Technical Interview Questions


Technical Interview Questions


Q1.) How to check an IP address of a computer?
Ans.  Click on START                        RUN       CMD                      Type IPCONFIG.
Q2.) What all you get when you type IPCONFIG?
Ans.  IP address, Default gateway, Subnet mask.
Q3.) How to go to device manager?
Ans. Right click on My Computer                               Click on Properties,go to hardware tab  then click on Device Manager.
                                                OR
Type – DEVMGMT.MSC in Run Box
Q4.) Where do you see all the hardware drivers?
Ans.  Device Manager.
Q5.) If you see a yellow exclamation mark on any of the hardware drivers in device Manager, what does that mean and how do you fix it?
Ans. It means that the driver is corrupted and we would uninstall the same and reinstall it.
Q6.) If it’s a red Exclamation mark on any of the hardware drivers in device Manager, what does that mean and how do you fix it?
Ans. It means that the driver is “disabled”, we will right click on that particular driver and enable it.
Q7.)If we are getting an IP address which starts with “169.168…Is this a correct IP address, if not how do we troubleshoot. ?
Ans. It is not a correct IP address- It’s called APIPA, we will release and renew the IP address by following command in DOS prompt.
IPCONFIG/RELEASE
IPCONFIG/RENEW
Q8. What is the difference between “System Restore and Last known good Configuration”. ?
Ans. System Restore: - Click on start-All programs-Accessories-System tools- System restore. It Restore the system to a particular date and it’s a manual process.

LKGC: - While system is booting up- keep taping F8. It’s an automatic procedure wherein system would automatically be Restore to the time when it was working fine.

Q9.) What is the difference between Virus and Spyware?
Virus: - It’s malicious software which hampers the efficiency of the system, it might result in crashing the system as it it multiplies on his own.
Spyware: - It’s a program which steals the information and sends to the source
Q10.) What do you understand by NIC/Wireless Card?
Ans. It’s a LAN or Ethernet card which helps a user to use internet. Driver would be found in Device manager.
Q11.) What is the use of RAM?
Ans. Ram is the virtual memory of the system. It helps in multitasking and helps in increasing the speed of the computer.
Q12.) What do you understand by Default gateway?
Ans. It’s an IP address provided by ISP (Internet service Provider)
Q13.) What do you understand by Cookies.?
Ans. Cookies is a piece of data stored by a website within a browser, Cookies were designed to be a reliable mechanism for websites to remember things.
Q14.) What do you understand by Prefetch.?
Ans. Each time you turn on your computer, Windows keeps track of the way your computer starts and which programs you commonly open. Windows saves this information as a number of small files in the prefetch folder. The next time you turn on your computer, Windows refers to these files to help speed the start process. We can delete them by typing “Prefetch” in Run Box.

1.     MSConfig is a troubleshooting tool which is used to temporarily disable or re-enable software, device drivers or Windows services that run during startup process to help the user determine the cause of a problem with Windows.


2.     An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication

3.     DSL (Digital Subscriber Line) is a technology for bringing high- bandwidth information to homes and small businesses over ordinary copper telephone lines. xDSL refers to different variations of DSL, such as ADSL, HDSL, and RADSL.

4.     What is driver?
A driver is software that allows your computer to communicate with hardware or devices. Without drivers, the hardware you connect to your computer—for example, a video card or a printer—won't work properly.


5.     Device Manager is a Control Panel applet in Microsoft Windows operating systems. It allows users to view and control the hardware attached to the computer. When a piece of hardware is not working, the offending hardware is highlighted for the user to deal with.

