desktop support interview questions

Published on January 2017 | Categories: Documents | Downloads: 36 | Comments: 0 | Views: 406
of 52
Download PDF   Embed   Report

Comments

Content

Interview Questions for Desktop Support Technician/Analyst General Questions
Q. What desktop operating systems are you familiar with? A. Before you answer this question, you should have some background information on what operating systems are used within the organization you are interviewing with. Undoubtedly, you will be asked to elaborate on your skill set with each of these operating systems so it’s best to tailor your elaboration to the operating systems that are relevant to the hiring manager. This being said, don’t leave out mentioning experience in other operating systems. You never know whether the company may be evaluating the migration to a different OS. Q. Have you used imaging software before? How do you find these tools useful? A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that you’ve used. Hiring managers want to assess your in-depth knowledge and experience with using these tools. This means talking about how you use their various feature sets. (If you have an opinion, you probably know the product pretty well.) Q. What are the pitfalls of using imaging software? A. This question is meant to assess how well you know these products. For example, discussing the importance of testing the image demonstrates that you use these tools on a regular basis. Q. Have you used any software distribution tools? If so, which ones and how were they used? A. Like imaging software, software distribution tools are an important part of your job. Hiring managers are looking for knowledge that these tools exist and how they can be used to support your organization. Q. What do you like most about desktop support? A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the job: being busy, working with different people, and the challenges of learning new operating systems and configurations. Q. What do you like least about desktop support? A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here would be not being able to resolve a problem in a timely manner for reasons outside your control, such as hardware failure. Stick to things outside of your control for the best response. Q. When solving a desktop problem, do you prefer to work with the end-user, your peers, or on your own? A. This is another question to determine your fit within the organization. Hiring managers understand that to be successful as a support technician you will have to work in a team environment. This means working with other employees, vendors, and end-users on a constant basis. Q. Can you describe a situation where you have had to deal with a difficult person? How did you handle it? Would you do anything differently? A. Desktop support can be very demanding some days. End-users only see their own priority needs and often are not interested in other demands on your time. This question explores how you deal with a difficult end-user by understanding their problem, assessing priorities, and communicating a timeframe for resolution. Often good communication can help both sides come to an agreement. Make sure you have an example with a successful outcome. Q. How would you say you are able to handle stress? A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress. Sometimes from the answer, they can also determine whether you are prone to stress. When responding, some techniques for handling stress that you may want to talk about include continually evaluating what’s on your plate and prioritizing, communicating

with your manager on what your priorities are, and making sure that you take a break to reenergize, particularly at lunch time. Q. What do you see yourself doing two or three years from now? A. Hiring managers want you to stick around. They realize that you will not be in this position forever, and they want to make sure there’s a desire to move up within the organization as well as the right fit. They ask this question to see whether there’s a growth path for you possible within the organization. As a desktop technician, natural growth paths are team leads, quality assurance, engineering positions, and entry-level development. Be honest about where you want to be in two to three years, and ask the interviewer whether they see your career path as a possibility. Q. How do you learn new technologies? A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning technology on their own and who has the foresight to look for training opportunities. Besides the traditional books and manuals, don’t forget to include user groups, eLearning subscriptions, and IT professional sites such as CramSession. Q. How do you prioritize tasks and manage your time? A. What hiring managers want to know is whether you have time-management skills. Everyone manages their time differently, but think about how you handle e-mail, when you check voice mail, how you respond to pages, when you research and document, and how you pick up new trouble tickets. Q. Imagine the following situation: you receive three simultaneous calls from three vicepresidents who need assistance immediately. How do you manage these conflictingpriorities? A. Obviously this is a trick question. What the hiring manager is trying to assess is how you set expectations with each of the individuals, knowing very well that you won’t be able to assist all of them at the same time. They are also looking for how you will prioritize each of these incidents, including seeking assistance from peers and supervisors in order to meet user expectations. Don’t allow the “tyranny of the urgent” to divert you from managementestablished support priorities. Q. How would you handle a user who continually misdiagnoses their PC issues? A. By asking this question, the hiring manager is assessing your customer service skills. In this situation, you may want to discuss that the key is to not offend the user and turn them off to your support services. In handling this situation, you would pay particular attention to ways you can build trust with the user and lead them to the right resolution to their problem. These components may include: • Acknowledging the user’s diagnosis • Asking the user to reproduce the problem • Finding a solution that works Q. How do you handle setting up new employees? A. This question is used by the hiring manager to assess your knowledge of common practices within the IT department, such as setting up new users. Obviously, the IT department plays a critical role in the productivity of the new employee. The role of the desktop technician is to help ease the new employee into the resources available to them and get them up to speed quickly. In responding to this question, you may want to talk about some of the tools you’ve used in the past to help users acquaint themselves with their new environment. Some tools that help are: • A new-user welcome letter that is customized to the specific user with all their relevant information including telephone extension, how to access voice mail, and how to log in. It might also include a FAQ on getting help. • A “Getting to Know Your Helpdesk” document that provides an orientation to helpdesk service, such as how to contact the helpdesk, its hours of operation, what is

and what is not supported by the helpdesk, and answers to common new-user questions.

Technical Questions
Q. What questions would you ask to help isolate a user’s problem? A. This question is used by the hiring manger to assess your problem-solving abilities. The following represent some of the common questions that you would ask the end-user to help diagnose a situation: • When did the problem first start? • Has the system ever worked properly? • What was the last thing done to the system prior to the failure? • Is the issue intermittent or ongoing/constant? • Are there any error messages? If so, what are the specific error messages? • Has any new hardware been added to the system? • Has any new software been added to the system, including downloads from the Internet? • Has anything changed with the system (for example, has it been moved) since the issue presented itself? • Has anyone else had access to the system? • Are there any environmental factors that could be causing the issue? • Have you done any troubleshooting on the system on your own? • Have you checked all the cables/connections for a tight fit? Q. What are the main differences between the following operating systems? A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you know more than just the current version because there will always be a user who has a problem with an older version. By asking this question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The following provides a concise summary of some of the major differences. Windows 2000 and XP Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the hands of consumers. The major changes include the following: • Device driver rollback • Remote control (single-user terminal services) • New Start menu, control panel, and user interface elements • Fast user switching • Encrypted file system support for redirected folders • Better support for roaming wireless networking • Enhanced policies • Credential Manager • Personal firewall Q. What are typical virus sources and how do you prevent virus attacks? A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections: • Use anti-virus software. • Perform regular updates to the virus software definition files and scan engines. Verify updates have succeeded. • Perform regularly scheduled virus checks.

Configure software to check all files, not just program files. Educate users on virus attacks, their consequences, and how to prevent them. Know where all software came from. Do regular backups. Develop reporting mechanisms to inform server administrators of observed desktop infections and how these could impact the server environment (such as deletions or corruption of files on public shares, hidden payload files that might have been uploaded to servers, and so on). Q. What are some of the guidelines you would recommend for implementing security at the user level? A. Security is a major part of the desktop technician’s day-to-day responsibilities. As the closest point of contact to the end-users, technicians need to be savvy on the different methods for enforcing security. Some of the top techniques are included below. Anti-virus software: • Ensure that all users install and regularly use anti-virus software on their PCs. • Instruct users to immediately notify the helpdesk when they suspect they’ve contracted a virus. Password security: • Instruct users not to give out their passwords. • Instruct users not to write down their passwords. • Instruct users to make sure their password cannot be easily guessed by using a combination of alphanumeric characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { } / ? < > , ; : \ | ` ’ ” .). • Instruct users to change their password if they think there is even a slight chance someone knows it. • Instruct users to ensure their password is at least eight characters long. • Instruct users not to use a variation of their user ID. • Regularly change passwords on Administrator accounts on PCs (NT, Windows 2000 and XP) Desktop security: • Instruct users not to leave their workstation logged in overnight. • Instruct users to enable screen savers that automatically lock their PC when there is no activity on it for more than five minutes. Microsoft Active Directory Questions. • What is Active Directory? Active Directory is Microsoft's trademarked directory service, an integral part of the Windows 2000 architecture. Like other directory services, such as Novell Directory Services (NDS), Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. • What is LDAP? Short for Lightweight Directory Access Protocol, a set of protocols for accessing information directories. LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because it's a simpler version of X.500, LDAP is sometimes called X.500-lite. • Can you connect Active Directory to other 3rd-party Directory Services? Name a few options?

• • • • •

Yes. Microsoft Identity Integration Server (MIIS) is used to connect Active Directory to other 3rd-party Directory Services (including directories used by SAP, Domino, etc). Active Directory Lightweight Directory Services (AD LDS) : This service is ideal if you are required to support directory-enabled applications. AD LDS is a Lightweight Directory Access Protocol (LDAP) compliant directory service. Active Directory Rights Management Services (AD RMS) : This service augments an organization’s security strategy by protecting information through persistent usage policies. The key to the service is that the right management policies are bound to the information no matter where it resides or to where it is moved. AD RMS is used to lock down documents, spreadsheets, e-mail, and so on from being infiltrated or ending up in the wrong hands. AD RMS, for example, prevents e-mails from being accidentally forwarded to the wrong people. The Application Server role : This role supports the deployment and operation of custom business applications that are built with Microsoft .NET Framework. The Application Server role lets you choose services for applications that require COM+, Message Queuing, Web services, and Distributed Coordinated Transactions. DHCP and DNS : These two roles install these two critical network service services required for every network. They support Active Directory integration and support IPv6. Fax Server role : The fax server lets you set up a service to send and receive faxes over your network. The role creates a fax server and installs the Fax Service Manager and the Fax service on the server. File Server role : This role lets you set up all the bits, bells, and whistles that come with a Windows file server. This role also lets you install Share and Storage Management, the Distributed File System (DFS), the File Server Resource Manager application for managing file servers, Services for Network File System (NFS), Windows File Services, which include stuff like the File Replication Service (FRS), and so on. Network Policy and Access Services : This provides the following network connectivity solutions: Network Access Protection (NAP), the client health policy creation, enforcement,and remediation technology; secure wireless and wired access (802.1X), wireless access points, remote access solutions, virtual private network (VPN) services, Radius, and more. Print Management role : The print services provide a single interface that you use to manage multiple printers and print servers on your network. Terminal Services role : This service provides technologies that enable users to access Windows-based programs that are installed on a terminal server. Users can execute applications remotely (they still run on the remote server) or they can access the full Windowsdesktop on the target server. Universal Description, Discovery, and Integration (UDDI) : UDDI Services provide capabilities for sharing information about Web services. UDDI is used on the intranet, between entities participating on an extranet, or on the Internet. Web Server role : This role provides IIS 7.0, the Web server, ASP.NET, and the Windows Communication Foundation (WCF). Windows Deployment Services : These services are used for deployment of new computers in medium to large organizations. Hyper-V Role : A Hypervisor platform to host and manage virtual machines in an efficient way. Introduced in Windows 2008.

Applying SQL Server SP3 Failed, How to fix it?
1. This is a common error we will get regularly in SQL clusters.

2. If you trying to install the SP3 on the active node, make sure that there is nobody logged on to the passive node. Why because when the active node tries to install the SP3 on passive node remotely, it will try to look for some processes. So at that time if nobody on the passive node, it will install without any errors. 3. If any locked files found while you installing the SP3, ignore them and continue with installation, you can reboot both nodes one at a time later. 4. Finally after rebooting the both nodes, check the versions of the application on them. Make sure the version should be same on both nodes. That's it we are done. Note : This applies to SQL Server 2005 Edition only. Thank you for your support, keep visiting my blog.

