soundofheaven.info Laws COMPUTER HARDWARE AND NETWORKING INTERVIEW QUESTIONS AND ANSWERS PDF

Computer hardware and networking interview questions and answers pdf

Wednesday, May 1, 2019 admin Comments(0)

Common Interview Questions for Computer. Networking and Information Security Majors. Interviewing with companies for IT positions, whether large or small. This is a server that all computers on the local network have to go through before accessing information on the Internet. By using a proxy server, an organization. Networking Interview Questions updated on Apr At the lowest level, a network can consist of two or more computers directly soundofheaven.info of Users b. Type of transmission medium c. Hardware d. Software. 7. Three common redundancy methods are parity check, cyclic redundancy check (CRC), and checksum.


Author: SHERIE MCEACHRAN
Language: English, Spanish, Dutch
Country: Mauritania
Genre: Technology
Pages: 163
Published (Last): 21.06.2016
ISBN: 517-1-74378-484-4
ePub File Size: 20.39 MB
PDF File Size: 19.81 MB
Distribution: Free* [*Regsitration Required]
Downloads: 36031
Uploaded by: LULU

Hardware and Networking Interview Questions & Answers. Networking hardware, also known as Computer networking devices or network equipment, are. Top Hardware & Networking Interview Questions & Answers - Download as Word Doc .doc), PDF File .pdf), Text File Ans. A hidden or an administrative share is a network share that is not visible when viewing another computer's shares. Top Networking Interview Questions & Answers. 1) What is a Link computers on a common network to share single connection to the Internet. 15) What is.

This is a server that all computers on the local network have to go through before accessing information on the Internet. Thank you for usefull questions. Plz send me the pdf of these networking questions with answers Thank you September 2, Reply. The World Wide Web today is a distributed client-server service,in which a client using a browser can access a service using a server. Hub is a layer 1 device. Describe Domain Name System. Top 10 facts why you need a cover letter?

The standard protocol has been defined between the terminal and the PAD, called X. Together, these three recommendations are often called "triple X". Series of interface points that allow other computers to communicate with the other layers of network protocol stack. A generic term for section of a large networks usually separated by a bridge or router. What Is Subnet Mask? It is a term that makes distinguish between network address and host address in IP address.

Subnet mask value 0 defines host partition in IP address and value 1 — defines Network address. Describe Various Network Type? Local Area Networks Local area networks LANs are used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment.

Companies deploy basically two types of CNs: Distributing Internet traffic loads across multiple servers Storage Area Networks Storage area networks SANs provide a high-speed infrastructure to move data between storage devices and file servers.

Disadvantage of SANs is their cost. Intranet An intranet is basically a network that is local to a company. In other words, users from within this company can find all of their resources without having to go outside of the company. Extranet An extranet is an extended intranet, where certain internal services are made available to known external users or external business partners at remote locations.

Internet An internet is used when unknown external users need to access internal resources in your network. In other words, your company might have a web site that sells various products, and you want any external user to be able to access this service. A VPN is used to provide a secure connection across a public network, such as an internet. Extranets typically use a VPN to provide a secure connection between a company and its known external users or offices.

Authentication is provided to validate the identities of the two peers. Confidentiality provides encryption of the data to keep it private from prying eyes. Integrity is used to ensure that the data sent between the two devices or sites has not been tampered with. It is an alternative to the Routing Information Protocol. The three types of routing tables are fixed, dynamic, and fixed central. What Is Packet Filter?

Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped. The same message might contain the name of the machine that has the boot files on it.

If the boot image location is not specified, the workstation sends another UDP message to query the server. DNS resource record is an entry in a name server's database.

There are several types of resource records used, including name-to-address resolution information. It is a better choice than TCP because of the improved speed a connectionless protocol offers.

Of course, transmission reliability suffers with UDP. Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world. When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.

What Is Multicast Routing? Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing. What Is Traffic Shaping? One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.

Computer Fundamentals Tutorial. Hardware And Networking Practice Tests. IT Skills. Management Skills. Communication Skills. Business Skills. Digital Marketing Skills. Human Resources Skills. Health Care Skills. Finance Skills. All Courses. All Practice Tests. Application Layer Question 3.

Describe Domain Name System Answer: When the signal travels through the medium from one point to another it may chance to change the form or shape of the signal. It is called distortion. Distortion can occur in a composite signal made up of different frequencies.

Each signal component has its own propagation speed through a traveling medium and, therefore, its own delay in reaching the final destination. Means signal components at the receiver have phases different from what they had at the sender. The third cause of impairment is Noise.

