You are on page 1of 9

Technical Questions

1) Define BIOS?

Ans) Basic Input/Output System is the program which starts up your computer and
communicates between the devices in your computer (such as your hard drive and
graphics card) and the system. BIOS is normally stored in an EPROM chip (Erasable
Programmable Read Only Memory).

2) What is Device Manager?

Ans) Device Manager is an OS feature that lets you view and change the properties of all
devices attached to your computer.
To get to the device manager in Windows, right click on my computer icon, choose
properties, and then click on the device manager tab. From there you can select a variety
of management options.

3) What is a virus?

Ans) A program or a piece of code that is loaded onto our computer without our
knowledge and runs against our wishes. Viruses can also replicate themselves. All
computer viruses are manmade. A simple virus that can make a copy of itself over and
over again is relatively easy to produce. Even such a simple virus is dangerous because
it will quickly use all available memory and bring the system to a halt. An even more
dangerous type of virus is one capable of transmitting itself across networks and
bypassing security systems.

4) What are Temporary Internet Files?

Ans) Temporary Internet Files are, in fact, the cache of the Internet Explorer. This means
that when you load a web page with Internet Explorer, it is saved on your computer so
that if you later decide to open the same page again, it will open a lot faster. Temporary
Internet Files improve speed of web browsing and also make possible so called offline
browsing, which gives you the ability to open the web pages from cache even when you
are not connected to the Internet.
Despite all these positive things about Temporary Internet Files, they have one big
drawback: they compromise your privacy. Everyone with access to your computer can
look into your Temporary Internet Files folder and see the sites that you have visited in
the past. You can manually delete the contents of Temporary Internet Files folder

Windows XP or Windows 2000 -- C:\Documents and Settings\<username>\Local


Settings\Temporary Internet Files\

Windows Me, Windows 98, Windows NT or Windows 95 -- C:\Windows\Temporary


Internet Files\
C:\Windows\Profiles\<username>\Temporary Internet Files\

How to delete Temporary Internet Files?


To delete Temporary Internet Files manually, do the following things:

1. Start Internet Explorer and click Tools menu, then select Internet Options... from
this menu. This will open the Internet Options window.
2. Click General tab and then find in the section Temporary Internet Files the button
Delete Files... and click it. A new dialog box opens.
3. In the Delete Files dialog box, click to select the Delete all offline content check
box if you want to delete all Web page content that you have made available offline.
4. Click OK to delete the files. Note that if you are doing this for the first time, the
deleting can take a large amount of time, so be patient.

5) What are Cookies?

Ans) A message given to a Web browser by a Web server. The browser stores the
message in a text file. The message is then sent back to the server each time the
browser requests a page from the server.

The main purpose of cookies is to identify users and possibly prepare customized Web
pages for them. When you enter a Web site using cookies, you may be asked to fill out a
form providing such information as your name and interests. This information is
packaged into a cookie and sent to your Web browser which stores it for later use. The
next time you go to the same Web site, your browser will send the cookie to the Web
server. The server can use this information to present you with custom Web pages. So,
for example, instead of seeing just a generic welcome page you might see a welcome
page with your name on it.

6) Bluetooth and Infrared

Ans) Infrared technology is what most TV remotes use. The distance an infrared signal
can travel varies based on the strength of the remote, but is usually less than 50 feet for
household electronics. In order for an infrared signal to be detected, there must be a
direct line of sight between the transmitter (remote) and the receiver (TV). If there is a
wall or large object between them, the signal will not pass through it.

Bluetooth, on the other hand, uses a radio frequency, which allows transmission
through walls and other objects. The standard range of a Class 3 Bluetooth device is
about 30 ft., which makes it ideal for syncing PDAs with computers, using wireless cell
phone headsets, and enabling hands free cell phone use inside Bluetooth-enabled
automobiles. Because Bluetooth technology is based on a standard 2.4 GHz frequency,
different Bluetooth devices can typically communicate with each other, regardless of the
manufacturer. Most infrared devices only work with proprietary equipment.

While Bluetooth is well on its way to replacing infrared in many different areas, the
technology is not meant to be used for wireless networking. Instead, Wi-Fi technology,
which has a larger range and higher bandwidth than Bluetooth, is the standard that most
wireless networking equipment uses.