How to RENAME a Windows 2003 Domain ?
Guys, Domain renaming is a new future included in Windows server 2003. We can rename the domain without making it down. That is the beauty of Windows 2003. In some situations, one company acquires the other like Sun Microsystems was acquired by Oracle. In this type of cases, if they want to rename all the domains in Sun Microsystems to Oracle corporation how they will do it. Its just an example, i am not telling those guys are following this. But here what i am trying to explain is that, the Microsoft has released a standard procedure to rename the domains that are in production environment. Please follow the steps from the below document carefully to rename your prod domain.

How to reset TCP/IP in Windows or How to delete TCP/IP entries from Registry ?
Resetting TCP/IP solves many problems. So how to reset it ? Actually all the parameters of the TCP/IP for every interface is stored in Windows Registry Database. Its not stored in a single location, but in many locations. So finding all the values and deleting them manually is not at all possible. It may disturb our system configuration if you edit the registry manually. My sincere request is backup your system registry before you modify anything, otherwise you will get lot of issues. :) So to simplify this situation, we have a command in windows, which takes care of everything in resetting tcp/ip. Finally the beautiful command is “netsh”. It really helps us in many conditions. And it can be available as a download from microsoft.com for older machines. How to work with it ? 1. Apply command netsh at the command prompt. 2. Type interface command at netsh> prompt 3. Type ip command at netsh interface> prompt 4. Type reset reset.txt command, to reset the tcp/ip. But here what is reset.txt, we are just sending the output details to that file, if anything goes wrong you can get back to your previous config from this file.

5. Go and look at your tcp/ip properties tab, you will set to “Obtain Automatically Mode”, surprised!!! 6. This command is used in situations like follows…. sometimes DNS servers information will not erase from the registry sometimes virtual ip settings also not erase from the registry sometimes configuration changes doesn’t takes place

What is Clustering? How it works?
What is Clustering? Clustering is a technology in which one or more computers work together as a single instance by sharing their resources. Clustering is used mainly for redundancy of the services hosted on it. In other words, in a cluster all the hosts are work together, if one of the host fails all the services hosted on it comes online immediately on to another host with out any downtime. Apart from the redundancy a cluster is used for load balancing also, in this case what ever the load comes to the cluster is shared by all the hosts in it. What are the types of Clusters and How do we configure them ? Clustering is two types, Active/Active and Active/Passive. Active/Active : In this scenario all the hosts configured in the cluster takes all the load comes to that cluster, and if any one of the host fails the remaining hosts share the requests to make it online all the time. If you have same copies of application configured on multiple hosts this type of clustering is applicable. Active/Passive : In this scenario load balancing is not works, as at any point of time only one host receives all the requests, and if any of the host fails the remaining hosts takes those services and make them available online. That means, only one host is active at any point of time and the other one is passive. What are the requirements to configure a cluster and How it works? There are so many requirements to configure the cluster, but all those requirements are inter dependable on each other. And these requirements (we call them as resources in clustering), are shared between all the hosts, that means these should be available to all the hosts in the cluster. for example, SAN storage resource, the storage which configured in network and is accessible by all hosts (Click here for SAN Information). In the same way all the resources are accessible by all the hosts in a cluster. If one of the host fails, all these resources are moved to another host. In detail, at a particular time one host is accessing these resources, at that time those are locked by that particular host, whenever this host fails, the lock was released and those resources are locked by another host. But in active/active clusters these resources have multiple copies as multiple instances on all hosts. See the below video for better understanding.

What is Cloud Computing? How it works ?
Cloud computing…the word which is been in the industry from past few years. The technology became very popular now a days. so what is the secret behind it and what makes this technology successful? May be these are the questions which are currently in your mind. Let me explain this emerging technology in simple way. Generally what we all do is, we install whatever the required apps like MS Office, Photoshop, Acrobat Reader etc on to our machine once after the OS installation is finished. But here in this case, these apps are running on a specific hardware and OS. They are having some limitations, along with those limitations they are having some performance issues because they are dependent on Hardware and OS. If we take the same scenario with cloud computing, a cloud is a collection or grid of computers with different hardware and OS’s installed on them and acting as a single virtual computer. So what happens when we install/run a website or an application on to this cloud, it takes all the advantage of the total hardware. And these applications (ex: Google docs) are OS independent also. So with all the resources sponsored by all the machines the applications runs faster. If the demand for that application is increased you can simply add some more machines to this cloud without disturbing the application and current cloud. Advantages:

You can access the application from anywhere in the world As it is accessed from the web, you can run it on any of the OS & Hardware No need to install applications on to your machine Best Live Example : Cloud Computing - ITaS - Cloudshare For better idea how the cloud apps works, go and take a look at the below web sites. Photoshop Like App = Splashup (www.splashup.com), Pixlr (www.pixlr.com) MS Office Like App = Google Docs (docs.google.com) Messenger App = Meebo (www.meebo.com) OS like interface = beta.cloudo.com (simple) , www.oos.cc (resembles windows), www.eyeos.info (with lot of apps) Read this article for better understanding Cloud Computing : ITaS (Infrastructure as a Service)

How to fix Remote Desktop Connection Problems in Windows Server 2008?
Remote desktop is a piece of software which comes with all the windows operating systems which is useful the manage windows machines remotely. To configure this on a Windows Machine we need to follow below steps. 1. Configure the machine with correct network settings and make it is pinging from other computers. 2. Check the firewall options to allow the Remote Desktop Connection. 3. Right Click on My Computer, Select Properties and go to Remote Tab. Enable Remote Desktop option. If you want to specify a specific users on the machine to connect remotely through Remote Desktop click on Select Remote Users and add the users to the list. 4. Try to access this machine using the mstsc client from another machine. If it connects perfectly everything OK. 5. Again do these steps another machine to get practiced. That's it. NOTE : IN WINDOWS 2008 IF THE FIREWALL SERVICE IS STOPPED THE SERVER WILL NOT ACCEPT THE REMOTE DESKTOP CONNECTIONS. MAKE SURE IT IS RUNNING AND IF YOU WANT TO STOP THE FIREWALL, JUST CLICK IT OFF IN WINDOWS FIREWALL OPTIONS.

Interview : A quick view of yourself
See these videos first before reading the content… so informative and so funny… Video1: An Ugly Answer, Video2: A Bad Answer, Video3 : A Good Answer In my experience Interview is nothing but “Marketing Yourself”, the word changes your confidence level. This has been told to me by my brother Krishna Prasad(May be he read it some where else). Opportunity comes only one time, and that is the only door to your success in the career. When the opportunity is in your hand, try until it goes of from you. So try hard to market yourself in every possible way. The Power of Support A best example for this is, i got job in AT&T when the entire world is in a very deep financial crisis. That means what ever happens, what may goes down the support industry will never stop. Why because if support stops, everything will be paused. For example, if the customer care for your mobile will not respond or if they don't provide customer support, their business will get lose lot of customers. In the same way we will provide our support to various companies around world. Those companies need our support, because they need to provide support to various customers around world. If a company has website about its products, what makes that company profitable? First thing, the website needs to be run continuously, obviously it is dependent on servers, hardware and network etc etc.. so may be so many

people providing their support to make it available continuously in the back ground. That is the reason i can say, we are in the correct place, we have lot of opportunities. Only thing we need to get succeed in this industry is having optimized skill set. Get Prepared When an opportunity is in your hands, get prepared to achieve it. That is your ultimate target, if you lose this opportunity, you even don’t know when the next one comes. So Handle with Care. All you need to do is, prepare well in your area of practice. Be confident, Be Frank, Say no idea to unknown answers, Be Positive, Be Interactive, Be Proactive. :) lot of things right. All these qualities are in you. Try to develop them, try to bring out them when the time comes, try to expose them. Success is yours. “Plan the Implementation, Implement the Plan” Interview Requirements Well prepared Resume – It should resemble your career, don't include/repeat unnecessary things. Well prepared Mindset – Ultimately this is required for those who has interview phobia like me. Positive Attitude – Life will never stop if this goes of from your hand, but try your level best to get it. Interaction – Need to interact with the interviewer to market yourself, Keep eye contact with him. Confidence – I noticed so many times, my confidence will get decreased whenever i am going for an interview, this happens to so many. It makes you a loser. Avoid thinking about the interview and interviewer to get rid of this problem. Meditation is the best practice i suggest. “ Your life today is the result of your attitudes and choices in the past. Your life tomorrow will be the result of your attitudes and the choices you make today.” This post is useful or not, i don’t know. But these are the things i understood from my experiences and i want to share them with you.

Understanding DNS : Domain Naming Server
Hi Friends, First of all thanks for visiting my blog. I added “Search” option for my blog, you can easily search for a particular topic using Google Search. If you are facing any issues, or if you have any questions please mail me [email protected] Thanks. Coming into the Topic……………. What is DNS? DNS stands for Domain Naming Server, it is a standard of naming domains in any operational environment (Windows,Linux,Solaris,Any environment). It is a server which contains a database of all the domains and all the servers which are associated with those domains. Why it is Used? Its a service dedicated to identify all the machines (domains & member servers) in a network. To make this possible, every machine has to be registered in the authoritative DNS server of that network. That means every operational network should have a dedicated DNS server to enable identification and communication between the machines. How it works? As i said, it is dedicatedly used for identification, in technical words for “name resolution”. Every machine in a network has a dedicated IP address & hostname as its identity. Whenever a machine tries to communicate with another machine on the network it should first identify the second machine, that means it should know the ip address of that particular machine. After knowing the identity (i.e ip address), it will directly communicates with the second machine. So to speak, a machine should know the ip address of the another machine, with which its going to communicate before it starts. Another question… Why the hostnames are used, if the machine already have an identity in the terms of IP address? Hostname is an English word which is useful for Human remembrance. It is impossible for a human being to remember lots of IP addresses, but it is possible to remember English names of the same hosts (as we configure the hostnames generally with employee name or department name or location name etc). For example we can rememberwww.yahoo.com but not its ip address, because we are not having only one website on the internet. To sum up Hostnames and IP addresses both are used to identification and communication between two machines in a network. But machines are only able to communicate with the IP addresses

and which are impossible to remember for Humans (Keep in mind machines never communicate with hostnames). To solve this situation DNS was implemented. It basically contains a database of host records in a network. A host record contains “Hostname : IP address”, see the image below for better under standing. Out Internet is purely depended on DNS, when we access a particular website we will give its English name, when we press ENTER immediately the machines starts finding the IP address of the website using the DNS server configured on it. I will explain the name resolution process in details. And one more thing about the DNS is, it is the only largest database on the internet which changes every second. If this database goes down by a chance, we must remember all the ip addresses to access the internet. hahaha it will not happen, why because we have so many backup solutions already implemented.

