Thomas Calculus 12th Edition Textbook and helping material
Desktop
1. Interview Questions for Desktop Support Technician/Analyst
General Questions
Q. What desktop operating systems are you familiar with?
A. Before you answer this question, you should have some background information on what operating
systems are used within the organization you are interviewing with. Undoubtedly, you will be asked to
elaborate on your skill set with each of these operating systems so it’s best to tailor your elaboration to
the operating systems that are relevant to the hiring manager. This being said, don’t leave out mentioning
experience in other operating systems. You never know whether the company may be evaluating the
migration to a different OS.
Q. Have you used imaging software before? How do you find these tools useful?
A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the
tools that you’ve used. Hiring managers want to assess your in-depth knowledge and experience with
using these tools. This means talking about how you use their various feature sets. (If you have an
opinion, you probably know the product pretty well.)
Q. What are the pitfalls of using imaging software?
A. This question is meant to assess how well you know these products. For example, discussing the
importance of testing the image demonstrates that you use these tools on a regular basis.
Q. Have you used any software distribution tools? If so, which ones and how were they used?
A. Like imaging software, software distribution tools are an important part of your job. Hiring managers
are looking for knowledge that these tools exist and how they can be used to support your organization.
Q. What do you like most about desktop support?
A. Hiring managers are looking for what motivates you. Hopefully your answer will match the
characteristics of the job: being busy, working with different people, and the challenges of learning new
operating systems and configurations.
Q. What do you like least about desktop support?
A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here
would be not being able to resolve a problem in a timely manner for reasons outside your control, such as
hardware failure. Stick to things outside of your control for the best response.
Q. When solving a desktop problem, do you prefer to work with the end-user, your peers, or on
your own?
A. This is another question to determine your fit within the organization. Hiring managers understand that
to be successful as a support technician you will have to work in a team environment. This means working
with other employees, vendors, and end-users on a constant basis.
Q. Can you describe a situation where you have had to deal with a difficult person? How did you
handle it? Would you do anything differently?
A. Desktop support can be very demanding some days. End-users only see their own priority needs and
often are not interested in other demands on your time. This question explores how you deal with a
difficult end-user by understanding their problem, assessing priorities, and communicating a timeframe
2. for resolution. Often good communication can help both sides come to an agreement. Make sure you
have an example with a successful outcome.
Q. How would you say you are able to handle stress?
A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress.
Sometimes from the answer, they can also determine whether you are prone to stress. When responding,
some techniques for handling stress that you may want to talk about include continually evaluating what’s
on your plate and prioritizing, communicating with your manager on what your priorities are, and making
sure that you take a break to reenergize, particularly at lunch time.
Q. What do you see yourself doing two or three years from now?
A. Hiring managers want you to stick around. They realize that you will not be in this position forever, and
they want to make sure there’s a desire to move up within the organization as well as the right fit. They
ask this question to see whether there’s a growth path for you possible within the organization. As a
desktop technician, natural growth paths are team leads, quality assurance, engineering positions, and
entry-level development. Be honest about where you want to be in two to three years, and ask the
interviewer whether they see your career path as a possibility.
Q. How do you learn new technologies?
A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning
technology on their own and who has the foresight to look for training opportunities. Besides the
traditional books and manuals, don’t forget to include user groups, eLearning subscriptions, and IT
professional sites such as CramSession.
Q. How do you prioritize tasks and manage your time?
A. What hiring managers want to know is whether you have time-management skills. Everyone manages
their time differently, but think about how you handle e-mail, when you check voice mail, how you
respond to pages, when you research and document, and how you pick up new trouble tickets.
Q. Imagine the following situation: you receive three simultaneous calls from three
vicepresidents who need assistance immediately. How do you manage these conflictingpriorities?
A. Obviously this is a trick question. What the hiring manager is trying to assess is how you set
expectations with each of the individuals, knowing very well that you won’t be able to assist all of them at
the same time. They are also looking for how you will prioritize each of these incidents, including seeking
assistance from peers and supervisors in order to meet user expectations. Don’t allow the “tyranny of the
urgent” to divert you from managementestablished support priorities.
Q. How would you handle a user who continually misdiagnoses their PC issues?
A. By asking this question, the hiring manager is assessing your customer service skills. In this situation,
you may want to discuss that the key is to not offend the user and turn them off to your support services.
In handling this situation, you would pay particular attention to ways you can build trust with the user and
lead them to the right resolution to their problem.
These components may include:
Acknowledging the user’s diagnosis
Asking the user to reproduce the problem
Finding a solution that works
3. Q. How do you handle setting up new employees?
A. This question is used by the hiring manager to assess your knowledge of common practices within the
IT department, such as setting up new users. Obviously, the IT department plays a critical role in the
productivity of the new employee. The role of the desktop technician is to help ease the new employee
into the resources available to them and get them up to speed quickly. In responding to this question,
you may want to talk about some of the tools you’ve used in
the past to help users acquaint themselves with their new environment. Some tools that help are:
A new-user welcome letter that is customized to the specific user with all their relevant
information including telephone extension, how to access voice mail, and how to log in. It might
also include a FAQ on getting help.
