Professional Documents
Culture Documents
1) Define BIOS?
Ans) Basic Input/Output System is the program which starts up your computer and
communicates between the devices in your computer (such as your hard drive and
graphics card) and the system. BIOS is normally stored in an EPROM chip (Erasable
Programmable Read Only Memory).
Ans) Device Manager is an OS feature that lets you view and change the properties of all
devices attached to your computer.
To get to the device manager in Windows, right click on my computer icon, choose
properties, and then click on the device manager tab. From there you can select a variety
of management options.
3) What is a virus?
Ans) A program or a piece of code that is loaded onto our computer without our
knowledge and runs against our wishes. Viruses can also replicate themselves. All
computer viruses are manmade. A simple virus that can make a copy of itself over and
over again is relatively easy to produce. Even such a simple virus is dangerous because
it will quickly use all available memory and bring the system to a halt. An even more
dangerous type of virus is one capable of transmitting itself across networks and
bypassing security systems.
Ans) Temporary Internet Files are, in fact, the cache of the Internet Explorer. This means
that when you load a web page with Internet Explorer, it is saved on your computer so
that if you later decide to open the same page again, it will open a lot faster. Temporary
Internet Files improve speed of web browsing and also make possible so called offline
browsing, which gives you the ability to open the web pages from cache even when you
are not connected to the Internet.
Despite all these positive things about Temporary Internet Files, they have one big
drawback: they compromise your privacy. Everyone with access to your computer can
look into your Temporary Internet Files folder and see the sites that you have visited in
the past. You can manually delete the contents of Temporary Internet Files folder
1. Start Internet Explorer and click Tools menu, then select Internet Options... from
this menu. This will open the Internet Options window.
2. Click General tab and then find in the section Temporary Internet Files the button
Delete Files... and click it. A new dialog box opens.
3. In the Delete Files dialog box, click to select the Delete all offline content check
box if you want to delete all Web page content that you have made available offline.
4. Click OK to delete the files. Note that if you are doing this for the first time, the
deleting can take a large amount of time, so be patient.
Ans) A message given to a Web browser by a Web server. The browser stores the
message in a text file. The message is then sent back to the server each time the
browser requests a page from the server.
The main purpose of cookies is to identify users and possibly prepare customized Web
pages for them. When you enter a Web site using cookies, you may be asked to fill out a
form providing such information as your name and interests. This information is
packaged into a cookie and sent to your Web browser which stores it for later use. The
next time you go to the same Web site, your browser will send the cookie to the Web
server. The server can use this information to present you with custom Web pages. So,
for example, instead of seeing just a generic welcome page you might see a welcome
page with your name on it.
Ans) Infrared technology is what most TV remotes use. The distance an infrared signal
can travel varies based on the strength of the remote, but is usually less than 50 feet for
household electronics. In order for an infrared signal to be detected, there must be a
direct line of sight between the transmitter (remote) and the receiver (TV). If there is a
wall or large object between them, the signal will not pass through it.
Bluetooth, on the other hand, uses a radio frequency, which allows transmission
through walls and other objects. The standard range of a Class 3 Bluetooth device is
about 30 ft., which makes it ideal for syncing PDAs with computers, using wireless cell
phone headsets, and enabling hands free cell phone use inside Bluetooth-enabled
automobiles. Because Bluetooth technology is based on a standard 2.4 GHz frequency,
different Bluetooth devices can typically communicate with each other, regardless of the
manufacturer. Most infrared devices only work with proprietary equipment.
While Bluetooth is well on its way to replacing infrared in many different areas, the
technology is not meant to be used for wireless networking. Instead, Wi-Fi technology,
which has a larger range and higher bandwidth than Bluetooth, is the standard that most
wireless networking equipment uses.
Ans) In computing, a file system is a method for storing and organizing computer files
and the data they contain to make it easy to find and access them. File systems may use
a storage device such as a hard disk or CD-ROM and involve maintaining the physical
location of the files
8) TCP/IP
9) Modem
Ans) A device that allows computers to exchange data over phone lines.
Short for modulator/demodulator. A communications device that converts one form of a
signal to another that is suitable for transmission over communication circuits, typically
from digital to analog and then from analog to digital.
10) Internet
Ans) A network of computer networks which operates world-wide using a common set of
communications protocols.
11) WWW
Ans) A program used to change some setting in the operating system or computer.
Control panels allow for changing keyboard and mouse sensitivity, speaker volume,
display colors and resolution as well as modem, network and printer settings. Control
panels are part of most operating systems, but also come with peripheral devices to
allow fine tuning of particular features.
13)What is Arpanet ?
The Advanced Research Projects Agency Network (ARPANET) developed by ARPA of the
United States Department of Defense was the world's first operational packet switching
network, and the predecessor of the global Internet.
Packet switching, now the dominant basis for both data and voice communication
worldwide, was a new and important concept in data communications. Previously, data
communications was based on the idea of circuit switching, as in the old typical telephone
circuit, where a dedicated circuit is tied up for the duration of the call and communication
is only possible with the single party on the other end of the circuit.
With packet switching, a system could use one communication link to communicate with
more than one machine by assembling data into packets. Not only could the link be shared
(much as a single mail person can be used to post letters to different destinations), but
each packet could be routed independently of other packets. This was a major
advancement.
Without further qualification, search engine usually refers to a Web search engine, which
searches for information on the public Web. Other kinds of search engine are enterprise
search engines, which search on intranets, personal search engines, and mobile search
engines. Different selection and relevance criteria may apply in different environments, or
for different uses.
Some search engines also mine data available in newsgroups, databases, or open
directories. Unlike Web directories, which are maintained by human editors, search
engines operate algorithmically or are a mixture of algorthmic and human input.