How the name resolution takes place? I will explain this concept with internet as an example. Before that i want you to check some settings on your machine. Check the TCP/IP properties and see whether DNS server is configured or not. If you are seeing obtain automatically option, open command prompt and type “ipconfig /all” and press Enter. You will get DNS servers information along with your machine’s IP address. Now lets talk about the scenario, When you try to open a website like www.google.com, what happens next? how your machine gets IP address of the www.google.com. Here it goes…. 1. The request sent to the DNS server which is configured on your machine. 2. The DNS server checks for the host record of www.google.com in its database, if it contains a record forwww.google.com, it will directly send response with the IP address of www.google.com. Otherwise it starts requesting another DNS server. 3. Before it goes to another DNS server, how it identifies which DNS server is responsible for this request ? It checks the entire hostname (it is called as FQDN : Fully Qualified Domain Name), i.e in google’s case www.google.com. (note the FQDN ends with a period, and this period is called as root domain). 4. Every DNS server contains a roothint file associated with it, and the same will be used to identify the responsible DNS server. Root hint file contains Master DNS servers information. Here you go it looks like this. These are the master DNS servers for .com, .net, .edu, .org domains etc. 5. So in your case, the domain is .com, DNS server sends request to .com master DNS server (for ex: assume it as 198.41.0.4), the .com master DNS server contains name server records for all machines ending with .com . That means it definitely contains DNS server IP address for google.com. In the same way it contains all .com servers yahoo.com, microsoft.com & so on. 6. It does not contain the IP address of google.com, it contains DNS server IP of google.com. 7. So then the request is forwarded to google.com DNS server, in that server you will have a host record with the name www and its IP address. Finally you reached it. With the found IP address the request

comes back as a response in the same reverse way to the DNS server which is configured in your machine, that DNS server tells the IP address ofwww.google.com to your machine. 8. This process happens in milliseconds in the background. i.e by the time you will get “Website found waiting for reply” message in the status bar of your internet explorer. 9. Oh my god!!!! Is that simple? Yes it is. The same process occurs in corporate networks also. But the requests are handled by their local DNS servers only.

DHCP : Dynamic Host Configuration Protocol
Hi Friends, Let’s support our organizations using simple way of IP Management. DHCP stands for Dynamic Host Configuration Protocol. Dynamic = Automatic Host Configuration = Basic Network Configuration Protocol = Rules which needs to be followed to make this happen. DHCP is an application which is either installed on Windows Server Operating system or on UNIX OS to service an enterprise in the aspect of IP configuration and management. Its main goal is to provide & configure the client computers with specific ip configuration to enable identification and communication in the network. Prior to DHCP another protocol have been used, it is called BOOTP. BOOTP(Boot Protocol) has only one future that is Reservation. So the administrators who are worked with BOOTP, need to get all the MAC addresses and write them on a notepad to enable the use of BOOTP. After writing all the MAC addresses, the same need to be added to BOOTP table with corresponding IP addresses. That makes lot of work for administrators, even though its an automated process, but admin’s need to work a lot to get the MAC addresses of all the machines in the network. Later it has gained lot of improvements to serve the network and became DHCP. How to Install and Configure DHCP? It very simple and straight forward process. First you need to install the application from Add/Remove Windows Components. After installing you will have a console in the Administrative Tools. I think instead of giving lot of steps.. i will post a simple video of 7mins, just watch it for better understanding of this concept. Video Link Now you are ready with your DHCP server installed and configured. so lets talk about why and how it is used? As i said previously it is used for Automatic assignment of IP addresses to client computers which are in the same network with DHCP server. This is the way it will be used. Whenever a computer powered on, it will check itself for the network configuration, if it is configured with manual ip address, the machine broadcasts a message that it was powered on. If it is configured to get the ip automatically, then the machine broadcast a message in search of DHCP server. Then starts the process. It is simply called as “DORA” process. D = Discovery – Request for discovering DHCP server from client machine. O = Offer – Respective DHCP server Offers the IP Configuration. R = Received – Client receives the IP configuration. A = Acknowledgement - Client Acknowledges that it has received the IP configuration. Once the client gets the IP configuration, it will then broadcasts another message to all other clients in the network with its identity. Interview Questions related to DHCP 1. Explain the DORA process 2. What is an exclusion range and reservation? An exclusion range is a range of IP addresses which needs to be excluded from DHCP scope, so that these IP’s never assigned automatically. A reservation is an IP address will be reserved for a server every time it boots up and it has been done using the MAC address of that server. Before configuring reservations, we need to exclude them from DHCP scope. 3. How do you configure the AD Server, DNS Server, IIS Server and FTP Server using the DHCP server? Using the reservations only, so that every time the same address will be assigned to the server. If you

take a DNS server, it should have same IP all the time, because it is responsible for name resolutions in that network. If the IP address getting changed every time, its very difficult to the clients which are requesting name resolutions. That is the reason, it should have same IP all the time, we can do that automatically using reservations. 4. What is DHCP relay agent? DHCP relay agent, is an option configured on DHCP server. Which enables the client machine requests to go through the routers. That means, if the DHCP server is in one network and the client is in another network, these networks are connected by routers. By default the routes will never allow the DHCP packets through them, by configuring this option, these requests will pass between two networks

Active Directory : Behind the Directory
Hi Friends, As you know Active Directory is the main database for Centralized Administration of Enterprise Environment, i want to share something with you about this extra-ordinary directory service. • Active Directory will be installed on a stand alone Windows Server 2000/2003/2008 operating systems when we run dcpromo command. It is an integrated module which resides hidden until we run dcpromo. • Active Directory stores all most all information about an enterprise. Which includes user accounts, computer accounts, user groups, group policies, shared folders, network printers, etc. All this information is stored in the Active Directory Database. The files associated with the Active Directory database are located under C:\Windows\NTDS and the files are as follows…

ntds.dit edb.log

This is the main file for Active Directory. All the AD information will be stored in this file. When a change is triggered to AD database, first the information will be written to this file, and the same will be then written to ntds.dit. The AD performance depends on how fast the updates will be transferred from edb.log to ntds.dit Initial size of these files will be 10MB each, used as reserved space for AD updates, in case of Low disk space issues the same files will be used to save the AD updates. The checkpoint file (edb.chk) records transactions committed to the AD database (ntds.dit) during shutdown. A "shutdown" statement is written to the edb.chk file when we shutdown the AD server. Then, during a reboot, AD determines that all transactions in the edb.log file have been committed to the AD database. If, for some reason, the edb.chk file doesn't exist on reboot or the shutdown statement isn't present, AD will use the edb.log file to update the AD database. This is a scratch pad used to store information about in-progress transactions and to hold pages pulled out of Ntds.dit during compaction.

res1.log & res2.log edb.chk

temp.edb

• •

The file extension .DIT stands for Directory Information Tree. The file extension .CHK stands for Check Point file. If the DNS is Active Directory Integrated, its data also stored with AD Database. Using System State option in NTBACKUP we can take the back up of Active Directory.

• When we promote the secondary domain controller all this data from these files will be replicated to its database.



Active Directory uses Kerberos Authentication.

• LDAP(Light Weight Directory Access Protocol) is the Protocol used to query the Network Directories like Active Directory. It uses port number TCP 389 to query AD. • In Windows 2008 Active Directory comes as a Service, to decrease reboot frequency. • AD Users and Computers, AD Sites and Services & AD Domains and Trusts are the three consoles which are used to maintain AD database in GUI.

How to join a computer to the domain which is in different network(VLAN)?
This is a real time environment requirement. Let’s see how can we achieve this. • Make sure both VLAN’s are communicating • Disable windows firewall on the AD machine and Add exceptions to the following ports. • Open required ports for DNS, NetBIOS, RPC, LDAP and ICMP in both ways from source to destination. • Set the AD gateway as the default gateway for client machine. Ensure that all the required firewall ports are open to enable communication between domain controller and client which are in different networks.

Active Directory : Replication
Hi Friends, Welcome Back !!!! :) In the previous post i discussed something about Active Directory and the files associated with it. In this post i want to tell you about the magic behind Active Directory replication. What is meant by Replication? Replication is the process of making a replica (a copy) of something. A replication is a copy. Using replication process we can copy the active directory database from one site to another site. This process is initiated when we create additional domain controller for the existing domain. That means we are creating a backup/secondary copy of the original domain controller to make sure it is available in the case of failures. How the Replication happens in Windows Server? After replica of Active Directory implemented, from there on every change that is being made to Primary copy will be replicated to Secondary. When you are trying to implement a replica for the first time, in the process of implementation all the objects from Primary Domain Controller will be copied over to the Secondary Domain controller. At this point both DC’s are in sync state. But when a new object created or deleted in/from the Primary DC, the same will be copied to Secondary DC immediately. Remember in Windows 2003/2008 the Secondary DC are always read-only copies. In the situation of failure of the Primary DC, we can change the Secondary DC as read/write copy. When the Secondary DC acting as Read-Only copy, it will not allows us to create or delete objects. It only updates it’s information from the Primary DC. This was implemented in this way to avoid conflicts in the objects. Every object has an property called USN (Update Sequence Number), depending on this attribute the Secondary DC identifies whether the updates are available or not. For example, for a user object if the USN is 124 on Primary DC, and the same is 123 on Secondary DC, then the secondary DC requests the Primary DC to send the updated information. In this way both DC’s are in sync all the time. If one of the DC goes down, we still have updated information in the Other. If you are creating the replica in same location as the Primary, there is no issue at all in the process of replication, but if you are creating the replica in branch office location there might be some problems associated with the design. You can manage the intersite (between sites) or intra-site(same site) replication using the

AD Sites and Services. A site is a collection of computers which are working together in the same IP Subnet. Replication is controlled by the Site Link objects created in between the sites. We can schedule the replication process and replication interval using the Site Link Properties. The Site Links are “automatically generated” using the ISTG(Intra Site Topology Generator). KCC (Knowledge Consistency Checker) is the part of ISTG which generates Site Link objects in Inter-Site replication. If in any case if the automatically generated site links are not working for some reason, we can create them manually usingrepadmin /kcc command. If you have multiple domain controllers (multiple copies) in each site, replication process consumes high amount of bandwidth. To avoid this, every site must have only one domain controller acting as the replication partner. It is called as Bridgehead server. This bridgehead server again sends the updates to the other DC’s which are located in its site. In the image, the server in Russia acting as Bridgehead for Server in Germany(Think it as Russia Second server). By Right clicking on a site link and by selecting “replicate now” you can initiate replication between the domain controllers in same site or different sites.

Blue screen death
Asked By: tshepisobo | Asked On: Sep 20th, 2011 11 answers

What is a blue screen of death ? How do you trouble shoot the computer in such situation ?
Answered by: Maz on: Oct 5th, 2012

In most cases blue screen is there for few seconds and system keeps rebooting. First of all you need to get to the error message. A very good feature of win xp is to press F8 on startup and select do...
Answered by: Ravinra Kulkarni on: Feb 18th, 2012

1) First check blue screen error number, is it Application Or Hardware 2) Generally this problem comes when problem in RAM so First check computer start with another RAM Answer Question Select Best Answer

Ie browser redirect
Asked By: Big Al | Asked On: May 12th, 2008 7 answers

A user calls and every time he launches internet explorer he gets the page cant be displayed right before this his virus software had detected virus...What could be causing this problem you checked the settings in ie and its has the correct homepage
Answered by: Abhishek Sharma on: Oct 1st, 2012

The system is affected with M a l w a r e. The only only solution to remove is to boot with bootable antivirus rescue disk.
Answered by: Mandar Mench on: Jul 26th, 2012

Due to your network firewall or due to old internet explorer u r using on that pc this problem may be occur so you can do one thing reset all setting to default delete all cookies and upgrade your browser your problem may be solved . Answer Question Select Best Answer

What is the difference between outlook & outlook express?What is ip range in networking side? How we will troubleshoot outlook?How we will configure ldap on outlook?
Asked By: rajeevsoniji | Asked On: Aug 1st, 2007 17 answers Answered by: Salik on: Sep 30th, 2012

Guys have done a gr8 job, nothing else left to be answered.. I just wanna say: Gilbert, Hitesh & Syed_nrpt has provided wrong set of answers. Everyone else (Upto my this post/msg) is right about IP range.
Answered by: Yogesh Kumar on: Apr 30th, 2012

Outlook is the edition of Microsoft Office (Outlook file Extension is .pst) & Outlook Express is the edition of Internet Explorer (Outlook Express file Extension is .dbx). Answer Question Select Best Answer

How do you backup emails on ms outlook?
Asked By: SiziRose | Asked On: Apr 26th, 2011 4 answers Answered by: Umesh Raghav on: Sep 28th, 2012

Go to control panel open the mail option then open the data file after that select the personnel folder and click on open folder copy that .pst and close all the options which were open and then paste that .pst backup where you want to place that backup
Answered by: shashi021 on: Jun 23rd, 2011

install PST Sync (http://www.microsoft.com/download/en/details.aspx? displaylang=en&id=9003) and set up Backup path for the respective PST. Answer Question Select Best Answer

Spool service
Asked By: Big Al | Asked On: May 12th, 2008 9 answers

How can I tell if the print spool in running and where is it located? Where does it store spooled print jobs?
Answered by: vikara on: Sep 26th, 2012

DHCP: Port 546 (DHCP Client port for IPv6) should not be used by any other process while rogue detection is enabled
Answered by: rakesh reddy on: Sep 23rd, 2012

type services.msc and search for print spooler service and make sure it is set to automatic, and now try to print hope your issue should be fixed by now.