A “Getting to Know Your Helpdesk” document that provides an orientation to helpdesk service,
such as how to contact the helpdesk, its hours of operation, what is and what is not supported by
the helpdesk, and answers to common new-user questions.
Technical Questions
Q. What questions would you ask to help isolate a user’s problem?
A. This question is used by the hiring manger to assess your problem-solving abilities. The following
represent some of the common questions that you would ask the end-user to help diagnose a situation:
When did the problem first start?
Has the system ever worked properly?
What was the last thing done to the system prior to the failure?
Is the issue intermittent or ongoing/constant?
Are there any error messages? If so, what are the specific error messages?
Has any new hardware been added to the system?
Has any new software been added to the system, including downloads from the Internet?
Has anything changed with the system (for example, has it been moved) since the issue presented
itself?
Has anyone else had access to the system?
Are there any environmental factors that could be causing the issue?
Have you done any troubleshooting on the system on your own?
Have you checked all the cables/connections for a tight fit?
Q. What are the main differences between the following operating systems?
A. Unfortunately, most companies have not been able to standardize the operating systems used by users.
It’s always critical that you know more than just the current version because there will always be a user
who has a problem with an older version. By asking this question, the hiring manager is actually testing
your knowledge of different operating systems that you may need to support. The following provides a
concise summary of some of the major differences.
Windows 2000 and XP
Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the
hands of consumers. The major changes include the following:
4. Device driver rollback
Remote control (single-user terminal services)
New Start menu, control panel, and user interface elements
Fast user switching
Encrypted file system support for redirected folders
Better support for roaming wireless networking
Enhanced policies
Credential Manager
Personal firewall
Q. What are typical virus sources and how do you prevent virus attacks?
A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses.
Possible virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To
prevent virus infections:
Use anti-virus software.
Perform regular updates to the virus software definition files and scan engines. Verify updates
have succeeded.
Perform regularly scheduled virus checks.
Configure software to check all files, not just program files.
Educate users on virus attacks, their consequences, and how to prevent them.
Know where all software came from.
Do regular backups.
Develop reporting mechanisms to inform server administrators of observed desktop infections
and how these could impact the server environment (such as deletions or corruption of files on
public shares, hidden payload files that might have been uploaded to servers, and so on).
Q. What are some of the guidelines you would recommend for implementing security at the user
level?
A. Security is a major part of the desktop technician’s day-to-day responsibilities. As the closest point of
contact to the end-users, technicians need to be savvy on the different methods for enforcing security.
Some of the top techniques are included below.
Anti-virus software:
Ensure that all users install and regularly use anti-virus software on their PCs.
Instruct users to immediately notify the helpdesk when they suspect they’ve contracted a virus.
Password security:
Instruct users not to give out their passwords.
Instruct users not to write down their passwords.
Instruct users to make sure their password cannot be easily guessed by using a combination of
alphanumeric characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { } / ? < > , ; : |
` ’ ” .).
Instruct users to change their password if they think there is even a slight chance someone knows
it.
5. Instruct users to ensure their password is at least eight characters long.
Instruct users not to use a variation of their user ID.
Regularly change passwords on Administrator accounts on PCs (NT, Windows 2000 and XP)
Desktop security:
Instruct users not to leave their workstation logged in overnight.
Instruct users to enable screen savers that automatically lock their PC when there is no activity on
it for more than five minutes.
Microsoft Active Directory Questions.
What is Active Directory?
Active Directory is Microsoft's trademarked directory service, an integral part of the Windows 2000
architecture. Like other directory services, such as Novell Directory Services (NDS), Active Directory is a
centralized and standardized system that automates network management of user data, security, and
distributed resources, and enables interoperation with other directories. Active Directory is designed
especially for distributed networking environments.
What is LDAP?
Short for Lightweight Directory Access Protocol, a set of protocols for accessing information directories.
LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And
unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because it's a
simpler version of X.500, LDAP is sometimes called X.500-lite.
Can you connect Active Directory to other 3rd-party Directory Services? Name a few
options?
Yes. Microsoft Identity Integration Server (MIIS) is used to connect Active Directory to other 3rd-party
Directory Services (including directories used by SAP, Domino, etc).
Active Directory Lightweight Directory Services (AD LDS) : This service is ideal if you are required to
support directory-enabled applications. AD LDS is a Lightweight Directory Access Protocol (LDAP)
compliant directory service.
Active Directory Rights Management Services (AD RMS) : This service augments an organization’s
security strategy by protecting information through persistent usage policies. The key to the service is that
the right management policies are bound to the information no matter where it resides or to where it is
moved. AD RMS is used to lock down documents, spreadsheets, e-mail, and so on from being infiltrated
or ending up in the wrong hands. AD RMS, for example, prevents e-mails from being accidentally
forwarded to the wrong people.
