SlideShare a Scribd company logo
1 of 5
1) What is Active Directory?

A central component of the Windows platform, Active Directory directory service provides the means to manage the
identities and relationships that make up network environments. For example we can create, manage and administrator
users, computers and printers in the network from active directory.

2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and
mx records?

DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer
understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign
names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP
address (number) and it executes our request.

Forward lookup: Converting names to IP address is called forward lookup.

Reverse lookup: Resolving IP address to names is called reverse lookup.

'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of
which DNS can find out the IP address of a name.

'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is
also found in DNS.

3) What id DHCP? Why it is used? What are scopes and super scopes?

DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network
environment. This makes the IP management very easy.

Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use
to communicate with the other PCs in the network.

Superscope: When we combine two or more scopes together its called super scope.

4) What are the types of LAN cables used? What is a cross cable?

Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can
support 1Gbps of speed.

Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the
LAN cable?

The way the paired wires are connected to the connector (RJ45) is different

in cross cable and normal LAN cable.

The theoretical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.

6) What would you use to connect two computers without using switches?

Cross cable.

7) What is IPCONFIG command? Why it is used?
IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP
address, DNS IP address, gateway IP address assigned to that computer.

8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?

When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can
communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X.

APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.

9) What is a DOMAIN? What is the difference between a domain and a workgroup?

Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the
boundary. Domain can be used to centrally administrator computers and we can govern them using common policies called
group policies.

We can't do the same with workgroup.

10) Do you know how to configure outlook 2000 and outlook 2003 for a user?

Please visit the link below to find out how to configure outlook 2000 and outlook 2003. IT: Help Desk: Quick Guide:
Configuring Outlook 2003 for Exchange Server

11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?

PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached
exchanged mode. Outlook express used odb file.

12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?

BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a
blue screen with a code. Best way to resolve it is to boot the computer is "Last known good configuration".

If this doesn't work than boot the computer in safe mode. If it boots up than the problems with one of the devices or drivers.

13) What is RIS? What is Imaging/ghosting?

RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install
the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does
the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or
imaging/ghosting because installing OS every time using a CD can be a very time consuming task. So to save that time we
can go for RIS/Ghosting/imaging.

14) What is VPN and how to configure it?

VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail
and files in the LAN. VPN can be configured using the steps mentioned in the KB: How to configure a VPN connection to
your corporate network in Windows XP Professional

15) Your computer slowly drops out of network. A reboot of the computer

fixes the problem. What to do to resolve this issue?

Update the network card driver.

16) Your system is infected with Virus? How to recover the data?
Install another system. Install the OS with the lates patches, Antivirus with latest updates. Connect the infected HDD as
secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.

17) How to join a system to the domain? What type of user can add a system to the domain?

Please visit the article below and read "Adding the Workstation to the
Domain" http://www.microsoft.com/technet/pro...003/technol /directory/
18) What is the difference between a switch and a hub?

Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.

19) What is a router? Why we use it?

Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across
but it uses the routing protocols to do so.

20) What are manageable and non manageable switches?

Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch.
On no manageable switches we can't do so.




Q. What are the main differences between the following operating systems?
A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you
know more than just the current version because there will always be a user who has a problem with an older version. By asking this
question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The
following provides a concise summary of some of the major differences.
Windows 2000 and XP

Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the hands of consumers. The
major changes include the following:

        Device driver rollback
        Remote control (single-user terminal services)
        New Start menu, control panel, and user interface elements
        Fast user switching
        Encrypted file system support for redirected folders
        Better support for roaming wireless networking
        Enhanced policies
        Credential Manager
        Personal firewall



Q. What are typical virus sources and how do you prevent virus attacks?
A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible virus sources
include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections:
        Use anti-virus software.
        Perform regular updates to the virus software definition files and scan engines. Verify updates have succeeded.
        Perform regularly scheduled virus checks.
        Configure software to check all files, not just program files.
        Educate users on virus attacks, their consequences, and how to prevent them.
        Know where all software came from.
        Do regular backups.
Develop reporting mechanisms to inform server administrators of observed desktop infections and how these could impact
         the server environment (such as deletions or corruption of files on public shares, hidden payload files that might have been
         uploaded to servers, and so on).