Answer Question Select Best Answer

What is the difference between language and technology?
Asked By: jeevan | Asked On: Aug 19th, 2011 2 answers Answered by: Rajan Choudhary on: Aug 19th, 2012

Technology is the way in which a current problem statement is Resolved. and Language by the way in which the technology has been Implemented. e.g Silverlight is technology which comes from Microsoft...
Answered by: Nikhil on: Sep 4th, 2011

Launguage is used to programing to develop applications. Technology is set of programmes to find a new way of solving current systems backlogs. Answer Question Select Best Answer

Connectivity troubleshooting
Asked By: kalahari | Asked On: Sep 26th, 2010 9 answers

A user in a corporate network contacts service desk saying he/she has lost network connectivity: how will you troubleshoot the issue? What are the steps to followed?
Answered by: praveen on: Aug 2nd, 2012

!st check thee cable...and immediate click on network connectivity...go to run cmd den ipconfig /release then..ipconfig /renew den refresh2 to 3 times on desktop...definitely..it should works...
Answered by: Vinit on: Jul 26th, 2012

If you're getting an error message limited activity by right clicking on the connectivity icon on the task bar, use ipconfig /release then ipconfig /renew commands refresh the desktop and check. If th... Answer Question Select Best Answer

Remote connection
Asked By: ras2008 | Asked On: Jun 7th, 2008 17 answers

If you have client in a different location and want to access that client from server, what is the best way to access that client from server?
Answered by: praveen on: Aug 2nd, 2012

domain and remote option...must be there or vnc(virtuval net computing)its the solutions
Answered by: khojem praymaswala on: Aug 2nd, 2012

best way to go throgh VNC. and also remote desktop. Answer Question Select Best Answer

Java application installers
Asked By: Renee | Asked On: Sep 12th, 2011 1 answer

What are the most common tools to develop the installer of Java applications or applications in general?
Answered by: Ketan Chiplunkar on: Jul 29th, 2012

you can use the Eclipse software & Net beans software. Eclipse is best for All Java Applications except EJB. EJB you can do in Net beans. Answer Question Select Best Answer

Enable usb ports
Asked By: blayne | Asked On: Sep 20th, 2011 8 answers

I have disabled all usb ports on my stationary computer, my mouse and keyboard don't work... How do I enable it back? Please help... i cannot press f2 to get into bios, nothing works... Keyboard or mouse...
Answered by: Vinit on: Jul 26th, 2012

since you've disabled USB ports pressing F2 will not work if you're using a USB keyboard. I recommend you to boot your system from a different source and format your system HDD or you can use a non-USB keyboard to enter BIOS setup and enable USB ports.
Answered by: Shamim haider on: Apr 25th, 2012

First system restart and press del or F2. after bios inter enable USB keyboard & mouse support,and use ps2 keyboard and mouse. Answer Question Select Best Answer

What type of problems are associated with operating system like window xp?
Asked By: alam | Asked On: Aug 13th, 2007 4 answers Answered by: Mandar Mench on: Jul 26th, 2012

If you installed winxp and windows 7 both operating system in dual boot you can define which system by default to be start through editing in boot.ini or from go to start - run -put following command ...
Answered by: Khandokar Mahafuz Hassan on: Jun 28th, 2012

If you are installed Multiple operating system, select which one you want it (that files Boot.ini) Answer Question Select Best Answer

What is difference between win XP and wn 7 technically?
Asked By: Dastagir Amir Hamaja | Asked On: Jun 18th, 2011 17 answers Answered by: Mandar Mench on: Jul 26th, 2012

The major difference between win xp and windows 7 is graphics and than it is more secure than winxp and it has inbuilt utility like bitdiffender to encrypt the data on drive which is only accessible i...
Answered by: Simasingh on: Jun 16th, 2012

windows diffusion in windows 7 provide maxi mam security in operating system but windows xp this is not future use Answer Question Select Best Answer

Bootloader
Asked By: chetan_01 | Asked On: Dec 7th, 2008 4 answers

What is bootloader?
Answered by: Mandar Mench on: Jul 26th, 2012

Actually bootloader is a windows default utility through which when we start our system it check all the details related to system boot means on which partion is primery and active as well as where th...
Answered by: ajey53 on: Jun 17th, 2012

Boot Loader is the part of the OS that enables booting process and loading the particular OS while start up. The function of the Boot Loader is to perform and start up options while the users turn on... Answer Question Select Best Answer

Ntldr error meaning
Asked By: adpatel33 | Asked On: Apr 7th, 2012 5 answers

When I boot my computer I have seen on my screen " verifying dmi pool data" and then after second line is shown "ntldr is missing..." what is this problem and who can I solve it.
Answered by: Mandar Mench on: Jul 26th, 2012

when ntldr missing message shown than insert the os bootable cd . than go to recovery console by pressing first R and than copy that file from i386 folder from cd to os system 32 folder and than run ...
Answered by: Vikas Kumar on: Jun 5th, 2012

Yes he is right,You need to copy it from the CD or DVD and than paste it,other wise it will not load the OS from the HDD as it loads the OS from the bootable media Answer Question Select Best Answer

How will you install operating system in more than 50 pc at a time when the all pcs having same configuration.
Asked By: san_pradeep59 | Asked On: Sep 18th, 2007 19 answers

Read Best Answer

Editorial / Best Answer
Answered by: prasad samant Answered On : Nov 20th, 2007 Other way is If the pcs are on network you can have RIS or WDS setup. Requirement for clients is they should have network bootable NIC
Answered by: ritesh on: Jul 14th, 2012

we can use another service like RIS (Remote Installation Server). By the help of it we can install o/s to multiple systems
Answered by: raj on: Jul 1st, 2012

ghost is not secured installed WDS (windows deployment services) it is the way for network instillation Improve Answer

Removal of virus
Asked By: Big Al | Asked On: May 12th, 2008 8 answers

You have a virus that loaded several processes every time you stop the process it restarts itself you tried going into safe mode but it does the same thing...You found the dll files associated with it but you cant stop or delete them what is the easiest way to repair?
Answered by: mukeshg on: Jun 1st, 2012

Reinstall the operating system, at the time of installation choose repair option, it repairs all corrupt dll files, and keep ur data as it is.
Answered by: thilak on: May 12th, 2012

First Remove the system from network and run the virus scan. Deleted the file from Quarantine if the system scanned fully copy the data in externaml drive and format the syustem Answer Question Select Best Answer

How to install os from server to all system?
Asked By: tejeshwarao | Asked On: Sep 1st, 2011

7 answers Answered by: Yogesh Kumar on: Apr 30th, 2012

We can RIS service in Windows Server 2003SP1 and WDS Services Windows serve 2003SP2 and also WDS in Windows server 2008. but we have .inf file of all systems of a network those boot from network. so we can easily install from Server.
Answered by: Himanshu dihauliya on: Mar 31st, 2012

100% we will use WDS. Window Deployment Services Feature, That is Available in Windows 2008.... Answer Question Select Best Answer

How to install operating system in usb pen drive?
Asked By: Mohd.Mumtaz007 | Asked On: Mar 9th, 2012 2 answers Answered by: Shamim Haider on: Apr 28th, 2012

First create usb bootable to pen drive, then select first boot device (usb device) from bios
Answered by: rickevans on: Mar 9th, 2012

Step 1. Format the USB Flash Disk Run CMD (elevated) and type: 1. diskpart 2. list disk (*now find your USB disk number, youll find it by its size) 3. select disk 1 (*if your USB is disk 1)... Answer Question Select Best Answer

What is difference between msi and exe file ?
Asked By: pkarle | Asked On: May 14th, 2011 7 answers Answered by: itmanpjs on: Apr 26th, 2012

There is no relationship between an MSI file and an .EXE file. An .exe file, like a .com file is produced when source code is complied and creates a Windows executable program. An .MSI file is a file...
Answered by: Jisthi Khan on: Feb 21st, 2012

MSI file is only for installation purpose. EXE file can be anything that executes on windows. Answer Question Select Best Answer

Desktop icons
Asked By: Abdul subahan.H | Asked On: Dec 7th, 2008 6 answers

How to make the desktop icons smaller or lager?
Answered by: kam on: Apr 25th, 2012

Right click on desktop-> view-> select any option (large/medium/small icons)
Answered by: Tahir Khalil on: Dec 19th, 2011

You can enlarge desktop icon simply by mouse in Win-7 , that is ( Hold " CTRL Button " and then Move Mouse Scroll To UP ) .. Thnx

Mobile outlook
Asked By: Dastagir Amir Hamaja | Asked On: Jun 18th, 2011 1 answer

How to configure outlook in mobile in exchange 2007 environment?
Answered by: chetan on: Apr 4th, 2012

you can configure outlook in all type of BlackBerry phone.. 1st u need create blackberry account from your network provider . then configure that ID in your exchange server to that domain id of user Answer Question Select Best Answer

How a virus program destabilize ms windows XP
Asked By: albrq | Asked On: May 12th, 2008 3 answers

What is the mechanism of combating those malicious program? Evaluate each technique
Answered by: Rahul Sharma on: Mar 7th, 2012

Follow these steps 1)Run ->Cmd 2)Type netsh 3)Firewall 4)Now type in "set opmode enable" to start firewall and "set opmode disable" to stop fire wall.
Answered by: daperfetto on: Feb 24th, 2011

By corrupting, or deleting data Answer Question Select Best Answer

How to do a complete refresh of computer using back up discs ?
Asked By: dorothy828 | Asked On: Aug 17th, 2011 2 answers Answered by: Upendra Sabat on: Feb 29th, 2012

Firstly You to take the system backup on a External hdd, then You format and load os, then You restore the data through system backup.. thanx.
Answered by: shrikant dongre on: Dec 12th, 2011

This using the external hard disk and personal data back up the external hard disk. second thing format your computer...; Answer Question Select Best Answer

Microsoft outlook pst file size limit
Asked By: Pravin Bargode | Asked On: Jun 23rd, 2011 7 answers

What is the pst size limit in outlook97, 2000, 2003, 2007 and 2010?
Answered by: Sundar S on: Feb 19th, 2012

In Outlook 2002 and earlier, the .pst files are in the American National Standards Institute (ANSI) format, and the overall size has a limit of 2 GB. In Outlook 2003 and after, the .pst files are in ...
Answered by: Shafi23 on: Sep 6th, 2011