The Application Server role : This role supports the deployment and operation of custom business
applications that are built with Microsoft .NET Framework. The Application Server role lets you choose
6. services for applications that require COM+, Message Queuing, Web services, and Distributed
Coordinated Transactions.
DHCP and DNS : These two roles install these two critical network service services required for every
network. They support Active Directory integration and support IPv6.
Fax Server role : The fax server lets you set up a service to send and receive faxes over your network.
The role creates a fax server and installs the Fax Service Manager and the Fax service on the server.
File Server role : This role lets you set up all the bits, bells, and whistles that come with a Windows file
server. This role also lets you install Share and Storage Management, the Distributed File System (DFS),
the File Server Resource Manager application for managing file servers, Services for Network File
System (NFS), Windows File Services, which include stuff like the File Replication Service (FRS), and so
on.
Network Policy and Access Services : This provides the following network connectivity solutions:
Network Access Protection (NAP), the client health policy creation, enforcement,and remediation
technology; secure wireless and wired access (802.1X), wireless access points, remote access solutions,
virtual private network (VPN) services, Radius, and more.
Print Management role : The print services provide a single interface that you use to manage multiple
printers and print servers on your network.
Terminal Services role : This service provides technologies that enable users to access Windows-based
programs that are installed on a terminal server. Users can execute applications remotely (they still run on
the remote server) or they can access the full Windowsdesktop on the target server.
Universal Description, Discovery, and Integration (UDDI) : UDDI Services provide capabilities for
sharing information about Web services. UDDI is used on the intranet, between entities participating on
an extranet, or on the Internet.
Web Server role : This role provides IIS 7.0, the Web server, ASP.NET, and the Windows
Communication Foundation (WCF).
Windows Deployment Services : These services are used for deployment of new computers in medium
to large organizations.
Hyper-V Role : A Hypervisor platform to host and manage virtual machines in an efficient way.
Introduced in Windows 2008.
Applying SQL Server SP3 Failed, How to
fix it?
1. This is a common error we will get regularly in SQL clusters.
2. If you trying to install the SP3 on the active node, make sure that
there is nobody logged on to the passive node. Why because when
7. the active node tries to install the SP3 on passive node remotely, it will try to look for some processes. So
at that time if nobody on the passive node, it will install without any errors.
3. If any locked files found while you installing the SP3, ignore them and continue with installation, you
can reboot both nodes one at a time later.
4. Finally after rebooting the both nodes, check the versions of the application on them. Make sure the
version should be same on both nodes. That's it we are done.
Note : This applies to SQL Server 2005 Edition only.
Thank you for your support, keep visiting my blog.
How to RENAME a Windows 2003 Domain ?
Guys,
Domain renaming is a new future included in Windows server 2003. We can rename the domain without
making it down. That is the beauty of Windows 2003. In some situations, one company acquires the other
like Sun Microsystems was acquired by Oracle. In this type of cases, if they want to rename all the
domains in Sun Microsystems to Oracle corporation how they will do it. Its just an example, i am not
telling those guys are following this. But here what i am trying to explain is that, the Microsoft has
released a standard procedure to rename the domains that are in production environment.
Please follow the steps from the below document carefully to rename your prod domain.
How to reset TCP/IP in Windows or How to delete TCP/IP
entries from Registry ?
Resetting TCP/IP solves many problems. So how to reset it ?
Actually all the parameters of the TCP/IP for every interface is stored in Windows Registry Database. Its
not stored in a single location, but in many locations. So finding all the values and deleting them manually
is not at all possible. It may disturb our system configuration if you edit the registry manually. My sincere
request is backup your system registry before you modify anything, otherwise you will get lot of issues. :)
So to simplify this situation, we have a command in windows, which takes care of everything in resetting
tcp/ip. Finally the beautiful command is ―netsh‖. It really helps us in many conditions. And it can be
available as a download from microsoft.com for older machines.
How to work with it ?
1. Apply command netsh at the command prompt.
8. 2. Type interface command at netsh> prompt
3. Type ip command at netsh interface> prompt
4. Type reset reset.txt command, to reset the tcp/ip.
But here what is reset.txt, we are just sending the output details to that file, if anything goes wrong you
can get back to your previous config from this file.
5. Go and look at your tcp/ip properties tab, you will set to ―Obtain Automatically Mode‖, surprised!!!
6. This command is used in situations like follows….
sometimes DNS servers information will not erase from the registry
sometimes virtual ip settings also not erase from the registry
sometimes configuration changes doesn’t takes place
What is Clustering? How it works?
What is Clustering?