What is difference between win XP and wn 7 technically

Disk shrinking and extending is available in windows 7
Start up and shutdown will be fast
user defined theme
a program called psr is available
Answered by: SHAMIM HAIDER on: Apr 28th, 2012
Many differences in win xp and win7..
1) ip6 version not include in winxp
2) net meeting not include in win7.
3) driver automatic install.
4) both OS installation different types.
5) win7display look better than winxp



Connectivity troubleshooting

A user in a corporate network contacts service desk saying he/she has lost network connectivity: how will you troubleshoot the
issue? What are the steps to followed?
Answered by: shajan on: May 2nd, 2012
If the user getting limited connectivity(APIPA ip address)..We need to check with the
ipconfig /release and ipconfig /renew commands
Answered by: Javed Khan on: Apr 16th, 2012
Check LAN Cable
check ip address
check firewall setting
than ping ip , gateway and dns

How to install os from server to all system?
                                                                                                                            7 answers


We can RIS service in Windows Server 2003SP1 and WDS Services Windows serve 2003SP2 and also WDS in Windows server 2008.
but we have .inf file of all systems of a network those boot from network.
so we can easily install from Server.



Ntldr error meaning

When I boot my computer I have seen on my screen " verifying dmi pool data" and then after second line is shown "ntldr is
missing..." what is this problem and who can I solve it.

If NTLDR is missing then we can copy from Cd (i386) to Systems 32.
1st we can boot from CD and choose the option of repair windows then we can use command of Copy D:i386NTLDR
C:windowsSystems32.
For Example our CDDVD drive is D:.

Ntldr file corrupt or missing you have to copy ntldr from windows xp i386 Folder

How to install operating system in usb pen drive?

First create usb bootable to pen drive, then select first boot device (usb device) from bios
Step 1. Format the USB Flash Disk Run CMD (elevated) and type: 1. diskpart 2. list disk (*now find your USB disk number, youll find
it by its size) 3. select disk 1 (*if your USB is disk 1)...
What is difference between msi and exe file ?

There is no relationship between an MSI file and an .EXE file. An .exe file, like a .com file is produced when source code is complied
and creates a Windows executable program. An .MSI file is a file...
Answered by: Jisthi Khan on: Feb 21st, 2012


MSI file is only for installation purpose. EXE file can be anything that executes on windows.



******Microsoft outlook pst file size limit********

What is the pst size limit in outlook97, 2000, 2003, 2007 and 2010?
In Outlook 2002 and earlier, the .pst files are in the American National Standards Institute (ANSI) format, and the overall size has a
limit of 2 GB. In Outlook 2003 and after, the .pst files are in ...
MS outlook in 2003 and 2007 is 2GB, in 2010 is 50GB



******Blue screen death***************

What is a blue screen of death ? How do you trouble shoot the computer in such situation ?
1) First check blue screen error number, is it Application Or Hardware
2) Generally this problem comes when problem in RAM so First check computer start with another RAM
First Step is Remove the RAM and Clean with a rubber on the copper part of the RAM and insert back again and have a check. If
the problem is still there then check the hardware parts of the Computer.



*******How a virus program destabilize ms windows XP************

What is the mechanism of combating those malicious program? Evaluate each technique
Follow these steps
1)Run ->Cmd
2)Type netsh
3)Firewall
4)Now type in "set opmode enable" to start firewall and "set opmode disable" to stop fire wall.
By corrupting, or deleting data

More Related Content

What's hot

Report_on_Industrial Placement
Report_on_Industrial PlacementReport_on_Industrial Placement
Report_on_Industrial PlacementAwais Mahmood
 
Field attachment log book
Field attachment log bookField attachment log book
Field attachment log bookITNet
 
Computer science industrial training report carried out at web info net ltd ...
Computer science  industrial training report carried out at web info net ltd ...Computer science  industrial training report carried out at web info net ltd ...
Computer science industrial training report carried out at web info net ltd ...rashid muganga
 
INTERNSHIP OF SAFARI HOTEL HARGEYSA
INTERNSHIP OF SAFARI HOTEL HARGEYSAINTERNSHIP OF SAFARI HOTEL HARGEYSA
INTERNSHIP OF SAFARI HOTEL HARGEYSAFALANQAYNTACIYAARAHA
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator CareerBill Kuhl
 
student-s-attachment-log-book.pdf
student-s-attachment-log-book.pdfstudent-s-attachment-log-book.pdf
student-s-attachment-log-book.pdfZhouCrance
 