MS outlook in 2003 and 2007 is 2GB, in 2010 is 50GB Answer Question Select Best Answer

A users application on their desktop is not working, explain what you would do to resolve this problem
Asked By: ramraje | Asked On: Mar 4th, 2011 3 answers Answered by: pravin on: Feb 15th, 2012

1. Go to task manager the partiquer applicatoin right click application and go to process and End Task. 2. Then go to Event viewer 3. Check application
Answered by: AdhamFadel on: Feb 5th, 2012

Maybe application is disabled by Antivirus Answer Question Select Best Answer

Reset user password
Asked By: Big Al | Asked On: May 12th, 2008

6 answers

How do you reset the users password give the steps it took to get you to the user account.
Answered by: Jayaram. on: Jan 28th, 2012

If it is for a domain user go to active directory users and computers. Type username and click search. Below you can see user name. Click mouse right button on user name and click on reset password. T...
Answered by: raj_smart on: Jul 3rd, 2009

If its domain environment here all the user accounts info will be maintained with some security Questions add some security measures. By this tool user account can change his/her password every size l... Answer Question Select Best Answer

What is APIpa stand for?
Asked By: Big Al | Asked On: May 12th, 2008 13 answers

What does APIpa stand for and how can you tell if your computer is using it? Why would your computer be using it?
Answered by: sunny lohar on: Jan 4th, 2012

APIPA stands for automatic private ip address, it is the feature of Windows XP, automatic takes an IP from the range 169.254.1.0 to 169.254.255.255, at the time when when DHCP and TCP/IP not able to assign an IP to the local computers.
Answered by: saubhagya shakti singh on: Dec 22nd, 2011

APIPA - Automatic Private IP Addressing its a feature that used in opereting system. When DHCP is unavailable then APIPA provide IP ranging from 169.254.0.0 to 169.254.255.255 Answer Question Select Best Answer

Unable to view deleted files in recycle bin (winxp)
Asked By: suresh pa | Asked On: Jun 10th, 2008 6 answers

I deleted my files, but I didn't see that files in my recycle bin.Pls anybody help me... Read Best Answer

Editorial / Best Answer
Answered by: bspkumar
View all answers by bspkumar Member Since Sep-2007 | Answered On : Jul 25th, 2009

Every one is suggesting what to do next time. he is asking how to recover the deleted file now. First step you need to do is stop working on the hard disk in which you have lost the file. Otherwise, the file will be overwritten by another file. Then run any of the file recovery software. If you have already used the same hard disk, the chances of recovering the file is less.
Answered by: sivananduri on: Nov 28th, 2011

File deletion will be 2 types. Temporary & Permanent. If the file is deleted without selecting shift button, it will come to recycle bin. Otherwise the file will be deleted permanently. In such cas...

Answered by: bspkumar on: Jul 25th, 2009

Every one is suggesting what to do next time. he is asking how to recover the deleted file now.First step you need to do is stop working on the hard disk in which you have lost the file. Otherwise, th... Improve Answer

Going straight to desktop without having to login
Asked By: ups5363 | Asked On: Oct 15th, 2011 3 answers

How do u go straight to your desktop when you reboot rather than having to login every time you reboot or turn on your computer on?
Answered by: ravi on: Oct 18th, 2011

First you right click on computer and then click on manage.at that time a window appear. Then go to local users and groups. Then the total users will appear. Then right click on user name what u r ent...
Answered by: rajan on: Oct 17th, 2011

By removing the user name or with out user name you can directly log in to the windows Answer Question Select Best Answer

How do you check who are invited for the meeting
Asked By: snehaspandana | Asked On: Aug 2nd, 2011 2 answers

If a meeting request is received, how will you check who all are invited in a meeting in outlook?
Answered by: RAJ on: Sep 24th, 2011

1.Open the meeting request or notification. To view your calendar, click Calendar. Note A new meeting request will appear as a tentative on your calendar. 2.Do one of the following: Accept, ten...
Answered by: vijaya on: Aug 17th, 2011

In 2010 if you check meeting tab and open specific meeting appointment you have an option tracking in access toolbar Answer Question Select Best Answer

Artribation process
Asked By: rameshrgen | Asked On: Jun 28th, 2009 2 answers

Which layer provides physical link, flow control, artribation process?
Answered by: S.Prabu on: Sep 5th, 2011

Cable related doing activity called physical layer.Hub is working on physical layer.
Answered by: drum4ravi on: Jul 10th, 2009

Its the Data Link Layer Answer Question Select Best Answer

Network logon failures
Asked By: Big Al | Asked On: May 12th, 2008 5 answers

A user calls you they cant login in said they have tried several times what is the best way to troubleshoot this.
Answered by: uma on: Aug 22nd, 2011

1.Check whether the caps button is on or not and then give user name and password 2.Check whether all the network cables connected properly 3.Check whether the user is added in domain 4.Can reset the...
Answered by: SUMIT GUPTA on: Aug 10th, 2011

Just Check the user's account in active directory & finally check system is in domain or LAN is working fine or not. This is the only troubleshooting for that issue Answer Question Select Best Answer

What are the steps to create .Pst in client system ?
Asked By: Pramod Dhende | Asked On: Aug 7th, 2011 1 answer Answered by: Yogesh Dhiman on: Aug 10th, 2011

we have two option for creation of Archive folder or PST(Personal Storage Template) or personal folder 1. Automatic Archive 2. Manually Archive Manually Archive for 2007 and 2010 For Outlook 2007 ... Answer Question Select Best Answer

Backup of computer
Asked By: LAVLEEN SAINI | Asked On: Jul 16th, 2011 2 answers

How to take the backup of computer? After taking backing is there d and f drive programs also recovered?
Answered by: Kannan Kanna on: Aug 4th, 2011

types of backup incremental backup update backup file daily backup daily fixed time backup normal backup Copy and past backup full backup any timE full hdd backup
Answered by: Hamid Ali on: Jul 20th, 2011

If you wanna backup your system like D and F drives follow the steps, 1.Click on my computer icon. 2.Left click on the drive which you wanna backup and go to properties 3.Go in Tools tab there you wi... Answer Question Select Best Answer

Low level formatting
Asked By: parameshg | Asked On: Apr 5th, 2009 3 answers

Define low level formatting?
Answered by: Hamid Ali on: Jul 20th, 2011

Low-level formatting is the process of outlining the positions of the tracks and sectors on the hard disk, and writing the control structures that define where the tracks and sectors are. This is ofte...
Answered by: veda prakash on: Jul 7th, 2011

creating new tracks and sectors on the hard disk Answer Question Select Best Answer

What is imap? How does it work?
Asked By: Mohammed Saif | Asked On: Jul 14th, 2007 10 answers Answered by: Hamid Ali on: Jul 20th, 2011

The Internet Message Access Protocol (commonly known as IMAP) is an Application Layer Internet protocol that allows an e-mail client to access e-mail on a remote mail server.
Answered by: Amit Maurya on: Jul 17th, 2011

IMAP is stands for Internet message access protocol, which is used for accessing mails from the server and this protocol leave not remove the mail from the server but if we POP(Post Office Protocol) it can be remove from the server mails. Answer Question Select Best Answer

Difference between *.Ost and *.Pst
Asked By: Pravin Bargode | Asked On: Jun 23rd, 2011 2 answers

What is the difference between *.Ost and *.Pst ? How does it work?
Answered by: Hamid Ali on: Jul 20th, 2011

Offline folders (.ost) files are stored on your computer and are available even when the network is down. The default location for the .ost is your current Windows folder. Like personal folders (.pst) files, .ost files can be compacted to save space on your computer.
Answered by: Narendra jogani on: Jul 17th, 2011

Offline folders (.ost) files are stored on your computer and are available even when the network is down. The default location for the .ost is your current Windows folder. Like personal folders (.pst)... Answer Question Select Best Answer

Windows XP boot options
Asked By: Shaishav | Asked On: Mar 21st, 2009 5 answers

What advance boot options are available for windows xp?
Answered by: Hamid Ali on: Jul 20th, 2011

1)Safe Mode 2)Safe Mode with Networking 3)Safe Mode with command Prompt 4)Enable Boot Logging 5)Enable VGA Mode 6)Last known Good Configuration(your most recent settings that worked) 7)Directory Servi...
Answered by: Atul Keshri on: Jul 20th, 2011

Safe Mode Safe Mode With Networking Safe Mode With Command Prompt Enable Boot Logging Enable VGA Mode Last Known Good Configuration Directory Services Restore Mode Debugging Mode Disable automatic restart on system failure Start Windows Normally Reboot Return to OS Choice Menu Answer Question Select Best Answer

Installing printer
Asked By: Big Al | Asked On: May 12th, 2008 4 answers

You are required to install a new printer on the print server what are your steps? Remember this will be a shared printer
Answered by: komodosp on: May 25th, 2010

To share it on the network, in Control Panel / Printers and Faxes, you can right-click on it, and in the menu, click on Sharing
Answered by: syed_nrp on: Apr 30th, 2009

First Start--->Control Panel--->Printers---->Add printer--->Local (or) Network Printer--->Choose which brand printer and which one type of printer (if it's needed drivers, push the driver CD in that PC)---->Select TYPE (LPT1 or USB)--->Finish. It's ready to use printer. now printer is online. Answer Question Select Best Answer

How can you view startup items
Asked By: Big Al | Asked On: May 12th, 2008 4 answers

There are a couple of way to view and disable the items that start to the task pain... How would you go about doing it and give me the full path to get you there
Answered by: pks07pro on: Jan 7th, 2010

To see the most start up item, Go to start>programm>start up To make any changes, enable or disable Go to Run & type "msconfig"

How to take backup of emails on outlook ?
Asked By: Charanjeetsingh79 | Asked On: May 7th, 2011 4 answers Answered by: shashi021 on: Jun 23rd, 2011

Other way to take backup install PST SYNC (http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=9003) and set backup path for which pst want to be backup. it,s take much less time as using copying method.
Answered by: anshulmehra_2007 on: May 27th, 2011

• log in with some user->delete files->tools->options->maintenance->store folder>copy the path->create new folder->paste the path to the new folder created->import>messages->MS outlook->select the user from where files is deleted->browse folder where the path was pasted->finish Answer Question Select Best Answer

Printing problems
Asked By: Big Al | Asked On: May 12th, 2008 3 answers

User sent a job but it is stuck in the local cue how can you delete it? Name a couple ways Read Best Answer

Editorial / Best Answer
Answered by: syed_nrp
View all questions by syed_nrp View all answers by syed_nrp Member Since Apr-2008 | Answered On : Jan 3rd, 2009

You first Install the proper printer driver install. Check that printer is on/off status. Then give a test page. The test page is not printing, go To RUN-->services.msc check printspooler give stop and start. it's work fine

Answered by: Dastagir Amir Hamaja on: Jun 18th, 2011

Go to start, setting , priter and faxes, there you will see your printer, double click that printer, you will find jobs you have printed, right click that job and try to delete it. If not deleting then restart printer spooler services. if not deleting then restart printer and pc. Thanks, Dastagir
Answered by: syed_nrp on: Jan 3rd, 2009

You first Install the proper printer driver install. Check that printer is on/off status. Then give a test page. The test page is not printing, go To RUN-->services.msc check printspooler give stop and start. it's work fine Improve Answer

Printers
Asked By: Big Al | Asked On: May 12th, 2008 2 answers

How do you install a pre existing printer on a users desktop
Answered by: pavankumarnagisetti on: May 21st, 2009

Go to Start-> Settings -> Printers and Faxes This opens a new window now click on add a printer from right side panel. Follow the steps. You can add normal as well network printer using this.
Answered by: rrsain on: Sep 13th, 2008

Go to control panel and then go to add hardware wizard After that read all the options carefully. When system requires software for that, insert the software CD otherwise system will install automatically. Restart the system, if it is not working, tell me, I will give you complete solution Answer Question Select Best Answer

Dealing with irate customers
Asked By: Big Al | Asked On: May 12th, 2008 2 answers

You take a call from a customer who is very upset they cant work how do you deal with this?
Answered by: udaykalidindi on: Jun 2nd, 2009

This is a common problem faced by a every one working in helpdesk.1st thing don't try to argue with him. 2ndly try to understand the issues or problems he is facing.3rdly don't promise him heaven and ...
Answered by: tintin3011 on: Sep 3rd, 2008

Talk politely and try to know the problem, and solve as fast as you can. Answer Question Select Best Answer

Firewire port
Asked By: akki4444 | Asked On: Apr 3rd, 2009 3 answers

What is firewire port? What are its uses?
Answered by: khurramjol on: Apr 21st, 2010

Firewire port is a form of Serial Port that make use of FireWire Technology to transfer data rapidly from one electronic device to another.FireWire port has the ability to interact with a number of&nb...