Clustering is a technology in which one or more computers work together as a single instance by sharing
their resources. Clustering is used mainly for redundancy of the services hosted on it. In other words, in a
cluster all the hosts are work together, if one of the host fails all the services hosted on it comes online
immediately on to another host with out any downtime. Apart from the redundancy a cluster is used for
load balancing also, in this case what ever the load comes to the cluster is shared by all the hosts in it.
What are the types of Clusters and How do we configure them ?
Clustering is two types, Active/Active and Active/Passive.
Active/Active : In this scenario all the hosts configured in the cluster takes all the load comes to that
cluster, and if any one of the host fails the remaining hosts share the requests to make it online all the
time. If you have same copies of application configured on multiple hosts this type of clustering is
applicable.
Active/Passive : In this scenario load balancing is not works, as at any point of time only one host
receives all the requests, and if any of the host fails the remaining hosts takes those services and make
them available online. That means, only one host is active at any point of time and the other one is
passive.
What are the requirements to configure a cluster and How it works?
9. There are so many requirements to configure the cluster, but all those requirements are inter dependable
on each other. And these requirements (we call them as resources in clustering), are shared between all
the hosts, that means these should be available to all the hosts in the cluster. for example, SAN storage
resource, the storage which configured in network and is accessible by all hosts (Click here for SAN
Information). In the same way all the resources are accessible by all the hosts in a cluster. If one of the
host fails, all these resources are moved to another host. In detail, at a particular time one host is
accessing these resources, at that time those are locked by that particular host, whenever this host fails,
the lock was released and those resources are locked by another host. But in active/active clusters these
resources have multiple copies as multiple instances on all hosts.
See the below video for better understanding.
What is Cloud Computing? How it works ?
Cloud computing…the word which is been in the industry from past few years. The technology became
very popular now a days. so what is the secret behind it and what makes this technology successful? May
be these are the questions which are currently in your mind. Let me explain this emerging technology in
simple way.
Generally what we all do is, we install whatever the required apps like MS Office, Photoshop, Acrobat
Reader etc on to our machine once after the OS installation is finished. But here in this case, these apps
are running on a specific hardware and OS. They are having some limitations, along with those limitations
they are having some performance issues because they are dependent on Hardware and OS.
If we take the same scenario with cloud computing, a cloud is a collection or grid of computers with
different hardware and OS’s installed on them and acting as a single virtual computer. So what happens
when we install/run a website or an application on to this cloud, it takes all the advantage of the total
hardware. And these applications (ex: Google docs) are OS independent also. So with all the resources
sponsored by all the machines the applications runs faster. If the demand for that application is increased
you can simply add some more machines to this cloud without disturbing the application and current
cloud.
Advantages:
You can access the application from anywhere in the world
As it is accessed from the web, you can run it on any of the OS & Hardware
No need to install applications on to your machine
Best Live Example : Cloud Computing - ITaS - Cloudshare
For better idea how the cloud apps works, go and take a look at the below web sites.
Photoshop Like App = Splashup (www.splashup.com), Pixlr (www.pixlr.com)
MS Office Like App = Google Docs (docs.google.com)
Messenger App = Meebo (www.meebo.com)
10. OS like interface = beta.cloudo.com (simple) , www.oos.cc (resembles windows), www.eyeos.info (with lot
of apps)
Read this article for better understanding
Cloud Computing : ITaS (Infrastructure as a Service)
How to fix Remote Desktop Connection Problems in Windows
Server 2008?
Remote desktop is a piece of software which comes with all the windows operating systems which is
useful the manage windows machines remotely.
To configure this on a Windows Machine we need to follow below steps.
1. Configure the machine with correct network settings and make it is pinging from other computers.
2. Check the firewall options to allow the Remote Desktop
Connection.
3. Right Click on My Computer, Select Properties and go
to Remote Tab. Enable Remote Desktop option. If you
want to specify a specific users on the machine to connect
remotely through Remote Desktop click on Select Remote
Users and add the users to the list.
4. Try to access this machine using the mstsc client from
another machine. If it connects perfectly everything OK.
5. Again do these steps another machine to get practiced.
That's it.
NOTE : IN WINDOWS 2008 IF THE FIREWALL SERVICE
IS STOPPED THE SERVER WILL NOT ACCEPT THE
REMOTE DESKTOP CONNECTIONS. MAKE SURE IT IS
RUNNING AND IF YOU WANT TO STOP THE
FIREWALL, JUST CLICK IT OFF IN WINDOWS
FIREWALL OPTIONS.
Interview : A quick view of yourself
See these videos first before reading the content… so informative and so
funny… Video1: An Ugly Answer, Video2: A Bad Answer, Video3 : A Good Answer
In my experience Interview is nothing but ―Marketing Yourself‖, the word changes your confidence level.
This has been told to me by my brother Krishna Prasad(May be he read it some where else). Opportunity
comes only one time, and that is the only door to your success in the career. When the opportunity is in
your hand, try until it goes of from you. So try hard to market yourself in every possible way.