Sample of A logbook for Bachelor of Science in computer science , software en...
Sample of A logbook for Bachelor of Science in computer science , software en...Sample of A logbook for Bachelor of Science in computer science , software en...
Sample of A logbook for Bachelor of Science in computer science , software en...Paullaster Okoth
 
Computer science/ IT Fianl attachment report
Computer science/ IT Fianl attachment reportComputer science/ IT Fianl attachment report
Computer science/ IT Fianl attachment reportPaullaster Okoth
 
Student's industrial attachment logbook
Student's industrial attachment logbookStudent's industrial attachment logbook
Student's industrial attachment logbookPaullaster Okoth
 
5 assessment instrument evidence_ tos_ written t_est_etc
5  assessment instrument  evidence_ tos_ written t_est_etc5  assessment instrument  evidence_ tos_ written t_est_etc
5 assessment instrument evidence_ tos_ written t_est_etcMCabz1
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship reportkaahwa Armstrong
 
Information technology Internship report
Information technology Internship reportInformation technology Internship report
Information technology Internship reportRodney kaweesa
 
Co-op assignment report
Co-op assignment reportCo-op assignment report
Co-op assignment reportArwa Alamri
 
Internship report (1)
Internship report (1)Internship report (1)
Internship report (1)brhne fitsum
 
JULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOIJULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOIjulius kemboi
 
cooperative training FinalReport
cooperative training FinalReportcooperative training FinalReport
cooperative training FinalReportsaroshtk
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate serverGera Paulos
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
qa intern powerpoint
qa intern powerpointqa intern powerpoint
qa intern powerpointCollin Chin
 

What's hot (20)

Report_on_Industrial Placement
Report_on_Industrial PlacementReport_on_Industrial Placement
Report_on_Industrial Placement
 
Field attachment log book
Field attachment log bookField attachment log book
Field attachment log book
 
Computer science industrial training report carried out at web info net ltd ...
Computer science  industrial training report carried out at web info net ltd ...Computer science  industrial training report carried out at web info net ltd ...
Computer science industrial training report carried out at web info net ltd ...
 
INTERNSHIP OF SAFARI HOTEL HARGEYSA
INTERNSHIP OF SAFARI HOTEL HARGEYSAINTERNSHIP OF SAFARI HOTEL HARGEYSA
INTERNSHIP OF SAFARI HOTEL HARGEYSA
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
student-s-attachment-log-book.pdf
student-s-attachment-log-book.pdfstudent-s-attachment-log-book.pdf
student-s-attachment-log-book.pdf
 
Sample of A logbook for Bachelor of Science in computer science , software en...
Sample of A logbook for Bachelor of Science in computer science , software en...Sample of A logbook for Bachelor of Science in computer science , software en...
Sample of A logbook for Bachelor of Science in computer science , software en...
 
Computer science/ IT Fianl attachment report
Computer science/ IT Fianl attachment reportComputer science/ IT Fianl attachment report
Computer science/ IT Fianl attachment report
 
Student's industrial attachment logbook
Student's industrial attachment logbookStudent's industrial attachment logbook
Student's industrial attachment logbook
 
5 assessment instrument evidence_ tos_ written t_est_etc
5  assessment instrument  evidence_ tos_ written t_est_etc5  assessment instrument  evidence_ tos_ written t_est_etc
5 assessment instrument evidence_ tos_ written t_est_etc
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship report
 
Information technology Internship report
Information technology Internship reportInformation technology Internship report
Information technology Internship report
 
Co-op assignment report
Co-op assignment reportCo-op assignment report
Co-op assignment report
 
Internship report (1)
Internship report (1)Internship report (1)
Internship report (1)
 
JULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOIJULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOI
 
cooperative training FinalReport
cooperative training FinalReportcooperative training FinalReport
cooperative training FinalReport
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Siwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahayaSiwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahaya
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
qa intern powerpoint
qa intern powerpointqa intern powerpoint
qa intern powerpoint
 

Similar to Here are the basic steps to install an operating system from a server to multiple client systems:1. Prepare the server:- Install the OS (e.g. Windows, Linux) on the server. Configure it fully.- Install imaging/deployment software like Microsoft Deployment Toolkit (MDT), Clonezilla, etc. 2. Prepare the client systems:- Make sure the clients meet minimum hardware requirements.- Install PXE/network boot card or enable PXE/network boot in BIOS if needed.3. Create the reference image: - Capture/create an image of the configured server OS using imaging software.4. Deploy the image