Answered by: delhi.itsupport on: May 22nd, 2009

Firewire generally ports are genereally comes with laptop & apple desktop/laptops. You can connect various external hardware with this. e.g HDD, CDROM, Cameras etc. the transfer rate of a FireWire port can reach up to 400 Mbps. Answer Question Select Best Answer

Virtual memory
Asked By: punitgoyal88 | Asked On: Jan 27th, 2011 2 answers

How to improve virual memory of pc?
Answered by: Dastagir Amir Hamaja on: Jun 18th, 2011

Go to system propert--> Advanced Tab--> click on setting of performance--> Advanced Tab-> Click on Change 0f Virtual memory--> now here you can increase virtual memory Dastagir
Answered by: srbnew on: Feb 4th, 2011

just right click on my computer icon select properties go to advance go to performance select virtual memory select how much u want apply and click ok thatz itz Answer Question Select Best Answer

Restore windows XP
Asked By: krabhilas | Asked On: Sep 23rd, 2008 4 answers

How to restore windows XP in command mode.
Answered by: ashi786 on: Aug 18th, 2009

To start System Restore Windows XP first you create a system restore point by following steps:1. Click start and go help and support options on right hand side you see under pick a task options.2. C...
Answered by: mahadeva83 on: Apr 7th, 2009

To start System Restore using the Command prompt, follow these steps: Restart your computer, and then press and hold F8 during the initial startup to start your computer in safe mode with a Command pr... Answer Question Select Best Answer

Pxe use
Asked By: walker233 | Asked On: Jan 14th, 2011 2 answers

What is pxe used for? What dependencies does it have to be useful?
Answered by: sharmavivek096 on: Jun 2nd, 2011

The Preboot eXecution Environment (PXE, also known as Pre-Execution Environment; sometimes pronounced "pixie") is an environment to boot computers using a network interface independently of data stora...
Answered by: s.pandilwar on: Jan 28th, 2011

Preboot Execution Environment (PXE) :- When we are trying to boot system from network we need to enable PXE boot device from BIOS. It is helpful to install OS from network & it will

pick IP address automaticaly. It is helpful in large network were we cannot install OS manualy. Answer Question Select Best Answer

Home folders
Asked By: Big Al | Asked On: May 12th, 2008 3 answers

User has a home folder setup in ad when he logs in it maps the u drive which point to the share on the server.. He accidenTALLY deleted it what is the fastest way to get it back from a command line?
Answered by: khurramjol on: Apr 20th, 2010

Re-mapping will restore the home folder, and we can do in Command line as net use u: serverhome
Answered by: taiwolasile on: Jun 2nd, 2009

Reboot the PC to re-load the roaming profile Answer Question Select Best Answer

Ldap on outlook
Asked By: saahil4u | Asked On: Sep 10th, 2008 2 answers

What is the ip range in networking side? How do we troubleshoot outlook? How do we configure ldap on outlook?
Answered by: Ushadavuluri on: Jul 29th, 2009

I am hoping I am submiting the correct answer. IP range in netwroking side is related to DHCP and Address pools. Ex: 192.168.0.10 to 192.168.0.200 -> Can be defined as address range allowed to dist...
Answered by: Ushadavuluri on: Jul 29th, 2009

From Microsoft OutlookSelect: Tools->Account settings->AddressBook->New Address book-> select Internet Directory Service(LDAP) radio button-> Next step will take you to the window of se... Answer Question Select Best Answer

Set ip address from cmd prompt
Asked By: dreamcast | Asked On: Apr 27th, 2010 3 answers

How do you set the ip address by using the command prompt?
Answered by: arunbathery on: Aug 5th, 2010

There are Two ways to Set the IP address from CMD Prompt1. Go to start, select run, type CMD, and in CMD Prompt type the command C:>netsh interface ip set address name="Local A...
Answered by: lila123 on: May 28th, 2010

Set IP address from CMD prompt :type cmd in run type following command in sequence like IP address,Subnet mask, Default Getway, DNS,Wins, ect...exmpl : netsh interface ip set address name="... Answer Question Select Best Answer

What is the difference between lcd and tft ?
Asked By: vhthakor | Asked On: Nov 5th, 2007 3 answers Answered by: shashi jadhav on: Sep 26th, 2008

A TFT monitor uses thin-film transistor technology. Nearly all LCD monitors today use TFT technology. The benefit of a TFT monitor is a separate, tiny transistor for each pixel on the display. Because...

Answered by: SONY & RAVI on: Nov 22nd, 2007

LCD Means Liquid crystal display TFT means Thin Film Transistor Liquid Crystal Display.What I think you mean is Active and Passive matrix LCD panels. This is where there is a difference in price. A ty... Answer Question Select Best Answer

What is the difference between server os and desktop os
Asked By: cnchandrashekar | Asked On: Jun 3rd, 2008 6 answers Answered by: Karimulla Shaik on: Apr 7th, 2011

server OS manages Network resources centrally along with its internal resources. desktop OS Manages only its internal resources(like memory, cpu, i/o, user interface).
Answered by: tdpanee on: Jul 30th, 2010

Server OS can be used to configure a centralised administration for computer network. Desktop OS can be used to configure client Machine to SErver. Answer Question Select Best Answer

Enable or disable firewall
Asked By: jcsrinath | Asked On: Feb 18th, 2011 1 answer

How would you enable or disable the firewall in windows xp?
Answered by: adnanj85 on: Feb 22nd, 2011

To enable Windows Firewall, follow these steps:Click Start, click Run, type Firewall.cpl, and then click OK.On the General tab, click On (recommended).Click OK.------------------------------To disable... Answer Question Select Best Answer

Install operating system on more than 50 pc
Asked By: saahil4u | Asked On: Sep 10th, 2008 4 answers

How will you install operating system in more than 50 pc at a time when the all pcs having same configuration.
Answered by: Laxman on: Jan 28th, 2011

We use image ghost if all PC hardware requirments are same.
Answered by: walker233 on: Jan 14th, 2011

This depends on your operating system and target hardware.If you are deploying XP then you are bound by the hardware, and are required to make an image of the OS, using ghost or another image capture ... Answer Question Select Best Answer

Add a user to network
Asked By: charla | Asked On: Sep 15th, 2009 6 answers

Explain how will you add a user to network?
Answered by: egyptianfalcon on: Jan 20th, 2011

This answer is specially for windows 7 and I think it would be usiful in all the kind of windowsfirst go to start menu-controll panel-user accounts-manage another account-creat new account-then w...
Answered by: elmagoal on: Jun 10th, 2010

First you need to figure out what role the user is going to have and if there is anyone on that has the correct set of permissions as the user. If this is true, on the server or on your desktop if you... Answer Question Select Best Answer

Create an email account for a user already in ad
Asked By: saahil4u | Asked On: Sep 10th, 2008 2 answers

How would you create an email account for a user already in ad?
Answered by: Anele Takane on: Jan 6th, 2011

If the user account has been created with a mailbox (mailbox enabled) you may follow ameetsaha's instructions, but if you need to create an email account (mailbox) you will have to go to your Active d...
Answered by: ameetsaha on: Nov 4th, 2008

Open Micosoft Outlook if you are using office 2000, and click on "Tools" tab. Go to "Email Accounts". There you can find two option like Email and Directory. Click on "Add a n... Answer Question Select Best Answer

Sms update
Asked By: msid82 | Asked On: Nov 6th, 2010 1 answer

A pc did not receive an update from sms. What steps would we take to resolve this?
Answered by: Prabu2009 on: Dec 17th, 2010

If SMS not updated in client system. 1. Need to check system getting IPaddress or not. 2. Need to check system in domain or not 3.Ensure that windows firewall should be off. Above reason SMS will not update to the client system. Answer Question Select Best Answer

Troubleshooting a slow computer
Asked By: sanj108 | Asked On: Nov 12th, 2009 8 answers

A user calls in and complains that her computer and network is running very slow. How would go about troubleshooting it? Read Best Answer

Editorial / Best Answer
Answered by: smokedragon
View all answers by smokedragon Member Since Nov-2009 | Answered On : Nov 18th, 2009

I would first ask the user whether every application on the computer is slow or is it just one particular application. if it is just one, try and sort that out. If the answer is all applications are running slow, look at common causes like, virus scans scheduled, free disk space on the home drive, RAM, lastly if the deployment team is rolling out any updates (which should not be done during business hours, but i've seen that happen too ;) If you suspect network latency, a simple ping test from the user's computer will tell you how many milli seconds network traffic is taking to reach the server.
Answered by: rgawthorne on: Oct 26th, 2010

First question, when did the problem start? Is anyone else in the same work group experience slowness.Does it happen all the time, or is it intermittent, any patterns of timings eg, in the morning ...

Answered by: DanielGoad on: Jul 23rd, 2010

'Slow' is a relative question, so first determine what the user is experiencing. Is it slow opening applications or while working in them? is this a networked application or local? ... Improve Answer

Windows XP firewall
Asked By: navaneethreddy | Asked On: Jul 12th, 2010 4 answers

How would you enable or disable the firewall in windows xp?
Answered by: rampraveshraju on: Aug 9th, 2010

Press window+r key on keyboard than type firewall.cpl than you can easily On or Off firewall.
Answered by: Dhamodharan15 on: Aug 5th, 2010

Goto Command prompt, type Services.msc, in the services windows search for Windows Firewall / Internet Connection Sharing(ICS) and start the service.

Creating email account
Asked By: Big Al | Asked On: May 12th, 2008 2 answers

How would you create an email account for a user already in ad
Answered by: tdpanee on: Jul 30th, 2010

If you have installed exchnage server, then select the properties of user account and change the mail enable user check box.
Answered by: abujibrael on: Apr 20th, 2010

1- First click the OU that the users resides. 2- Right click the user, with whom you wanna create an email account. 3- Now click Exchange Task 4- Click next to the wizard 5- Choose create mailbox 6- C... Answer Question Select Best Answer

Blackberry synchronization
Asked By: Rrahul Arora | Asked On: Oct 21st, 2009 3 answers

If a customers blackberry stopped syncing their calendar wirelessly, what would you do?
Answered by: elmagoal on: Jun 10th, 2010

The first step before wiping the Blackberry is to remove the battery for 20 sec. put it back and check the sync again. While all other steps are correct, most BB issues will be resolve by a hard reset.
Answered by: mdabid on: Dec 10th, 2009

Take Complete Backberry backup using desktop Manager and wipe your handheld, then syncronize by doing enterprise activation, and restore backup.

