Type winmsd or msinfo32 in the command prompt, expand Software Environment and then select “Signed drivers“.
RAM (Random Access Memory): is used to temporarily store information that the computer is currently working on.
ROM (Read Only Memory): This is a Permanent type of memory storage used by computers for important data which never changes. (Example: BIOS)
In case one workstation on the network suffers a malfunction, it can bring down the entire network. Another drawback is that when there are adjustments and reconfigurations needed to be performed on a particular part of the network, the entire network has to be temporarily brought down as well.
Run> CMD> C:windowssystem32restorerstrui.exe
UAC stands for User Access Control. For more information read this article.
You get this error if either the USB drivers are not installed or the USB port(s) are not working properly.
The ‘?’ in Device Manager me that the device is not properly installed. It could also mean that the driver for a device is not installed.
Just plug the device in and it will be detected automatically even without restarting the computer.
We can boot up to the Recovery Console by using the windows XP CD to start up the computer and select then select the option “press R to repair the Windows XP Installation”.
Don’t make this question harder than it really is. Sometimes the interviewer will try to trip you up to test your common sense. Go for the obvious, rather than complicating the situation. In this case, simply trying to access the intranet from another workstation would help isolate the problem to the machine.
RJ45 connectors are used for LAN/Ethernet connections and RJ11 connectors are used for Telephone Cable connections.
Peer to peer are networks that does not reply on a server. All PCs on this network act as individual workstations.
Ping is a command that checks the connectivity with an IP address. For more read this article.
File trfer protocol.
Intel Pentium Quad Core, Intel I3, I5, I7 processors.
Reconfigure Norton Firewall to allow Internet Explorer to access the internet.
ACPI will be fully controlled by The operating system.
Multicast routing is a targeted form of broadcasting that sends message to a selected group of user, instead of sending it to all users on a subnet.
Ipconfig is a utility program that is commonly used to identify the addresses information of a computer on a network. It can show the physical address as well as the IP address.
Change the boot order in CMOS
CSMA/CD, or Collision Detect, retrmits data frames whenever a collision occurred. CSMA/CA, or Collision Avoidance, will first broadcast intent to send prior to data trmission.
A common way of dealing with such a problem is to use repeaters and hub, because it will help regenerate the signal and therefore prevent signal loss. Checking if cables are properly terminated is also a must.
Use FTP (File Trfer Protocol) for file trfers between such different servers. This is possible because FTP is platform independent.
LAN Cards, LAN Cables, Router/Hub
Select the “Adjust for best performance” option in the advanced system properties.
Internet Service Provider
When the first installation of Windows fails to boot for some reason, another copy of Windows is installed in the same drive but in a different directory (so that the customer can access to and backup his old data). This is called Parallel Installation of Windows.
Authentication is the process of verifying a user’s credentials before he can log into the network. It is normally performed using a username and password. This provides a secure me of limiting the access from unwanted intruders on the network.
The Windows MSCONFIG utility can be used to Clean Boot a PC.
A hub acts as a multiport repeater. However, as more and more devices connect to it, it would not be able to efficiently manage the volume of traffic that passes through it. A switch provides a better alternative that can improve the performance especially when high traffic volume is expected across all ports.
You can enable packet filtering in a Windows XP computer from the Advanced TCP/IP properties. Alternatively, you can also configure the Windows Firewall.
None of the above
CRT Monitors: The Monitor has a picture tube and uses a light-gun to highlight pixels on the screen.
LCD Monitors: These monitors do not have a picture tube and contain a layer of liquid crystals on an Electronic Board.
The following are the protocols under TCP/IP Application layer: FTP, TFTP, Telnet and SMTP.
A large percentage of a network is made up of hardware. Problems in these areas can range from malfunctioning hard drives, broken NICs and even hardware startups. Incorrectly hardware configuration is also one of those culprits to look into.
Boot into Safe Mode, Right-Click on the Old Profile Folder, Go to Security – Advanced and give Ownership to the new user.
Restart the Computer, Keep tapping on the F8 Key to go to the Windows Advanced Options Menu and select the option “Last Known Good Configuration” and hit the
Enable the Firewall
A straight-through cable is used to connect computers to a switch, hub or router. A crossover cable is used to connect two similar devices together, such as a PC to PC or Hub to hub.
Sneakernet is believed to be the earliest form of networking wherein data is physically trported using removable media, such as disk, tapes.
Device not installed.
The proper termination for unshielded twisted pair network cable is 100 ohms.
A Blue Screen of Death (or just a Blue Screen Error) is an indication of a Critical System Problem wherein the Computer freezes all together and does not respond to anything.
To rectify this problem, try Restarting the computer or Booting into Safe Mode. For more information, read this.
This question tests your ability to get the job done in the most efficient way possible. For example, you can create new accounts from scratch and assign the original rights to the accounts or you can simply rename the old account for the new user, which saves you a lot of time and effort.
A Device Driver (or just Driver) is a piece of software which is required to run every Hardware Component present in the computer.
An anti-virus program must be installed on all servers and workstations to ensure protection. That’s because individual users can access any workstation and introduce a computer virus when plugging in their removable hard drives or flash drives.