Following types of noise are possible. Thermal noise. Induced noise. Crosstalk noise. Impulse noise. Question 7. What Is Ip? Question 9. What Is A Layer? Complementary metal oxide semiconductor Question What Is Sap? What Is Subnet? Availability is high because of the redundancy features available. Distances can span up to 10 kilometers. Management is easy because of the centralization of data resources. Overhead is low uses a thin protocol. A fixed table must be manually modified every time there is a change.

A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices.

Basic Networking Interview Questions for Freshers Experienced PDF

The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table's contents can change without the administrator being aware of the change. What Is Region?

Hardware and Networking Related Tutorials Node. Computer Available Courses. Job Recommendation Latest.

Jobs in Meghalaya Jobs in Shillong. View All Locations. Making a great Resume: How to design your resume? Have you ever lie on your resume? Where do you take back up from? Bedside's it? Router is a device that is used to connect two different networks. How will you configure ADS? A central component of the Windows platform, Active Directory service provides the means to manage the identities and relationships that make up network environments.

What if this wizard ADS is not running? Check the network cable it should be plugged Check root partition it should be in NTFS Check IP of server it should be configured statically How will you add a client to server?

What are the client configurations? Not every time but you are required a properly configured user account in domain controller security policy. ISO stand for? International standard organization OSI stand for?

A physical topology describes how devices are physically cabled together. A logical topology describes how devices communicate across the physical topology How many types of topology are available?

A point-to-point topology has a single connection between two devices. In a star topology, a central device has many point-to-point connections to other devices. A bus topology uses a single connection or wire to connect all devices. How many times computer reboot when server install? Reboot the system with XP, apply also on server, cd On setup screen press to R to repair the window Now provide the administrator password C: For data sharing To accumulate hardware resource What are the benefits of networking?

Basic Networking Questions Asked in Interview PDF Download

There are lots of advantages from build up a network, but the three big facts are- File Sharing From sharing files you can view, modify, and copy files stored on a different computer on the network just as easily as if they were stored on your computer. Program Sharing Just as you can share files on a network, you can often also share program on a network.

For example, if you have the right type of software license, you can have a shared copy of Microsoft Office, or some other program, and keep it on the network server, from where it is also run What is network? A network is basically all of the components hardware and software involved in connecting computers across small and large distances.

What is networking? A process that is describes how the network will connect. What is topology? A topology defines how the devices are connected. Further it is divided in physical and logical topology. FAT Doesn't provide local security Provide local security Doesn't provide disk quota Provide disk quota Doesn't provide file compression Provide file compression Doesn't provide other security feature Provide other security feature Difference between XP home and XP professional?

What is a subnet mask? All the hosts in a sub-network will have the same subnet mask. Now all domain controllers share a multi master peer-to-peer read and write relationship that hosts copies of the Active Directory. How can group policy be refreshed? LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory, and tell the system which partition and hard drive to boot from.

I can't seem to access the Internet, don't have any access to the corporate network and on IP configuration on my address is What happened? The The server must be authorized first with the Active Directory. What's the difference between local, global and universal groups? Domain local groups assign access permissions to domain groups for local domain resources. Global groups provide access to resources in entire domains.

Only native NTFS provides extensive permission control on both remote and local files. What is presentation layer and how it is responsible for in the OSI model? The presentation layer establishes the data format prior to passing it along to the network application's interface. It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header. It is a simple protocol used to exchange information between the routers.

It is a simple protocol used for transmission of IP datagrams across a serial line. What is Proxy ARP? It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.

What is OSPF? It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions. What is Kerberos? It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files. What is a Multi-homed Host? It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multihomed Host.

It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session. What is Gateway-to-Gateway protocol? It is a protocol formerly used to exchange routing information between Internet core routers. It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system.

What is autonomous system?

It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol. It is any routing protocol used within an autonomous system. What is Mail Gateway? It is a system that performs a protocol translation between different electronic mail delivery protocols.

What is wide-mouth frog? Wide-mouth frog is the simplest known key distribution center KDC authentication protocol. What is silly window syndrome? It is a problem that can ruin TCP performance.

This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time. What is region? When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.

What is multicast routing? Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing. What is traffic shaping? One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate.

This is called traffic shaping. What is packet filter? Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected.

Packets meeting some criterion are forwarded normally. Those that fail the test are dropped. BOOTP helps a diskless workstation boot.

How does it get a message to the network looking for its IP address and the location of its operating system boot files? The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server.

What is a DNS resource record?

Networking Interview Questions

There are several types of resource records used, including name-to-address resolution information. What protocol is used by DNS name servers? It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP. What is the difference between interior and exterior neighbor gateways? Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.