Regards, Mohammed Abid Razvi Answer Question Select Best Answer

Install pre-existing printer
Asked By: saahil4u | Asked On: Sep 10th, 2008 2 answers

How do you install a pre existing printer on a users desktop?
Answered by: komodosp on: May 25th, 2010

You may have to install printer hooked to the network. If it has an IP address:1. Control Panel / Printers & Faxes2. Next past Welcome message3. Local Printer attached to this computer, Next4. Cre...
Answered by: rrsain on: Sep 12th, 2008

Go to control panel and then go to add hardware wizard After that read all the options carefully. When system requires software for that, insert the software CD otherwise system will install automa... Answer Question Select Best Answer

What is the difference between windows XP and windows 2000
Asked By: cnchandrashekar | Asked On: Jun 3rd, 2008 7 answers

Read Best Answer

Editorial / Best Answer
Answered by: bspkumar
View all answers by bspkumar Member Since Sep-2007 | Answered On : Jul 20th, 2008

Windows XP Vs windows 2000
.

Feature Release

OS

XP

2000

2001

2000

NT

5.1

5.0

32/64 bit

32/64 bit

32 bit

built-in CD writer support

y

n

Remote Desktop Connection, Internet Connection Firewall, Fast UserSwitching Windows Media Player and

y

n

Windows Messenge

File sys support

FAT16,32,NTFS,HPFS (HighPerformance File System)

FAT16,32,NTFS

Answered by: syed_nrp on: Apr 30th, 2009

Windows XP has 4 Versions, Windows 2000 has 3 ver. (Win 2000 Pro, Server & AD. Server).Windows XP has last known good configuration [last used desktop] which is not present in Windows 2000. Remo...
Answered by: hezysasson on: Nov 10th, 2008

Win. XP has drivers that "recognize" hardware easier and faster with system set up. Improve Answer

Larger desktop icons
Asked By: ghada | Asked On: Feb 22nd, 2009 1 answer

How to make desktop icons appear larger?
Answered by: Ravi9 on: Feb 23rd, 2009

Right click on desktop. Go to properties and then click on appearance tab. Then further click on effects tab. A window will open. Select the use large option. Then click on apply OK. Thats it. Answer Question Select Best Answer

Steps to secure windows
Asked By: ravila23 | Asked On: Feb 21st, 2008 2 answers

Describe steps you would take to secure windows 2000 server resources and files. Read Best Answer

Editorial / Best Answer
Answered by: shashi jadhav
View all answers by shashi jadhav Member Since Sep-2008 | Answered On : Sep 26th, 2008

There are lot of secure option for Windows, You can secure by • Set a difficult password for administrator • Disable gust account • Give minimum & limit permissions to administrator's members • Make minimum share folder on your Windows's • Give minimum share permission on that folder & full control to trust users • Always change the administrator password • Install third part firewall & set minimum port. • Access & deny those user's & IP which you don't want to access to your computer. • Don't share your password.
Answered by: shashi jadhav on: Sep 26th, 2008

There are lot of secure option for Windows, You can secure by - Set a difficult password for administrator Disable gust account Give minimum & limit permissions to administrator's members ...
Answered by: amjad1233 on: Apr 26th, 2008

To Secure the windows following steps should be considered : 1. Making admistration account and giving only requried rights to child accounts 2. Putting some external Anti-Virus to protect from the threats 3. Making some registray changes to be help full and other Improve Answer

What is ldap sserver?
Asked By: kaps200 | Asked On: Jul 8th, 2008 2 answers

Read Best Answer

Editorial / Best Answer
Answered by: aravind kalyan
View all answers by aravind kalyan Member Since Jul-2008 | Answered On : Jul 15th, 2008

LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server.
Answered by: Karthikumaran on: Aug 25th, 2008

LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server.
Answered by: aravind kalyan on: Jul 15th, 2008

LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server. Improve Answer

Desktop support & help desk
Asked By: Brianseawood | Asked On: Jun 17th, 2008 1 answer

What is the technical difference between desktop support & help desk ? Read Best Answer

Editorial / Best Answer
Answered by: radelapena
View all answers by radelapena Member Since Aug-2008 | Answered On : Aug 24th, 2008

The difference between desktop support and helpdesk are the following: 1. Desktop support is the one doing the troubleshooting on hand. 2. Helpdesk support is the one receiving the call and troubleshoot it remotely
Answered by: radelapena on: Aug 24th, 2008

The difference between desktop support and helpdesk are the following:

1. Desktop support is the one doing the troubleshooting on hand. 2. Helpdesk support is the one receiving the call and troubleshoot it remotely Improve Answer

Windows XP core files
Asked By: rrsain | Asked On: Aug 4th, 2008 1 answer

What are the core files required to boot windows xp? Read Best Answer

Editorial / Best Answer
Answered by: afal.omar
View all answers by afal.omar Member Since Aug-2008 | Answered On : Aug 5th, 2008

ntldr, boot.ini, bootsect.dos, ntdetect.com, ntbootdd.sys, ntoskrnl.exe, hal.dll, system, device drivers (s.sys)
Answered by: afal.omar on: Aug 5th, 2008

ntldr, boot.ini, bootsect.dos, ntdetect.com, ntbootdd.sys, ntoskrnl.exe, hal.dll, system, device drivers (s.sys)

How to monitor replication between sites?
Hi Friends, In the previous posts i discussed about Active Directory Replication. In this post i wan to talk about monitoring the replication traffic between AD Sites. Active Directory database is made up of 3 naming contexts or partitions. 1. Schema Partition : The schema container defines the objects (such as users) and attributes (such as telephone numbers) that can be created in the Active Directory, and the rules for creating and manipulating them. Schema information (which attributes are mandatory for object creation, what additional attributes can be set, and what attribute data types are used) isreplicated to all domain controllers to ensure that objects are created and manipulated in accordance with the rules. 2. Configuration Partition : The configuration container includes information about the Active Directory as a whole—what domains exist, what sites are available, what domain controllers are running in the particular sites and domains, and what additional services are offered. All enterprise domain controllers need this information to make operational decisions (such as choosing replication partners) so it is replicated to all of them. 3. Domain Partition : A domain naming context holds objects such as users, groups, computers, and organizational units. A full domain naming context replica contains a read-write replica of all information in the domain—all objects and attributes. A domain controller holds a full replica of its domain naming context. A partial domain naming context replica contains a read-only subset of the information in the domain—all objects, but only selected attributes. A domain controller that's a global catalog (GC) server contains a partial replica of every other domain in the forest (and a full replica of its own domain.) There are some specific tools developed by Microsoft to Initiate, Monitor and Troubleshoot the replication Traffic.

• replmon - is a GUI tool, used to monitor replication in the partition level, you can run it from Windows Resource Kit Tools / Windows Support Tools.

• repadmin - is a command line utility to initiate replication, find replicas, create site links etc, you can run it from Windows Resource Kit Tools / Windows Support

Tools.



dcdiag – is a command line utility to diagnose communication problems between dc’s (sites)

• netdiag – is a command line utility to diagnose network problems in a domain environment.

These tools are very helpful to troubleshoot the replication problems.

How To Become A Desktop Engineer
Interview Questions

===================

A) Tell me something about yourself. Tell about your eductaion, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds. B) Technical Questions are given below:

1) What is Active Directory? A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administor users, computers and printers in the network from active directory.

2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records? DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request. Forward lookup: Converting names to IP address is called forward lookup. Reverse lookup: Resolving IP address to names is called reverse lookup. 'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name. 'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS. To gain in depth knowledge on DNS please download, extract and watch the videos available here.

3) What is DHCP? Why it is used? What are scopes and super scopes? DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy. Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network. Superscope: When we combine two or more scopes together its called super scope.

4) What are the types of LAN cables used? What is a cross cable?

Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed. Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable? The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable. The theoritical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.

6) What would you use to connect two computers without using switches? Cross cable. 7) What is IPCONFIG command? Why it is used? IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.

8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available? When DHCP server is not available the Windows client computer assignes an automatic IP address to itself so that it can communicate with the network cmputers. This ip address is called APIPA. ITs in the range of 169.254.X.X. APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.

9) What is a DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administor computers and we can govern them using common policies called group policies. We can't do the same with workgroup.

10) Do you know how to configure outlook 2000 and outlook 2003 for a user? Please visit the link below to find out how to configure outlook 2000 and outlook 2003.http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp

11) What is a PST file and what is the difference between a PST file and OST file? What file is

used by outlook express? PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express useds odb file.

12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it? BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problemis with one of the devices or drivers.

13) What is RIS? What is Imaging/ghosting? RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS everytime using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.

14) What is VPN and how to configure it? VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the stepsmentioned in the KB:http://support.microsoft.com/kb/305550

15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue? Update the network card driver.

16) Your system is infected with Virus? How to recover the data? Install another system. Insall the OS with the lates pathces, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.

17) How to join a system to the domain? What type of user can add a system to the domain? Please visit the article below and read "Adding the Workstation to the Domain" http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirec tory/stepbystep/domxppro.mspx

18) What is the difference between a switch and a hub? Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.

19) What is a router? Why we use it? Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.

20) What are manageable and non manageable switches? Switches which can be administered are calledmanageable switches. For example we can create VLAN for on such switch. On no manageable swiches we can't do so.

++++++++++++++++++++++

IT Helpdesk Questions Technical Questions 1. What is NIC? A network card, network adapter or NIC (network interface controller) is a piece of computer hardware designed to allow computers to communicate over a computer network

2. What is USB? Universal Serial Bus (USB) is a serial bus standard to interface devices. Devices like Modem, Mouse, Keyboard etc can be connected.

3. Dialup vs. Broadband A broadband connection (ADSL) provides high-speed Internet access over a standard phone line. The advantage of a broadband connection over a standard dialup service, is that Broadband is considerably faster, and is "always-on", meaning that once you"re logged on, your PC is online until

the PC is turned off again. Broadband offer high-speed Internet access and allows telephone calls and a permanent Internet connection to share a single phone line simultaneously whereas in Dialup connection either Internet connection or telephone call can made at given time.

4. LAN and WAN A local area network is a computer network covering a small geographic area, like a home, office, or group of buildings Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links

5. Microsoft Access Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft.

6. What is RAS? Remote Access Services (RAS) refers to any combination of hardware and software to enable the remote access to tools or information that typically reside on a network of IT devices.

7. Difference between Client Mail and Web Mail? Email clients download your emails onto your computer. Using a specialized email program such as Outlook Express or Apple Mail has the advantage of giving you complete control over your email; every email you receive is placed on your computer and you can keep as many large file attachments as you want. Checking your email through our webmail is similar to using Hotmail or Yahoo! Mail. You never actually copy your messages to your computer; in fact, you are looking at them through your web browser on somebody else"s computer. When you are not online, you are not able to see your email.

8. RAM and ROM random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.

Pronounced rahm, acronym for read-only memory, computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read. Unlike main memory (RAM), ROM retains its contents even when the computer is turned off. ROM is referred to as being nonvolatile, whereas RAM is volatile.

9. Spamguard Spam Guard is an Outlook add-in that filters email that arrives in your inbox. If the sender of any message cannot be identified then the message is moved into a spam quarantine folder. Messages deposited in the spam quarantine folder can be inspected and either deleted or approved at your leisure.

10. Firewall and Antivirus A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Antivirus is a software program which helps protect a computer against being infected by a virus.

11. DNS Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they"re easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4.