7) Windows file system in all OS

Ans) In computing, a file system is a method for storing and organizing computer files
and the data they contain to make it easy to find and access them. File systems may use
a storage device such as a hard disk or CD-ROM and involve maintaining the physical
location of the files

8) TCP/IP

Ans) "Transmission control protocol/Internet protocol." TCP/IP is a combined set of


protocols that perform the transfers of data between two computers.
Communication protocol used on the Internet.
(Transmission Control Protocol/Internet Protocol) - A set of rules that establish the
method with which data is transmitted over the Internet between two computers.
Transmission Control Protocol/Internet Protocol. A group of protocols that specify how
computers communicate over the Internet. All computers on the Internet need TCP/IP
software.
TCP/IP is the standard communications protocol (language) required for computers on
the Internet.

9) Modem

Ans) A device that allows computers to exchange data over phone lines.
Short for modulator/demodulator. A communications device that converts one form of a
signal to another that is suitable for transmission over communication circuits, typically
from digital to analog and then from analog to digital.

10) Internet

Ans) A network of computer networks which operates world-wide using a common set of
communications protocols.

11) WWW

Ans) An acronym which stands for "World Wide Web".


Computer network consisting of a collection of internet sites that offer text and
graphics and sound and animation resources through the hypertext transfer protocol

12) Control Panel

Ans) A program used to change some setting in the operating system or computer.
Control panels allow for changing keyboard and mouse sensitivity, speaker volume,
display colors and resolution as well as modem, network and printer settings. Control
panels are part of most operating systems, but also come with peripheral devices to
allow fine tuning of particular features.

13)What is Arpanet ?

The Advanced Research Projects Agency Network (ARPANET) developed by ARPA of the
United States Department of Defense was the world's first operational packet switching
network, and the predecessor of the global Internet.

Packet switching, now the dominant basis for both data and voice communication
worldwide, was a new and important concept in data communications. Previously, data
communications was based on the idea of circuit switching, as in the old typical telephone
circuit, where a dedicated circuit is tied up for the duration of the call and communication
is only possible with the single party on the other end of the circuit.

With packet switching, a system could use one communication link to communicate with
more than one machine by assembling data into packets. Not only could the link be shared
(much as a single mail person can be used to post letters to different destinations), but
each packet could be routed independently of other packets. This was a major
advancement.

14) What is Search Engine ?

A search engine is an information retrieval system designed to help find information


stored on a computer system, such as on the World Wide Web, inside a corporate or
proprietary network, or in a personal computer. The search engine allows one to ask for
content meeting specific criteria (typically those containing a given word or phrase) and
retrieves a list of items that match those criteria. This list is often sorted with respect to
some measure of relevance of the results. Search engines use regularly updated indexes
to operate quickly and efficiently.

Without further qualification, search engine usually refers to a Web search engine, which
searches for information on the public Web. Other kinds of search engine are enterprise
search engines, which search on intranets, personal search engines, and mobile search
engines. Different selection and relevance criteria may apply in different environments, or
for different uses.

Some search engines also mine data available in newsgroups, databases, or open
directories. Unlike Web directories, which are maintained by human editors, search
engines operate algorithmically or are a mixture of algorthmic and human input.

15) What is FireWall ?

A firewall is an information technology (IT) security device which is configured to permit,


deny or proxy data connections set and configured by the organization's security policy.
Firewalls can either be hardware and/or software based.

16) What is Web Server ?

A computer that is responsible for accepting HTTP requests from clients, which are known
as Web browsers, and serving them HTTP responses along with optional data contents,
which usually are Web pages such as HTML documents and linked objects (images, etc.).

17) What is Web Browser ?

A web browser is a software application that enables a user to display and interact with
text, images, and other information typically located on a web page at a website on the
World Wide Web or a local area network. Text and images on a web page can contain
hyperlinks to other web pages at the same or different website. Web browsers allow a user
to quickly and easily access information provided on many web pages at many websites
by traversing these links. Web browsers format HTML information for display, so the
appearance of a web page may differ between browsers.

Some of the web browsers available for personal computers include Internet Explorer,
Mozilla Firefox, Safari, Opera, and Netscape in order of descending popularity (as of
August 2006). Web browsers are the most commonly used type of HTTP user agent.
Although browsers are typically used to access the World Wide Web, they can also be
used to access information provided by web servers in private networks or content in file
systems.

18) What is IP Address ?

An IP address (Internet Protocol address) is a unique address that certain electronic


devices use in order to identify and communicate with each other on a computer network
utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address. Any
participating network device—including routers, computers, time-servers, printers,
Internet fax machines, and some telephones—can have their own unique address.

An IP address can also be thought of as the equivalent of a street address or a phone


number (compare: VoIP (voice over (the) internet protocol)) for a computer or other
network device on the Internet. Just as each street address and phone number uniquely
identifies a building or telephone, an IP address can uniquely identify a specific computer
or other network device on a network.