The Power of Support
11. A best example for this is, i got job in AT&T when the entire world is in a very deep financial crisis. That
means what ever happens, what may goes down the support industry will never stop. Why because if
support stops, everything will be paused. For example, if the customer care for your mobile will not
respond or if they don't provide customer support, their business will get lose lot of customers. In the
same way we will provide our support to various companies around world. Those companies need our
support, because they need to provide support to various customers around world. If a company has
website about its products, what makes that company profitable? First thing, the website needs to be run
continuously, obviously it is dependent on servers, hardware and network etc etc.. so may be so many
people providing their support to make it available continuously in the back ground. That is the reason i
can say, we are in the correct place, we have lot of opportunities. Only thing we need to get succeed in
this industry is having optimized skill set.
Get Prepared
When an opportunity is in your hands, get prepared to achieve it. That is your ultimate target, if you lose
this opportunity, you even don’t know when the next one comes. So Handle with Care. All you need to do
is, prepare well in your area of practice. Be confident, Be Frank, Say no idea to unknown answers, Be
Positive, Be Interactive, Be Proactive. :) lot of things right. All these qualities are in you. Try to develop
them, try to bring out them when the time comes, try to expose them. Success is yours.
“Plan the Implementation, Implement the Plan”
Interview Requirements
Well prepared Resume – It should resemble your career, don't include/repeat unnecessary things.
Well prepared Mindset – Ultimately this is required for those who has interview phobia like me.
Positive Attitude – Life will never stop if this goes of from your hand, but try your level best to get it.
Interaction – Need to interact with the interviewer to market yourself, Keep eye contact with him.
Confidence – I noticed so many times, my confidence will get decreased whenever i am going for an
interview, this happens to so many. It makes you a loser. Avoid thinking about the interview and
interviewer to get rid of this problem. Meditation is the best practice i suggest.
“ Your life today is the result of your attitudes and choices in the past.
Your life tomorrow will be the result of your attitudes and the choices you make today.”
This post is useful or not, i don’t know. But these are the things i understood from my experiences and i
want to share them with you.
Understanding DNS : Domain Naming Server
Hi Friends,
First of all thanks for visiting my blog. I added ―Search‖ option for my blog, you can easily search for a
particular topic using Google Search. If you are facing any issues, or if you have any questions please
mail me atcharan@isupportyou.net Thanks.
12. Coming into the Topic…………….
What is DNS?
DNS stands for Domain Naming Server, it is a standard of naming domains in any operational
environment (Windows,Linux,Solaris,Any environment). It is a server which contains a database of all the
domains and all the servers which are associated with those domains.
Why it is Used?
Its a service dedicated to identify all the machines (domains & member servers) in a network. To make
this possible, every machine has to be registered in the authoritative DNS server of that network. That
means every operational network should have a dedicated DNS server to enable identification and
communication between the machines.
How it works?
As i said, it is dedicatedly used for identification, in technical words for “name resolution”. Every
machine in a network has a dedicated IP address & hostname as its identity. Whenever a machine tries
to communicate with another machine on the network it should first identify the second machine, that
means it should know the ip address of that particular machine. After knowing the identity (i.e ip address),
it will directly communicates with the second machine. So to speak, a machine should know the ip
address of the another machine, with which its going to communicate before it starts. Another question…
Why the hostnames are used, if the machine already have an identity in the terms of IP address?
Hostname is an English word which is useful for Human remembrance. It is impossible for a human being
to remember lots of IP addresses, but it is possible to remember English names of the same hosts (as
we configure the hostnames generally with employee name or department name or location name etc).
For example we can rememberwww.yahoo.com but not its ip address, because we are not having only
one website on the internet. To sum up Hostnames and IP addresses both are used to identification and
communication between two machines in a network. But machines are only able to communicate with the
IP addresses and which are impossible to remember for Humans (Keep in mind machines never
communicate with hostnames). To solve this situation DNS was implemented. It basically contains a
database of host records in a network. A host record contains ―Hostname : IP address‖, see the image
below for better under standing. Out Internet is purely depended on DNS, when we access a particular
website we will give its English name, when we press ENTER immediately the machines starts finding the
IP address of the website using the DNS server configured on it. I will explain the name resolution
process in details. And one more thing about the DNS is, it is the only largest database on the internet
which changes every second. If this database goes down by a chance, we must remember all the ip
addresses to access the internet. hahaha it will not happen, why because we have so many backup
solutions already implemented.
13. How the name resolution takes place?
I will explain this concept with internet as an example. Before that i want you to check some settings on
your machine. Check the TCP/IP properties and see whether DNS server is configured or not. If you are
seeing obtain automatically option, open command prompt and type ―ipconfig /all‖ and press Enter. You
will get DNS servers information along with your machine’s IP address. Now lets talk about the scenario,
When you try to open a website like www.google.com, what happens next? how your machine gets IP
address of the www.google.com. Here it goes….