12. IPConfig IPConfig is a command line tool used to control the network connections on Windows NT/2000/XP machines. There are three main commands: "all", "release", and "renew". IPConfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, IPConfig displays the IP address, subnet mask, and default gateway for all adapters.

13. Trace route Trace route is the program that shows you the route over the network between two systems, listing

all the intermediate routers a connection must pass through to get to its destination. It can help you determine why your connections to a given server might be poor, and can often help you figure out where exactly the problem is. It also shows you how systems are connected to each other, letting you see how your ISP connects to the Internet as well as how the target system is connected.

Please find the technical questions: 1) What is IP Address ? 2) What are the layers of network ? 3) What are the different types of network ? 4) What is networking ? 5) What is the difference between OSI and TCP/IP Model ? 6) What is TCP/IP ? 7) What is HTTP? 8) What is Protocol ? 9) What is communication medium ? 10) What is PORT ? 11) What is SOCKET ? 12) What is the difference between PORT and SOCKET? 13) What is wireless networking ? 14) What is topology ? 15) What are the different types of topology ? 16) What is the size of IP Address? 17) What is FTP ? 18) What is SMTP ? 19) What are the different types of protocol ?

20) What is Dial-Up connection ? 21) What is Broad Band Connection? 22) What is the difference between Dial-up and broad band connection? 23) What IEEE standard for wireless networking? Ans: 802.11g 24) What is IEEE standard ? Ans: Institute of electrical and electronic engineer.They develop standard for networkin

Basic information on Active Directory, DNS, DHCP, RAID
DNS:A Domain Naming server is a hierarchical namespace structure designed to provide host to IP address name resolution and registration. DNS ZONE TYPE: Forward lookup zone: resolves names to IP address. Reverse lookup zone: resolves IP addresses to Host names. AD INTEGRATED ZONE AD–integrated DNS enables AD storage and replication of DNS zone databases. Windows 2000 & 2003 DNS servers which accommodates storing zone data in AD. When you configure a computer as a DNS server, zones are usually stored as text files on name servers — that is, all of the zones required by DNS are stored in a text file on the server computer. These text files must be synchronized among DNS name servers by using a system that requires a separate replication topology and schedule called a zone transfer However, if you use AD integrated DNS you configure a domain controller as a DNS name server, zone data is stored as an AD object and is replicated as part of domain replication. STUB ZONE A Stub zone is a read only copy of a zone that contains only those resources records necessary to identify the authoritative DNS servers for the actual zone. A stub zone is used to keep a parent zone aware of authoritative DNS servers for a delegated zone and thereby maintain DNS name resolution efficiently. A stub zone is conposed of (A), (NS), (SOA)

Types of DNS Records: -

A(Host): Represents a computer or device on the network. 'A'records are the most common and most used DNS records. PTR(Pointer): Used for finding the DNS name that corresponds to an IP address. The PTR is found only in the reverse lookup zone. NS(NameServer): The NS RRs facilitate delegation by identifying DNS servers for each zone. They appear in all forward and reverse look-up zones. SOA(Start Of Authority): The first record in any zone file is a SOA. the SOA identifies a primary DNS name server for the zone as the best source of information for the data within that zone and as an entity processing the updates for the zone. SRV(Service Record): Indicates a network service offered by a host.- CNAME(Alias):an alias is hostname that refers to another hostname. ========================================= DHCP: Is a standard for simplifing management of host IP configuration. SUPERSCOPE: Superscope is a administrative feature of DHCP server that you can create and manage through the DHCP console. Using a Superscope you can group multiple scopes as a single administrative entity. DHCP Authorize: This procedure is usually only needed if you are running a DHCP server on a member server. In most cases, if you are installing a DHCP server on a computer also running as a domain controller, the server is automatically authorized the first time you add the server to the DHCP console. SCOPE: DHCP scope is a poole of IP addresses which are offered to DHCP clients. ========================================= WHAT ARE FSMO ROLES IN ACTIVE DIRECTORY? Windows 2000 and Windows 2003 Active directory follow the multimaster model. Under this model there are five roles which which can be held by the DCs (Domian Controllers). The five roles are given below: • Schema Master: The schema master domain controller controls all updates and modifications to the schema. To update the schema of a forest, you must have access to the schema master. There can be only one schema master in the whole forest. • Domain naming master: The domain naming master domain controller controls the addition or removal of domains in the forest. There can be only one domain naming master in the whole forest. • Infrastructure Master: The infrastructure is responsible for updating references from objects in its

domain to objects in other domains. At any one time, there can be only one domain controller acting as the infrastructure master in each domain. • Relative ID (RID) Master: The RID master is responsible for processing RID pool requests from all domain controllers in a particular domain. At any one time, there can be only one domain controller acting as the RID master in the domain. • PDC Emulator: The PDC emulator is a domain controller that advertises itself as the primary domain controller (PDC) to workstations, member servers, and domain controllers that are running earlier versions of Windows. For example, if the domain contains computers that are not running Microsoft Windows XP Professional or Microsoft Windows 2000 client software, or if it contains Microsoft Windows NT backup domain controllers, the PDC emulator master acts as a Windows NT PDC. It is also the Domain Master Browser, and it handles password discrepancies. At any one time, there can be only one domain controller acting as the PDC emulator master in each domain in the forest.

What is replication in active directory? REPLICATION Replication is a process of sending update information for data that has changed in the directory to other domain controllers, as a Part of the AD planning an implementation process.*2000/2003 uses MULTI-MASTER replication for the AD. Types of UPDATES which force replication: Add, Modify, ModifyDN, delete USN: Update sequence numbers GUID: Globally unique identifier

REPLICATION PARTITIONS: Schema Partition: contains object and attribute definitions. In other words it contains a list of definitions that define what objects and attributes for those objects can exist in the AD. Configuration partition: contains information about the physical structure of the AD, such as the sites and domains and where DC resides in the enterprise. It is replicated to all DC's in the tree or forest. Domain partition: contains information about all AD objects that are specific to that domain, such as users, groups and other resources. All domain partition information is completely replicated to all domain controllers within the domain.

REPLICATION TOPOLOGY KCC: Knowledge Consistency Checker: It builds the topology for the intrasite replication between the DCs. It uses only RPC to communicate with the directory service. Bridgehead server: A point where a replication information leaves or enters a site for intersite replication. BENIFITS • Optimize replication for speed and bandwidth consumption between domain controllers.• Locate

the closest domain controller for client logon, services, and directory searches. • Direct a Distributed File System (DFS) client to the server that is hosting the requested data within the site. • Replicate the system volume (SYSVOL), a collection of folders in the file system that exists on each domain controller in a domain and is required for implementation of Group Policy ============================================================= What is RAID? ANS: Redundant Array of Inexpensive disk is a way to increase capaxity, performance and reliablility. RAID0: (Striping) Not really RAID as it has no fault tolerance, Data is striped across all disks, Excelent read/write performance. RAID1: (Mirroring) Need at least 2 drives, tolerates single drive failure, often used for OS drive or boot volume. RAID5: Requires at least 3 drives, data and parity striped across all disks, can tolerate failure of any one disk without losing data but performance does degrade. TCP/IP MODEL: Application Layer Transport Layer Internet Network Interface OSI MODEL Application Layer Presentation layer Session layer Transport Layer Network Layer Data-link Layer Physical layer

What is a switch? A network switch, or bridge, is a specialized device that connects multiple network segments. It's a more modern and efficient form of the ubiquitous (and outdated) network hub. A hub, also known as a repeater, is a simple device that has been used for years to connect all nodes, or computers, on a network to a central location. Each node on a network has a unique hardware address called a MAC address. A hub is known as a repeater because when a packet of data, or frame, is sent through the hub, it is repeated to each and every computer on the network.This means that if a 1 GB video is sent to one computer through the hub, the file will also be sent to all of the other computers on the hub. This is very inefficient for bandwidth management. "Hubs have two major drawbacks," says Ben deGonzague, a deployment engineer with TopCoder Software, a Glastonbury, Conn.-based software engineering firm. "First, network bandwidth is consumed as each and every frame is sent to all

devices on a network. Second, your network is only as fast as the slowest device. Hubs have become obsolete with switching-based networks."A switch-based network is one that utilizes switches instead of hubs. A switch is a major upgrade to a hub. Instead of sending all network data to each and every network node, the switch will analyze the MAC address and determine where to send the data. Network bandwidth is not wasted by sending every frame to every port.So when a switch receives data for a file, if it was addressed to one computer it will only be sent there. The other computers on the network wouldn't know about it. This means that the network is now much more efficient, but it's also a step toward being more secure: "Since switches can segregate traffic from different nodes," says deGonzague, "this makes it more difficult for anyone to capture packets on your network.

What is a router? While switches connect multiple computers, a router is required to connect multiple networks, like your LAN to the Internet. Routers work by storing large tables of networks and addresses, then using algorithms to determine the shortest routes to individual addresses within those networks. In this way efficient routers not only facilitate intra-network communications, but also play a role in overall network performance. delivering the information faster.While many consumers are familiar with small routers from companies like Linksys, which can be purchased for less than $50 at computer hardware stores, they shouldn't be confused with a proper router for business. "A typical router at home will connect your cable modem or DSL network to your internal network. This is just connecting two different networks. Routers for businesses on the other hand might have to connect several different networks," says deGonzague. Small business routers from vendors like Cisco often include management software, enabling IT staff to better manage network stability and, ultimately, performance.

How to Become a Desktop Engineer
Interview Questions ================ A) Tell me something about yourself. Tell about your eductaion, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds.

B) Technical Questions:

1) What is Active Directory? A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administor users, computers and printers in the network from active directory.

2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records? DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request. Forward lookup: Converting names to IP address is called forward lookup. Reverse lookup: Resolving IP address to names is called reverse lookup. 'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name. 'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS. For in depth learning of DNS, please download, extract and watch the videos available here.

3) What is DHCP? Why it is used? What are scopes and super scopes? DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy. Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network. Superscope: When we combine two or more scopes together its called super scope.

4) What are the types of LAN cables used? What is a cross cable? Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed. Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable? The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable. The theoritical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.

6) What would you use to connect two computers without using switches? Cross cable. 7) What is IPCONFIG command? Why it is used? IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.

8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available? When DHCP server is not available the Windows client computer assignes an automatic IP address to itself so that it can communicate with the network cmputers. This ip address is called APIPA. ITs in the range of 169.254.X.X. APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.

9) What is a DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administor computers and we can govern them using common policies called group policies. We can't do the same with workgroup.

10) Do you know how to configure outlook 2000 and outlook 2003 for a user? Please visit the link below to find out how to configure outlook 2000 and outlook 2003.http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp

11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express? PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express useds odb file.

12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it? BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problemis with one of the devices or drivers.

13) What is RIS? What is Imaging/ghosting? RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS everytime using a CD can be a very time consuming task. So to save that

time we can go for RIS/Ghosting/imaging.

14) What is VPN and how to configure it? VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the stepsmentioned in the KB:http://support.microsoft.com/kb/305550 15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue? Update the network card driver.

16) Your system is infected with Virus? How to recover the data? Install another system. Insall the OS with the lates pathces, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.

17) How to join a system to the domain? What type of user can add a system to the domain? Please visit the article below and read "Adding the Workstation to the Domain" http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirec tory/stepbystep/domxppro.mspx

18) What is the difference between a switch and a hub? Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.

19) What is a router? Why we use it? Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.

20) What are manageable and non manageable switches? Switches which can be administered are calledmanageable switches. For example we can create VLAN for on such switch. On no manageable swiches we can't do so.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close