IP addresses can appear to be shared by multiple client devices either because they are
part of a shared hosting web server environment or because a proxy server (e.g., an ISP or
anonymizer service) acts as an intermediary agent on behalf of its customers, in which
case the real originating IP addresses might be hidden from the server receiving a request.
The analogy to telephone systems would be the use of predial numbers (proxy) and
extensions (shared).

IP addresses are managed and created by the Internet Assigned Numbers Authority
(IANA). The IANA generally allocates super-blocks to Regional Internet Registries, who in
turn allocate smaller blocks to Internet service providers and enterprises.

19) What is Client Server ?

Client-server is computing architecture which separates a client from a server, and is


almost always implemented over a computer network. Each client or server connected to a
network can also be referred to as a node. The most basic type of client-server
architecture employs only two types of nodes: clients and servers. This type of
architecture is sometimes referred to as two-tier.

Each instance of the client software can send data requests to one or more connected
servers. In turn, the servers can accept these requests, process them, and return the
requested information to the client. Although this concept can be applied for a variety of
reasons to many different kinds of applications, the architecture remains fundamentally
the same.

These days, clients are most often web browsers, although that has not always been the
case. Servers typically include web servers, database servers and mail servers.
The interaction between client and server is often described using sequence diagrams.
Sequence diagrams are standardized in the UML.

20) What is domain name system ?

On the Internet, the Domain Name System (DNS) associates various sorts of information
with so-called domain names; most importantly, it serves as the "phone book" for the
Internet: it translates human-readable computer hostnames, e.g. en.wikipedia.org, into the
IP addresses that networking equipment needs for delivering information. It also stores
other information such as the list of mail exchange servers that accept e-mail for a given
domain. In providing a worldwide keyword-based redirection service, DNS is an essential
component of contemporary Internet use.

21) What is Proxy Server ?

In computer networks, a proxy server is a server (a computer system or an application


program) which services the requests of its clients by making requests to other servers. A
client connects to the proxy server, requesting a file, connection, web page, or other
resource available from a different server. A proxy server provides the resource by
connecting to the specified server, with some exceptions: A proxy server may alter the
client's request or the server's response. A proxy server may service the request without
contacting the specified server.

(A proxy server that passes all requests and replies unmodified is not called a proxy
server. It is a gateway.)

A proxy server can be placed in the user's local computer, or at specific key points
between the user and the destination servers or the Internet.

22) What is URL ?

Uniform Resource Locator' (URL) is a technical, Web-related term used in two distinct
meanings:

• In popular usage, it is a widespread synonym for Uniform Resource Identifier (URI)


— many popular and technical texts will use the term "URL" when referring to URI;
• Strictly, the idea of a uniform syntax for global identifiers of network-retrievable
documents was the core idea of the World Wide Web. In the early times, these
identifiers were variously called "document names", "Web addresses" and
"Uniform Resource Locators". These names were misleading, however, because
not all identifiers were locators, and even for those that were, this was not {|
class="wikitable"

|- their defining |} characteristic. Nevertheless, by the time the RFC 1630 formally defined
the term "URI" as a generic term best suited to the concept, the term "URL" had gained
widespread popularity, which has continued to this day.

23) What is MainFrame?

Mainframe may refer to one of the following:

• Mainframe computer, large data processing systems


• Mainframe Entertainment, a Canadian computer animation and design company.
o Mainframe is the city that the CGI cartoon ReBoot takes place in.
• Mainframe (band), a 1980s Electropop band
• Mainframe is the name of two fictional characters from Marvel Comics
o Mainframe (comics) appears in the series A-Next
o Mainframe appears in the Guardians of the Galaxy series
• An Autobot character in the Transformers series.
• A character in the G.I. Joe universe.
• A character from the game Gunman Chronicles.
• Computer games originally played on Mainframe type computers

24) What are the types of Domain Name Sytem ?

i) Generic domain name sytem-.com,.org

ii) Country domain name system-.in,.us

26) Difference between internet and intranet ?

An intranet is a private computer network that uses Internet protocols, network


connectivity to securely share part of an organization's information or operations with its
employees. Sometimes the term refers only to the most visible service, the internal
website. The same concepts and technologies of the Internet such as clients and servers
running on the Internet protocol suite are used to build an intranet. HTTP and other
Internet protocols are commonly used as well, FTP.There is often an attempt to use
Internet technologies to provide new interfaces with corporate 'legacy' data and
information systems.