1. The request sent to the DNS server which is configured on your machine.
2. The DNS server checks for the host record of www.google.com in its database, if it contains a record
forwww.google.com, it will directly send response with the IP address of www.google.com. Otherwise it
starts requesting another DNS server.
3. Before it goes to another DNS server, how it identifies which DNS server is responsible for this request
? It checks the entire hostname (it is called as FQDN : Fully Qualified Domain Name), i.e in google’s
case www.google.com. (note the FQDN ends with a period, and this period is called as root domain).
4. Every DNS server contains a roothint file associated with
it, and the same will be used to identify the responsible
DNS server. Root hint file contains Master DNS servers
information. Here you go it looks like this. These are the
master DNS servers for .com, .net, .edu, .org domains etc.
5. So in your case, the domain is .com, DNS server sends
request to .com master DNS server (for ex: assume it as
198.41.0.4), the .com master DNS server contains name
server records for all machines ending with .com . That means it definitely contains DNS server IP
address for google.com. In the same way it contains all .com servers yahoo.com, microsoft.com & so on.
6. It does not contain the IP address of google.com, it contains DNS server IP of google.com.
7. So then the request is forwarded to google.com DNS server, in that server you will have a host record
with the name www and its IP address. Finally you reached it. With the found IP address the request
comes back as a response in the same reverse way to the DNS server which is configured in your
machine, that DNS server tells the IP address ofwww.google.com to your machine.
14. 8. This process happens in milliseconds in the background. i.e by the time you will get ―Website found
waiting for reply‖ message in the status bar of your internet explorer.
9. Oh my god!!!! Is that simple? Yes it is. The same process occurs in corporate networks also. But the
requests are handled by their local DNS servers only.
DHCP : Dynamic Host Configuration Protocol
Hi Friends,
Let’s support our organizations using simple way of IP Management. DHCP stands for Dynamic Host
Configuration Protocol.
Dynamic = Automatic
Host Configuration = Basic Network Configuration
Protocol = Rules which needs to be followed to make this happen.
DHCP is an application which is either installed on Windows Server Operating system or on UNIX OS to
service an enterprise in the aspect of IP configuration and management. Its main goal is to provide &
configure the client computers with specific ip configuration to enable identification and communication in
the network. Prior to DHCP another protocol have been used, it is called BOOTP. BOOTP(Boot Protocol)
has only one future that is Reservation. So the administrators who are worked with BOOTP, need to get
all the MAC addresses and write them on a notepad to enable the use of BOOTP. After writing all the
MAC addresses, the same need to be added to BOOTP table with corresponding IP addresses. That
makes lot of work for administrators, even though its an automated process, but admin’s need to work a
lot to get the MAC addresses of all the machines in the network. Later it has gained lot of improvements
to serve the network and became DHCP.
How to Install and Configure DHCP?
It very simple and straight forward process. First you need to install the application from Add/Remove
Windows Components. After installing you will have a console in the Administrative Tools. I think instead
of giving lot of steps.. i will post a simple video of 7mins, just watch it for better understanding of this
concept.
Video Link
Now you are ready with your DHCP server installed and configured. so lets talk about why and how it is
used? As i said previously it is used for Automatic assignment of IP addresses to client computers which
are in the same network with DHCP server. This is the way it will be used. Whenever a computer
powered on, it will check itself for the network configuration, if it is configured with manual ip address, the
machine broadcasts a message that it was powered on. If it is configured to get the ip automatically, then
the machine broadcast a message in search of DHCP server. Then starts the process. It is simply called
as ―DORA‖ process.
D = Discovery – Request for discovering DHCP server from client machine.
O = Offer – Respective DHCP server Offers the IP Configuration.
R = Received – Client receives the IP configuration.
A = Acknowledgement - Client Acknowledges that it has received the IP configuration.
Once the client gets the IP configuration, it will then broadcasts another message to all other clients in the
network with its identity.
Interview Questions related to DHCP
1. Explain the DORA process
2. What is an exclusion range and reservation?
An exclusion range is a range of IP addresses which needs to be excluded from DHCP scope, so that
these IP’s never assigned automatically. A reservation is an IP address will be reserved for a server every
time it boots up and it has been done using the MAC address of that server. Before configuring
reservations, we need to exclude them from DHCP scope.
3. How do you configure the AD Server, DNS Server, IIS Server and FTP Server using the DHCP
server?
Using the reservations only, so that every time the same address will be assigned to the server. If you
take a DNS server, it should have same IP all the time, because it is responsible for name resolutions in
15. that network. If the IP address getting changed every time, its very difficult to the clients which are
requesting name resolutions. That is the reason, it should have same IP all the time, we can do that
automatically using reservations.