It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
Networking question
Networking questionNetworking question
Networking questionDEVBEJ
 
My top 22-windows-server-interview-questions
My top 22-windows-server-interview-questionsMy top 22-windows-server-interview-questions
My top 22-windows-server-interview-questionsRishi Shrivastava
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptxMugabo4
 
Interview questions
Interview questionsInterview questions
Interview questionsxavier john
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address TranslationErin Moore
 
Jetking questions and answers 8.5x11
Jetking   questions and answers 8.5x11Jetking   questions and answers 8.5x11
Jetking questions and answers 8.5x11sunil kumar
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answerssankar palla
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)Tuan Yang
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active DirectoryJessica Myers
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesJeff Stokes
 
Topic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxTopic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxAyeCS11
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)David Sweigert
 

Similar to Here are the basic steps to install an operating system from a server to multiple client systems:1. Prepare the server:- Install the OS (e.g. Windows, Linux) on the server. Configure it fully.- Install imaging/deployment software like Microsoft Deployment Toolkit (MDT), Clonezilla, etc. 2. Prepare the client systems:- Make sure the clients meet minimum hardware requirements.- Install PXE/network boot card or enable PXE/network boot in BIOS if needed.3. Create the reference image: - Capture/create an image of the configured server OS using imaging software.4. Deploy the image (20)

It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Networking question
Networking questionNetworking question
Networking question
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 
Network_Administration_PPT
Network_Administration_PPTNetwork_Administration_PPT
Network_Administration_PPT
 
My top 22-windows-server-interview-questions
My top 22-windows-server-interview-questionsMy top 22-windows-server-interview-questions
My top 22-windows-server-interview-questions
 
Interview Questions
Interview QuestionsInterview Questions
Interview Questions
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptx
 
Interview questions
Interview questionsInterview questions
Interview questions
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address Translation
 
Jetking questions and answers 8.5x11
Jetking   questions and answers 8.5x11Jetking   questions and answers 8.5x11
Jetking questions and answers 8.5x11
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answers
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active Directory
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Topic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxTopic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptx
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 

Here are the basic steps to install an operating system from a server to multiple client systems:1. Prepare the server:- Install the OS (e.g. Windows, Linux) on the server. Configure it fully.- Install imaging/deployment software like Microsoft Deployment Toolkit (MDT), Clonezilla, etc. 2. Prepare the client systems:- Make sure the clients meet minimum hardware requirements.- Install PXE/network boot card or enable PXE/network boot in BIOS if needed.3. Create the reference image: - Capture/create an image of the configured server OS using imaging software.4. Deploy the image