6.     You can use Programs and Features to uninstall programs or to change the program's configuration by adding or removing certain options.
(a)  Open Programs and Features by clicking the Start button , clicking Control Panel, clicking Programs, and then clicking Programs and Features.
(b) Select a program, and then click Uninstall.
(c)  Answer: Routers and modems are two of the most common computer peripherals, yet many people don't know the function of each one. While the two devices may look similar, they each serve a difference purpose. Fortunately, the functions of the two devices are pretty easy to understand.
(d) A router is a small box that allows multiple computershuutt to join the same network
(e) While early routers provided several Ethernet ports for wired connections, most modern routers offer wireless connectivity as well. These "wireless routers" often have one or two moveable antennas on the sides, though some models house the antennas inside the enclosure. Wireless routers allow multiple computers and other devices, such as smartphones and tablets, to join the same network.
(f)   While connecting to a router provides access to a local network (LAN), it does not necessarily provide access to the Internet. In order for devices on the network to connect to the Internet, the router must be connected to a modem. Therefore, most routers have a specific Ethernet port that is designed to connect to the Ethernet port of a cable or DSL modem.
(g)  A modem is a device that provides access to the Internet (see below).
The modem connects to your ISP, which typically provides either cable or DSL Internet service. Cable modems have a coaxial (or "coax") connection, which is the same type of connector found on a TV or cable box. This connects to a cable port on the wall. DSL modems have a telephone connector, also called an RJ-11 jack, which connects to a telephone socket on the wall.
By connecting your modem to your router (instead of directly to a computer), all devices connected to the router can access the modem, and therefore, the Internet. The router provides a local IP address to each connected device, but they will all have the same external IP address, which is assigned by your ISP.
To summarize, the device connection order is outlined below:
1.     PC or wireless device
2.     Router
3.     Modem
4.     ISP
5.     Internet
While the router and modem are usually separate entities, in some cases, the modem and router may be combined into a single device. This type of hybrid device is sometimes offered by ISPs to simplify the setup process.
7.     What is a Network Switch vs. a Router?
What is a network switch and what is a router? The two pieces of equipment look similar and perform some similar functions, but each has its own distinct function to perform on a network.
What is a Network Switch?
To understand basic networking, you first need to answer the question, "What is a network switch?"
Most business networks today use switches to connect computers, printers and servers within a building or campus. A switch serves as a controller, enabling networked devices to talk to each other efficiently. Through information sharing and resource allocation, switches save businesses money and increase employee productivity.
Understand the different types of Ethernet switches and their capabilities.

Data in RAM is not permanently written. When you power off your computer the data stored in RAM is deleted. ROM is a type of non- volatile memory. Data in ROM is permanently written and is not erased when you power off your computer.

Single- and multi-tasking
A single-tasking system can only run one program at a time, while a multi-tasking operating system allows more than one program to be running in concurrency. This is achieved by time-sharing, dividing the available processor time between multiple processes that are each interrupted repeatedly in time slices by a task-scheduling subsystem of the operating system. Multi-tasking may be characterized in preemptive and co-operative types. In preemptive multitasking, the operating system slices the CPU time and dedicates a slot to each of the programs. Unix-like operating systems, e.g., Solaris, Linux, as well as AmigaOS support preemptive multitasking. Cooperative multitasking is achieved by relying on each process to provide time to the other processes in a defined manner. 16-bit versions of Microsoft Windows used cooperative multi-tasking. 32-bit versions of both Windows NT and Win9x, used preemptive multi-tasking.
LAN
WAN
Stands For
Local Area Network
Wide Area Network
Covers
Local areas only (e.g., homes, offices, schools)
Large geographic areas (e.g., cities, states, nations)
Definition
LAN (Local Area Network) is a computer network covering a small geographic area, like a home, office, school, or group of buildings.
WAN (Wide Area Network) is a computer network that covers a broad area (e.g., any network whose communications links cross metropolitan, regional, or national boundaries over a long distance).
Speed
High speed (1000 mbps)
Less speed (150 mbps)
Data transfer rates
LANs have a high data transfer rate.
WANs have a lower data transfer rate compared to LANs.
Example
The network in an office building can be a LAN
The Internet is a good example of a WAN

Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, broadband telephony, and broadband phone service.

File Allocation Table (FAT) is a computer file system architecture
System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used to recover from system malfunctions or other problems.

What is NTFS NTFS (New Technology File System)

What are the two file system in Windows?