4. What is DHCP relay agent?
DHCP relay agent, is an option configured on DHCP server. Which enables the client machine requests
to go through the routers. That means, if the DHCP server is in one network and the client is in another
network, these networks are connected by routers. By default the routes will never allow the DHCP
packets through them, by configuring this option, these requests will pass between two networks
Active Directory : Behind the Directory
Hi Friends,
As you know Active Directory is the main database for Centralized Administration of Enterprise
Environment, i want to share something with you about this extra-ordinary directory service.
Active Directory will be installed on a stand alone Windows Server 2000/2003/2008 operating
systems when we run dcpromo command. It is an integrated module which resides hidden until we run
dcpromo.
Active Directory stores all most all information about an enterprise. Which includes user accounts,
computer accounts, user groups, group policies, shared folders, network printers, etc. All this information
is stored in the Active Directory Database. The files associated with the Active Directory database are
located under C:WindowsNTDS and the files are as follows…
ntds.dit This is the main file for Active Directory. All the AD information will
be stored in this file.
edb.log When a change is triggered to AD database, first the information will
be written to this file, and the same will be then written to ntds.dit. The
AD performance depends on how fast the updates will be transferred
from edb.log to ntds.dit
res1.log & Initial size of these files will be 10MB each, used as reserved space for
res2.log AD updates, in case of Low disk space issues the same files will be
used to save the AD updates.
edb.chk The checkpoint file (edb.chk) records transactions committed to the
AD database (ntds.dit) during shutdown. A "shutdown" statement is
written to the edb.chk file when we shutdown the AD server. Then,
during a reboot, AD determines that all transactions in the edb.log file
have been committed to the AD database. If, for some reason, the
edb.chk file doesn't exist on reboot or the shutdown statement isn't
present, AD will use the edb.log file to update the AD database.
temp.edb This is a scratch pad used to store information about in-progress
transactions and to hold pages pulled out of Ntds.dit during
compaction.
The file extension .DIT stands for Directory Information Tree.
The file extension .CHK stands for Check Point file.
If the DNS is Active Directory Integrated, its data also stored with AD Database.
16. Using System State option in NTBACKUP we can take the back up of Active Directory.
When we promote the secondary domain controller all this data from these files will be replicated
to its database.
Active Directory uses Kerberos Authentication.
LDAP(Light Weight Directory Access Protocol) is the Protocol used to query the Network
Directories like Active Directory. It uses port number TCP 389 to query AD.
In Windows 2008 Active Directory comes as a Service, to decrease reboot frequency.
AD Users and Computers, AD Sites and Services & AD Domains and Trusts are the three
consoles which are used to maintain AD database in GUI.
How to join a computer to the domain which is in different
network(VLAN)?
This is a real time environment requirement. Let’s see how can we achieve this.
Make sure both VLAN’s are communicating
Disable windows firewall on the AD machine and Add exceptions to the following ports.
Open required ports for DNS, NetBIOS, RPC, LDAP and ICMP in both ways from source to
destination.
Set the AD gateway as the default gateway for client machine.
Ensure that all the required firewall ports are open to enable communication between domain controller
and client which are in different networks.
Active Directory : Replication
Hi Friends,
Welcome Back !!!! :)
In the previous post i discussed something about Active Directory and the files associated with it. In this
post i want to tell you about the magic behind Active Directory replication.
What is meant by Replication?
Replication is the process of making a replica (a copy) of something. A replication is a copy. Using
replication process we can copy the active directory database from one site to another site. This process
is initiated when we create additional domain controller for the existing domain. That means we are
creating a backup/secondary copy of the original domain
controller to make sure it is available in the case of failures.
How the Replication happens in Windows Server?
After replica of Active Directory implemented, from there on
every change that is being made to Primary copy will be
replicated to Secondary. When you are trying to implement a
replica for the first time, in the process of implementation all the
objects from Primary Domain Controller will be copied over to
the Secondary Domain controller. At this point both DC’s are in
17. sync state. But when a new object created or deleted in/from the Primary DC, the same will be copied to
Secondary DC immediately. Remember in Windows 2003/2008 the Secondary DC are always read-only
copies. In the situation of failure of the Primary DC, we can change the Secondary DC as read/write copy.
When the Secondary DC acting as Read-Only copy, it will not allows us to create or delete objects. It only
updates it’s information from the Primary DC. This was implemented in this way to avoid conflicts in the
objects. Every object has an property called USN (Update Sequence Number), depending on this
attribute the Secondary DC identifies whether the updates are available or not. For example, for a user
object if the USN is 124 on Primary DC, and the same is 123 on Secondary DC, then the secondary DC
requests the Primary DC to send the updated information. In this way both DC’s are in sync all the time. If
one of the DC goes down, we still have updated information in the Other.