  • 1. 1) What is Active Directory? A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory. 2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records? DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request. Forward lookup: Converting names to IP address is called forward lookup. Reverse lookup: Resolving IP address to names is called reverse lookup. 'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name. 'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS. 3) What id DHCP? Why it is used? What are scopes and super scopes? DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy. Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network. Superscope: When we combine two or more scopes together its called super scope. 4) What are the types of LAN cables used? What is a cross cable? Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed. Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate. 5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable? The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable. The theoretical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal. 6) What would you use to connect two computers without using switches? Cross cable. 7) What is IPCONFIG command? Why it is used?
  • 2. IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer. 8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available? When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X. APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X. 9) What is a DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administrator computers and we can govern them using common policies called group policies. We can't do the same with workgroup. 10) Do you know how to configure outlook 2000 and outlook 2003 for a user? Please visit the link below to find out how to configure outlook 2000 and outlook 2003. IT: Help Desk: Quick Guide: Configuring Outlook 2003 for Exchange Server 11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express? PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express used odb file. 12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it? BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "Last known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problems with one of the devices or drivers. 13) What is RIS? What is Imaging/ghosting? RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or imaging/ghosting because installing OS every time using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging. 14) What is VPN and how to configure it? VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the steps mentioned in the KB: How to configure a VPN connection to your corporate network in Windows XP Professional 15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue? Update the network card driver. 16) Your system is infected with Virus? How to recover the data?
  • 3. Install another system. Install the OS with the lates patches, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system. 17) How to join a system to the domain? What type of user can add a system to the domain? Please visit the article below and read "Adding the Workstation to the Domain" http://www.microsoft.com/technet/pro...003/technol /directory/ 18) What is the difference between a switch and a hub? Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports. 19) What is a router? Why we use it? Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so. 20) What are manageable and non manageable switches? Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable switches we can't do so. Q. What are the main differences between the following operating systems? A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you know more than just the current version because there will always be a user who has a problem with an older version. By asking this question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The following provides a concise summary of some of the major differences. Windows 2000 and XP Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the hands of consumers. The major changes include the following: Device driver rollback Remote control (single-user terminal services) New Start menu, control panel, and user interface elements Fast user switching Encrypted file system support for redirected folders Better support for roaming wireless networking Enhanced policies Credential Manager Personal firewall Q. What are typical virus sources and how do you prevent virus attacks? A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections: Use anti-virus software. Perform regular updates to the virus software definition files and scan engines. Verify updates have succeeded. Perform regularly scheduled virus checks. Configure software to check all files, not just program files. Educate users on virus attacks, their consequences, and how to prevent them. Know where all software came from. Do regular backups.
  • 4. Develop reporting mechanisms to inform server administrators of observed desktop infections and how these could impact the server environment (such as deletions or corruption of files on public shares, hidden payload files that might have been uploaded to servers, and so on). What is difference between win XP and wn 7 technically Disk shrinking and extending is available in windows 7 Start up and shutdown will be fast user defined theme a program called psr is available Answered by: SHAMIM HAIDER on: Apr 28th, 2012 Many differences in win xp and win7.. 1) ip6 version not include in winxp 2) net meeting not include in win7. 3) driver automatic install. 4) both OS installation different types. 5) win7display look better than winxp Connectivity troubleshooting A user in a corporate network contacts service desk saying he/she has lost network connectivity: how will you troubleshoot the issue? What are the steps to followed? Answered by: shajan on: May 2nd, 2012 If the user getting limited connectivity(APIPA ip address)..We need to check with the ipconfig /release and ipconfig /renew commands Answered by: Javed Khan on: Apr 16th, 2012 Check LAN Cable check ip address check firewall setting than ping ip , gateway and dns How to install os from server to all system? 7 answers We can RIS service in Windows Server 2003SP1 and WDS Services Windows serve 2003SP2 and also WDS in Windows server 2008. but we have .inf file of all systems of a network those boot from network. so we can easily install from Server. Ntldr error meaning When I boot my computer I have seen on my screen " verifying dmi pool data" and then after second line is shown "ntldr is missing..." what is this problem and who can I solve it. If NTLDR is missing then we can copy from Cd (i386) to Systems 32. 1st we can boot from CD and choose the option of repair windows then we can use command of Copy D:i386NTLDR C:windowsSystems32. For Example our CDDVD drive is D:. Ntldr file corrupt or missing you have to copy ntldr from windows xp i386 Folder How to install operating system in usb pen drive? First create usb bootable to pen drive, then select first boot device (usb device) from bios Step 1. Format the USB Flash Disk Run CMD (elevated) and type: 1. diskpart 2. list disk (*now find your USB disk number, youll find it by its size) 3. select disk 1 (*if your USB is disk 1)...
  • 5. What is difference between msi and exe file ? There is no relationship between an MSI file and an .EXE file. An .exe file, like a .com file is produced when source code is complied and creates a Windows executable program. An .MSI file is a file... Answered by: Jisthi Khan on: Feb 21st, 2012 MSI file is only for installation purpose. EXE file can be anything that executes on windows. ******Microsoft outlook pst file size limit******** What is the pst size limit in outlook97, 2000, 2003, 2007 and 2010? In Outlook 2002 and earlier, the .pst files are in the American National Standards Institute (ANSI) format, and the overall size has a limit of 2 GB. In Outlook 2003 and after, the .pst files are in ... MS outlook in 2003 and 2007 is 2GB, in 2010 is 50GB ******Blue screen death*************** What is a blue screen of death ? How do you trouble shoot the computer in such situation ? 1) First check blue screen error number, is it Application Or Hardware 2) Generally this problem comes when problem in RAM so First check computer start with another RAM First Step is Remove the RAM and Clean with a rubber on the copper part of the RAM and insert back again and have a check. If the problem is still there then check the hardware parts of the Computer. *******How a virus program destabilize ms windows XP************ What is the mechanism of combating those malicious program? Evaluate each technique Follow these steps 1)Run ->Cmd 2)Type netsh 3)Firewall 4)Now type in "set opmode enable" to start firewall and "set opmode disable" to stop fire wall. By corrupting, or deleting data