The Internet is a worldwide, publicly accessible network of interconnected computer


networks that transmit data by packet switching using the standard Internet Protocol (IP).
It is a "network of networks" that consists of millions of smaller domestic, academic,
business, and government networks, which together carry various information and
services, such as electronic mail, online chat, file transfer, and the interlinked web pages
and other documents of the world wide web.

27) Classes of IP Address ?

Class A-0.0.0.0 to 127.255.255.255

Class B-128.0.0.0 to 191.255.255.255

Class C-192.0.0.0 to 223.255.255.255

Class D-224.0.0.0 to 239.255.255.255

Class E-240.0.0.0 to 247.255.255.255

28) What is HTML ?

HTML, short for Hypertext Markup Language, is the predominant markup language for the
creation of web pages. It provides a means to describe the structure of text-based
information in a document — by denoting certain text as headings, paragraphs, lists, and
so on — and to supplement that text with interactive forms, embedded images, and other
objects. HTML is written in the form of labels (known as tags), surrounded by less-than (<)
and greater-than signs (>). HTML can also describe, to some degree, the appearance and
semantics of a document, and can include embedded scripting language code which can
affect the behavior of web browsers and other HTML processors.

HTML is also often used to refer to content of the MIME type text/html or even more
broadly as a generic term for HTML whether in its XML-descended form (such as XHTML
1.0 and later) or its form descended directly from SGML (such as HTML 4.01 and earlier).

29)What is a VPN ?

A virtual private network (VPN) is a private data network that makes use of the public
telecommunication infrastructure, maintaining privacy through the use of a tunneling
protocol and security procedures. The idea of the VPN is to give the company the same
capabilities at much lower cost by using the shared public infrastructure rather than a
private one.

30) What is a broad band and a Dial-up internet connection? What is the difference
between the two?

Broad band is a type of data transmission in which a single medium (wire) can carry
several channels at once. Cable TV, for example, uses broadband transmission. In
contrast, baseband transmission allows only one signal at a time.

Dialup access is a way of connecting a computer to the Internet using a modem and the
telephone line. It is rather slow and blocks the telephone line. It Refers to connecting a
device to a network via a modem and a public telephone network. Dial-up access is really
just like a phone connection, except that the parties at the two ends are computer devices
rather than people. Because dial-up access uses normal telephone lines, the quality of the
connection is not always good and data rates are limited. In the past, the maximum data
rate with dial-up access was 56 Kbps (56,000 bits per second), but new technologies such
as ISDN are providing faster rates.

31) Define an internet browser.

Software package used to view pages on the World Wide Web (including Netscape
Navigator, Microsoft Internet Explorer and Mosaic).

32) What is Mosaic ?

Mosaic is a web browser (client) for the World Wide Web written at the National Center for
Supercomputing Applications (NCSA). Its development began in 1992 and officially ceased
on January 7, 1997.

33) What is VOIP ?

Voice over Internet Protocol. The technology used to transmit voice conversations over a
data network using the Internet Protocol. Such data network may be the Internet or a
corporate Intranet.
34) How do we change the system password?

It can be changed only if the user logs in with the administrator privilege. At the contral
panel the “user control” has to be used and upon entering the old password the new
password can be entered.

35) How do we identify the version of the OS of the system ?

Right click on “My Computer” and select “properties”.

36) What is http 404 error?

The 404 or Not Found error message is an HTTP standard response code indicating that
the client was able to communicate with the server but either the server could not find
what was requested, or it was configured not to fulfill the request and not reveal the
reason why. 404 errors should not be confused with "server not found" or similar errors,
in which a connection to the destination server cannot be made at all.

37) What do you do when an internet page requested is not displayed?

Firstly we need to check the HTTP status code displayed in the error page and cat
accordingly. Verify for physical connections. Delete cookies and temporary internet files.
Delete cache. Verify firewall settings and deactivate undesired restrictions.

38) Standard user end HTTP error codes?

400 Bad Request


The request contains bad syntax or cannot be fulfilled.
401 Unauthorized
Similar to 403 Forbidden, but specifically for use when authentication is possible but has
failed or not yet been provided. See Basic access authentication and Digest access
authentication.
402 Payment Required
The original intention was that this code might be used as part of some form of digital
cash or micropayment scheme, but that has not happened, and this code has never been
used.
403 Forbidden
The request was a legal request, but the server is refusing to respond to it. Unlike a 401
Unauthorized response, authenticating will make no difference.
404 Not Found
405 Method Not Allowed
A request was made to a URL using a request method not supported by that URL; for
example, using GET on a form which requires data to be presented via POST, or using
PUT on a read-only resource
06 Not Acceptable
407 Proxy Authentication Required
408 Request Timeout
409 Conflict

You might also like