A computer that is responsible for accepting HTTP requests from clients, which are known
as Web browsers, and serving them HTTP responses along with optional data contents,
which usually are Web pages such as HTML documents and linked objects (images, etc.).
A web browser is a software application that enables a user to display and interact with
text, images, and other information typically located on a web page at a website on the
World Wide Web or a local area network. Text and images on a web page can contain
hyperlinks to other web pages at the same or different website. Web browsers allow a user
to quickly and easily access information provided on many web pages at many websites
by traversing these links. Web browsers format HTML information for display, so the
appearance of a web page may differ between browsers.
Some of the web browsers available for personal computers include Internet Explorer,
Mozilla Firefox, Safari, Opera, and Netscape in order of descending popularity (as of
August 2006). Web browsers are the most commonly used type of HTTP user agent.
Although browsers are typically used to access the World Wide Web, they can also be
used to access information provided by web servers in private networks or content in file
systems.
IP addresses can appear to be shared by multiple client devices either because they are
part of a shared hosting web server environment or because a proxy server (e.g., an ISP or
anonymizer service) acts as an intermediary agent on behalf of its customers, in which
case the real originating IP addresses might be hidden from the server receiving a request.
The analogy to telephone systems would be the use of predial numbers (proxy) and
extensions (shared).
IP addresses are managed and created by the Internet Assigned Numbers Authority
(IANA). The IANA generally allocates super-blocks to Regional Internet Registries, who in
turn allocate smaller blocks to Internet service providers and enterprises.
Each instance of the client software can send data requests to one or more connected
servers. In turn, the servers can accept these requests, process them, and return the
requested information to the client. Although this concept can be applied for a variety of
reasons to many different kinds of applications, the architecture remains fundamentally
the same.
These days, clients are most often web browsers, although that has not always been the
case. Servers typically include web servers, database servers and mail servers.
The interaction between client and server is often described using sequence diagrams.
Sequence diagrams are standardized in the UML.
On the Internet, the Domain Name System (DNS) associates various sorts of information
with so-called domain names; most importantly, it serves as the "phone book" for the
Internet: it translates human-readable computer hostnames, e.g. en.wikipedia.org, into the
IP addresses that networking equipment needs for delivering information. It also stores
other information such as the list of mail exchange servers that accept e-mail for a given
domain. In providing a worldwide keyword-based redirection service, DNS is an essential
component of contemporary Internet use.
(A proxy server that passes all requests and replies unmodified is not called a proxy
server. It is a gateway.)
A proxy server can be placed in the user's local computer, or at specific key points
between the user and the destination servers or the Internet.
Uniform Resource Locator' (URL) is a technical, Web-related term used in two distinct
meanings:
|- their defining |} characteristic. Nevertheless, by the time the RFC 1630 formally defined
the term "URI" as a generic term best suited to the concept, the term "URL" had gained
widespread popularity, which has continued to this day.
HTML, short for Hypertext Markup Language, is the predominant markup language for the
creation of web pages. It provides a means to describe the structure of text-based
information in a document — by denoting certain text as headings, paragraphs, lists, and
so on — and to supplement that text with interactive forms, embedded images, and other
objects. HTML is written in the form of labels (known as tags), surrounded by less-than (<)
and greater-than signs (>). HTML can also describe, to some degree, the appearance and
semantics of a document, and can include embedded scripting language code which can
affect the behavior of web browsers and other HTML processors.
HTML is also often used to refer to content of the MIME type text/html or even more
broadly as a generic term for HTML whether in its XML-descended form (such as XHTML
1.0 and later) or its form descended directly from SGML (such as HTML 4.01 and earlier).
29)What is a VPN ?
A virtual private network (VPN) is a private data network that makes use of the public
telecommunication infrastructure, maintaining privacy through the use of a tunneling
protocol and security procedures. The idea of the VPN is to give the company the same
capabilities at much lower cost by using the shared public infrastructure rather than a
private one.
30) What is a broad band and a Dial-up internet connection? What is the difference
between the two?
Broad band is a type of data transmission in which a single medium (wire) can carry
several channels at once. Cable TV, for example, uses broadband transmission. In
contrast, baseband transmission allows only one signal at a time.
Dialup access is a way of connecting a computer to the Internet using a modem and the
telephone line. It is rather slow and blocks the telephone line. It Refers to connecting a
device to a network via a modem and a public telephone network. Dial-up access is really
just like a phone connection, except that the parties at the two ends are computer devices
rather than people. Because dial-up access uses normal telephone lines, the quality of the
connection is not always good and data rates are limited. In the past, the maximum data
rate with dial-up access was 56 Kbps (56,000 bits per second), but new technologies such
as ISDN are providing faster rates.
Software package used to view pages on the World Wide Web (including Netscape
Navigator, Microsoft Internet Explorer and Mosaic).
Mosaic is a web browser (client) for the World Wide Web written at the National Center for
Supercomputing Applications (NCSA). Its development began in 1992 and officially ceased
on January 7, 1997.
Voice over Internet Protocol. The technology used to transmit voice conversations over a
data network using the Internet Protocol. Such data network may be the Internet or a
corporate Intranet.
34) How do we change the system password?
It can be changed only if the user logs in with the administrator privilege. At the contral
panel the “user control” has to be used and upon entering the old password the new
password can be entered.
The 404 or Not Found error message is an HTTP standard response code indicating that
the client was able to communicate with the server but either the server could not find
what was requested, or it was configured not to fulfill the request and not reveal the
reason why. 404 errors should not be confused with "server not found" or similar errors,
in which a connection to the destination server cannot be made at all.
Firstly we need to check the HTTP status code displayed in the error page and cat
accordingly. Verify for physical connections. Delete cookies and temporary internet files.
Delete cache. Verify firewall settings and deactivate undesired restrictions.