1)    FAT  2) NTFS


6.     As a general rule, if you have under 4 GB of RAM in your computer, you don’t need a 64-bit CPU, but if you have 4 GB or more, you do. While many users may find that a 32-bit processor provides them with enough performance and memory access, applications that tend to use large amounts of memory may show vast improvements with the upgraded processor. Image and video editing software, 3D rendering utilities, and video games will make better use of a 64-bit architecture and operating system, especially if the machine has 8 or even 16 GB of RAM that can be divided among the applications that need it.
8.     Through hardware emulation, it’s possible to run 32-bit software and operating systems on a machine with a 64-bit processor. The opposite isn’t true however, in that 32-bit processors cannot run software designed with 64-bit architecture in mind. This means if you want to take full advantage of your new processor you also need a new operating system, otherwise you won’t experience any marked benefits over the 32-bit version of your hardware.
BIOS settings
Boot the computer. As the manufacturer’s logo appears, press the designated setup button to enter the BIOS. The key varies by manufacturer. Typical setups keys are F2, F10, F12, and Del. The key will be displayed on the screen with the manufacturer’s logo.
Q-bookair
Ans:-MacBook Air is a thin, lightweight laptop from Apple.  Because it is a full-sized notebook but only weighs three pounds, the laptop falls into a category that vendors are currently calling 'ultraportable.'
Q-What tool can be used to check for system errors in Window Vista?
Ans:-*Choose Start→Computer.
*Right-click the drive you want to check and then choose Properties.
*In the resulting Properties dialog box, select the Tools tab and then
click the Check Now button.
*In the resulting Check Disk dialog box, choose an option.
Automatically Fix File System Errors: You have to close all files in order to run this option.
Scan For and Attempt Recovery of Bad Sectors: If you select this option, it also automatically fixes any errors found, so you don’t need to select the first option as well.
Click Start.
Q:-What is the latest version of Mac OS?
Ans:-Box/Mac App Store artwork for OS X. Left to right: Cheetah/Puma
(1), Jaguar (2), Panther (3), Tiger (4), Leopard (5), Snow Leopard (6), Lion (7), Mountain Lion (8), Mavericks (9), Yosemite (10), El Capitan (11). OS X is the tenth major version of Apple's operating system for Macintosh computers.
Q:-browser plugins?
Ans:-Web browser plug-ins (sometimes just spelled plugins) are additional pieces of software that add extra capabilities to your web browser, such as the ability to view movies, run Java applets, or see Flash animations

Q:-What is an MSI File used for?
Ans:-MSI is an installer package file format used by Windows. Its name comes from the program's original title, Microsoft Installer, which has since changed to Windows Installer. MSI files are used for installation, storage, and removal of programs.
Q:-Which one is not a safe mode option in Window Vista?
Ans:-No safe mod option
Q:-What software is used to play videos in You Tube in Window Desktop?
Ans:-Adobe flash player
Q:-What does PDF extension stands for?
Ans:-portable document format
Q:-High Definations displays means?
Ans:The following is a comparison of high-definition smartphone displays, containing information about their specific screen technology, resolution, size and pixel density. It is divided into three categories, containing smartphones with 720p, 1080p and 1440p displays.
Q:-What is the latest Service Pack for Windows XP?
Ans:- sp3

IOS
iOS (originally iPhone OS) is a mobile operating system created and developed by Apple Inc. and distributed exclusively for Apple hardware. It is the operating system that presently powers many of the company's mobile devices, including the iPhone, iPad, and iPod touch.
iOS version history. Apple Inc. provides updates to the iOS operating system for the iPhone, iPad, and iPod Touch through iTunes, and since iOS 5.0, over-the-air software updates.
As of August 31, 2015, iOS 8 has been installed on 87% of compatible Apple devices. The latest version of the operating system is iOS 8.4.1, released on August 13, 2015. There have been ten major releases of iPhone (original iPhone, iPhone 3G, iPhone 3GS, iPhone 4, iPhone 4S, iPhone 5, iPhone 5C, iPhone 5S, iPhone 6, and iPhone 6
Plus), five of iPod Touch (first to fifth generations), six of iPad (first generation, iPad 2, third and fourth generations, iPad Air, and iPad Air 2),

Android
The latest version is Android 6 Marshmallow, which will gradually become available for more and more devices over the coming months. Lollipop is 5.x, and KitKat is version 4.4.x, with 4.3, 4.2 and 4.1 all coming under the codename name Jelly Bean.
Android 6.0 "Marshmallow" is an upcoming update to the Android mobile operating system, most likely to be released in Q3 2015 ("tentatively slated for September"), with its third and final preview released on August 17, 2015.