It is an alternative to the Routing Information Protocol. What are the three type of routing tables and What are the advantages and disadvantages of these? The three types of routing tables are fixed, dynamic, and fixed central. A fixed table must be manually modified every time there is a change. A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices.

The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table's contents can change without the administrator being aware of the change. What is attenuation? The degeneration of a signal over distance on a network cable is called attenuation.

What is cladding? A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable. What is RAID? A method for providing fault tolerance by using multiple hard disk drives. A transport protocol designed by Microsoft and IBM for the use on small subnets. What is redirector? Redirector is software that intercept What is Beaconing? The process that allows a network to self-repair networks problems.

The stations on the network notify the other stations on the ring when they are not receiving the transmissions. What is terminal emulation, in which layer it comes? Telnet is also called as terminal emulation. It belongs to application layer. What is frame relay, in which layer it comes? Frame relay is a packet switching technology. It will operate in the data link layer. What do you meant by "triple X" in Networks? The standard protocol has been defined between the terminal and the PAD, called X.

Together, these three recommendations are often called "triple X". What is SAP? Series of interface points that allow other computers to communicate with the other layers of network protocol stack.

And interview networking hardware pdf computer and questions answers

What is subnet? A generic term for section of a large networks usually separated by a bridge or router. What is subnet mask? It is a term that makes distinguish between network address and host address in IP address. Subnet mask value 0 defines host partition in IP address and value 1 — defines Network address. Describe Various Network Type Local Area Networks Local area networks LANs are used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment.

Companies deploy basically two types of CNs: Caching downloaded Internet information 2. Distributing Internet traffic loads across multiple servers Storage Area Networks Storage area networks SANs provide a high-speed infrastructure to move data between storage devices and file servers. Advantage Performance is fast. Availability is high because of the redundancy features available.

Distances can span up to 10 kilometers. Management is easy because of the centralization of data resources. Overhead is low uses a thin protocol. Disadvantage of SANs is their cost. Intranet An intranet is basically a network that is local to a company. In other words, users from within this company can find all of their resources without having to go outside of the company. An intranet can include LANs, private WANs and MANs, Extranet An extranet is an extended intranet, where certain internal services are made available to known external users or external business partners at remote locations.

Internet An internet is used when unknown external users need to access internal resources in your network. In other words, your company might have a web site that sells various products, and you want any external user to be able to access this service. A VPN is used to provide a secure connection across a public network, such as an internet.

Extranets typically use a VPN to provide a secure connection between a company and its known external users or offices.

Questions and answers hardware and networking computer pdf interview

Authentication is provided to validate the identities of the two peers. Confidentiality provides encryption of the data to keep it private from prying eyes. Integrity is used to ensure that the data sent between the two devices or sites has not been tampered with. Awesome , I am trying to download this book but I can't do kindly send me this. My email id thirumal yahoo.

Sir thank you very much i am so happy. It is really use person like me who is starting careers in IT plz share this question n answer to me Thanks lot sir for the very useful information. Best regards, Jayesh Raichurajayesh.

And computer interview and questions networking answers pdf hardware

This community has lots of combined issues experienced around almost all the technological innovation. We have professionals who can take care of your concerns to quickly in any technological factors.

Technical Forum. Thanks bro. This is a very good information for freshers. I am looking for pure networking interview questions. Thanks For all my friends for using my Blogs.. Thanks for the information shared here. I like to read this book dear.

Answers and interview computer questions and networking pdf hardware

Thank you sir This is really good question and answer for the Interview. Very informative and well written post! Quite interesting and nice topic chosen for the post. Dell - Refurbished - Your post really cool and interesting. Thanks very much. Panasonic - Excellent Blog work. I learnt useful tips. Keep blogging. Thank you, Venkatesan Prabu.

J KaaShiv InfoTech http: Fantastic Blog. It provides great opportunity to learn multiple technologies from this blog. Nice stuff dear. Thank you so much for sharing the information. I am student of bachelors of computer science and was searching for Situational interview questions. You have solved my problem. Thank you again. Nice Post with information regarding great use! The ways you have illustrated the information is impressive.

Nice post and thanks for share any way. Nice notes of hardware and networking. Thank you,. Support for Computer Peripherals. Hi, outstanding work done by u. I need soft copy of this notes. So Plz email me. Thanks for ur support. I am thanks to all, who was given all good comments. I am happy to resolve my issue. Given so much info in it, These type of articles keeps the users interest in the website, and keep on sharing more..

I really like your post. I really appreciate that. Thank you for sharing valuable information.