet?
Ans - Microsoft Office 365 is Software as a Service (SaaS) solution that includes
Microsoft Office and other services, such as email and collaboration, from
Microsoft's cloud server. Microsoft Office 365 provides desktop functionalities
and is available by subscription.