Windows
a GUI operating system for personal computers. When referring to an operating system, Windows or win is an operating environment created by Microsoft that provides an interface, known as a Graphical User Interface (GUI), for computers. Windows eliminates the need to memorize commands for the command line (MS-DOS) by using a mouse to navigate through menus, dialog boxes, buttons, tabs, and icons. If you are using a PC (IBM) computer you are most likely using a version of Windows. If you are on an Apple computer you are using macOS.
Microsoft Windows was first introduced with version 1.0 on November 10, 1983. Since its release, there have been over a dozen versions of Windows. The most current version of Windows for end users is Windows 10.

MS Config
MSConfig (officially called System Configuration in Windows Vista, Windows 7, Windows 8 or Windows 10 Microsoft System Configuration Utility in previous operating systems) is a system utility to troubleshoot the Microsoft Windows startup process.

Device Manager
The Device Manager is a Control Panel applet in Microsoft Windows operating systems. It allows users to view and control the hardware attached to the computer. When a piece of hardware is not working, the offending hardware is highlighted for the user to deal with.
To open Device Manager. Swipe in from the right edge of the screen, then tap Search. (If you're using a mouse, point to the bottom-right corner of the screen, move the mouse pointer up, then click Search.) Enter Device Manager in the search box, and tap or click Device Manager.

Task Manager
A task manager is a system monitor program used to provide information about the processes and programs running on a computer, as well as the general status of the computer. Some implementations can also be used to terminate processes and programs, as well as change the processes priority.
This file was executed by running the taskman.exe file from the C:\Windows directory. The program can be started in recent versions of Windows by pressing WIN+R and then typing in taskmgr.exe , by pressing CTRL+ALT+DEL and clicking Start Task Manager, or by pressing CTRL+SHIFT+ESC.


What is Firewall?
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions. [1]
What is Virus?
A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.[2][3]
What is Antivirus?
Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worms, trojan horses, spyware and adware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies. This page discusses the software used for the prevention and removal of malwarethreats, rather than computer security implemented by software methods.
What is Control Panel?
The Control Panel is a part of the Microsoft Windows graphical user interface which allows users to view and manipulate basic system settings and controls via applets, such as adding hardware, adding and removing software, controlling user accounts, and changing accessibility options. Additional applets can be provided by third party software.
Boot Process:
The boot sequence is when the operating system is selected, and the hardware configuration is detected and loaded. It has four sub-phases: Initial Boot Loader, Operating System Selection, Hardware Detection, and Configuration Selection. The boot sequence uses six files during its four sub-phases: Ntldr, Boot.ini ,Ntdetect.com,Ntoskrnl.exe,Ntbootdd.sys, and the optional Bootsect.dos file.
a) During the 
Initial Boot Loader phase, the operating system loader file, Ntldr, switches the microprocessor from the real mode, in which 640k of RAM is reserved for MS-DOS and rest is designated as extended memory, to 32-bit flat memory mode, in which Windows XP Professional uses all of the available memory.Ntldr starts the build-in mini-file system drivers, so that it can find partitions formatted to FAT or to NTFS and begin the startup process on them.
b)During the 
Operating System Selection Phase, if there are multiple operating systems installed on the computer, and the Boot.ini file is configured to present a list of operating systems, the Please select operating System To Start menu appears so that the user can select a system. If Windows XP is choosen, Ntldr runs Ntdetect.com. If a non-windows operating system is chosen, Ntldr runs Bootsect. dos and relinquishes control of the system. If the user makes no selection, the default operating system loads.
c)During the Hardware Detection phase, Ntdetect.com collects a list of currently installed hardware components and returns the list to Ntldr. This list will later be used to create the Hardware key in the registry. The components detected include bus and adaptor types, video adaptors, communications posrts, parallel ports, floating-point coprocessors, removable media, keyboards, and pointing devices.

d) During the
 Configuration Selection Phase, if the computer has multiple hardware profiles configured, Ntldr displays the Hardware Profile/Configuration Recovery menu. Otherwise, Windows XP loads using the default hardware profile.
What is Internet and how it does works?
The Internet is a global system of interconnected computer networks that use the standardInternet protocol suite (often called TCP/IP, although not all protocols use TCP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email.
What is Windows Registry?
The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems. It contains settings for low-level operating system components as well as the applications running on the platform: the kernel, device drivers,services, SAM, user interface and third party applications all make use of the registry. The registry also provides a means to access countersfor profiling system performance.





What are Registry Erros?
·         Registry errors can be caused by improperly uninstalled applications that leave registry entries that cause start-up problems. Viruses, Trojans and spyware are also known to cause registry errors because they install registry entries that are very difficult to remove manually. They also change file associations and prevent you from opening executable files. Registry errors are also caused by a vast number of unnecessary files on your computer system that use system resources with no added benefit.
Types
·         The "Blue Screen of Death" is a common type of registry error. When the settings are improperly configured on the registry, the computer crashes and displays this frequent blue screen error as a result of registry errors. "Dll errors" are other common types of registry errors that occur when an application is missing a vital .dll file that helps run the executable files of that application. Registry start-up errors are other common registry errors. These errors usually occur when a start-up item is missing or improperly configured.

Effects

·         Registry errors cause the overall system to slow down. Because the registry is the central configuration center for programs and system components, any errors cause slow start-up and shutdowns. Registry errors cause applications to slow down, freeze and eventually crash. Registry errors also reconfigure boot options and prevent your PC from booting up. Registry errors are also known to cause network errors, especially if there are malware entries that create network intrusions.
Prevention/Solution
·         Properly uninstall programs and applications you do not use. While most programs can be uninstalled from the "Add or Remove Programs" window on the Control Panel, others must be uninstalled using a removal tool supplied by your software's manufacturer. Run frequent virus scans, and delete malicious files that install on the registry and cause programs to crash. Fix registry errors with free registry cleaning tools such as CCleaner (see Resources below). Registry cleaners remove unnecessary registry entries and repair ActiveX and missing file extensions.

What is Event Viewer?
Event Viewer, a component of Microsoft's Windows NT line of operating systems, lets administrators and users view the event logs on a local or remote machine.
Computer logs: Computer data logging is the process of recording events, with an automated computer program, in a certain scope in order to provide an audit trail that can be used to understand the activity of the system and to diagnose problems.
Logs are essential to understand the activities of complex systems particularly in the case of applications with little user interaction (such asserver applications).


What is Device Manager?
The Device Manager is a Control Panel applet in Microsoft Windows operating systems. It allows users to view and control the hardware attached to the computer. When a piece of hardware is not working, the offending hardware is highlighted for the user to deal with. The list of hardware can be sorted by various criteria.

What is Msconfig?
MSConfig, or System Configuration Utility, is a system configuration utility bundled with all Microsoft Windows operating systems released after 1995 except Windows 2000. Windows 2000 users can download the utility separately, however. This tool modifies which programs run at startup, edits certain configuration files, and simplifies controls over Windows services. With Windows Vista the tool gained increased Windows service support[1], and additional support for launching a variety of tools, such as system information, other configuration areas, such as Internet options, and the ability to enable/disable UAC. As part of the base Windows install, it can be accessed by running 'msconfig' on any system on which the user has administrator access.


History of Microsoft Windows OS:
Microsoft Windows is a series of operating systems produced by Microsoft.
Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces (GUIs).[2] Microsoft Windows came to dominate the world's personal computer market, overtaking Mac OS, which had been introduced in 1984.
The most recent client version of Windows is Windows 7; the most recent serverversion is Windows Server 2008 R2; the most recent mobile version is Windows Phone 7.5.
The history of Windows dates back to September 1981, when Chase Bishop, a computer scientist, designed the first model of an electronic device and project "Interface Manager" was started. It was announced in November 1983. Windows 1.0 was launched in 1985.
Windows 1.0 did not allow overlapping windows. Instead all windows were tiled. Only dialog boxes could appear over other windows.

Windows 2.0 was released in October 1987 and featured several improvements to the user interface and memory management.[3] Windows 2.0 allowed application windows to overlap each other and also introduced more sophisticated keyboard shortcuts. Windows 2.1 was released in two different versions: Windows/386 employed the 386virtual 8086 mode to multitask several DOS programs. After that, Windows 3.0 (1990) and Windows 3.1 (1992) were introduced with advanced features and then Windows 95, 98 and ME in. In February 2000, Windows 2000 








Comments

Popular Posts