If you are creating the replica in same location as the Primary, there is no issue at all in the process of
replication, but if you are creating the replica in branch office location there might be some problems
associated with the design. You can manage the inter-site (between sites) or intra-site(same site)
replication using the AD Sites and Services. A site is a collection of computers which are working together
in the same IP Subnet. Replication is controlled by the Site Link objects created in between the sites. We
can schedule the replication process and replication interval using the Site Link Properties. The Site Links
are ―automatically generated‖ using the ISTG(Intra Site Topology Generator). KCC (Knowledge
Consistency Checker) is the part of ISTG which generates Site Link objects in Inter-Site replication. If in
any case if the automatically generated site links are not working for some reason, we can create them
manually usingrepadmin /kcc command.
If you have multiple domain controllers (multiple copies)
in each site, replication process consumes high amount
of bandwidth. To avoid this, every site must have only
one domain controller acting as the replication partner.
It is called as Bridgehead server. This bridgehead
server again sends the updates to the other DC’s which
are located in its site. In the image, the server in Russia
acting as Bridgehead for Server in Germany(Think it as
Russia Second server).
By Right clicking on a site link and by selecting ―replicate now‖ you can initiate replication between the
domain controllers in same site or different sites.
18. Blue screen death
Asked By: tshepisobo | Asked On: Sep 20th, 2011
11 answers
What is a blue screen of death ? How do you trouble shoot the computer in such situation ?
Answered by: Maz on: Oct 5th, 2012
In most cases blue screen is there for few seconds and system keeps rebooting. First of all you need to
get to the error message. A very good feature of win xp is to press F8 on startup and select do...
Answered by: Ravinra Kulkarni on: Feb 18th, 2012
1) First check blue screen error number, is it Application Or Hardware
2) Generally this problem comes when problem in RAM so First check computer start with another RAM
Answer Question Select Best Answer
Ie browser redirect
Asked By: Big Al | Asked On: May 12th, 2008
7 answers
A user calls and every time he launches internet explorer he gets the page cant be displayed right before
this his virus software had detected virus...What could be causing this problem you checked the settings
in ie and its has the correct homepage
Answered by: Abhishek Sharma on: Oct 1st, 2012
The system is affected with M a l w a r e. The only only solution to remove is to boot with bootable
antivirus rescue disk.
Answered by: Mandar Mench on: Jul 26th, 2012
Due to your network firewall or due to old internet explorer u r using on that pc this problem may be
occur so you can do one thing reset all setting to default delete all cookies and upgrade your browser
your problem may be solved .
Answer Question Select Best Answer
What is the difference between outlook & outlook express?What is ip range in
networking side? How we will troubleshoot outlook?How we will configure ldap
on outlook?
Asked By: rajeevsoniji | Asked On: Aug 1st, 2007
17 answers
Answered by: Salik on: Sep 30th, 2012
Guys have done a gr8 job, nothing else left to be answered..
I just wanna say:
Gilbert, Hitesh & Syed_nrpt has provided wrong set of answers.
Everyone else (Upto my this post/msg) is right about IP range.
Answered by: Yogesh Kumar on: Apr 30th, 2012
Outlook is the edition of Microsoft Office (Outlook file Extension is .pst) & Outlook Express is the edition
of Internet Explorer (Outlook Express file Extension is .dbx).
Answer Question Select Best Answer
How do you backup emails on ms outlook?
Asked By: SiziRose | Asked On: Apr 26th, 2011
4 answers
Answered by: Umesh Raghav on: Sep 28th, 2012
Go to control panel open the mail option then open the data file after that select the personnel folder and
click on open folder copy that .pst and close all the options which were open and then paste that .pst
backup where you want to place that backup
Answered by: shashi021 on: Jun 23rd, 2011
19. install PST Sync (http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=9003) and set
up Backup path for the respective PST.
Answer Question Select Best Answer
Spool service
Asked By: Big Al | Asked On: May 12th, 2008
9 answers
How can I tell if the print spool in running and where is it located? Where does it store spooled print
jobs?
Answered by: vikara on: Sep 26th, 2012
DHCP: Port 546 (DHCP Client port for IPv6) should not be used by any other process while rogue
detection is enabled
Answered by: rakesh reddy on: Sep 23rd, 2012
type services.msc and search for print spooler service and make sure it is set to automatic, and now try
to print hope your issue should be fixed by now.
Answer Question Select Best Answer
What is the difference between language and technology?
Asked By: jeevan | Asked On: Aug 19th, 2011
2 answers
Answered by: Rajan Choudhary on: Aug 19th, 2012
Technology is the way in which a current problem statement is Resolved. and Language by the way in
which the technology has been Implemented. e.g Silverlight is technology which comes from Microsoft...
Answered by: Nikhil on: Sep 4th, 2011
Launguage is used to programing to develop applications.
Technology is set of programmes to find a new way of solving current systems backlogs.
Answer Question Select Best Answer
Connectivity troubleshooting
Asked By: kalahari | Asked On: Sep 26th, 2010
9 answers
A user in a corporate network contacts service desk saying he/she has lost network connectivity: how will
you troubleshoot the issue? What are the steps to followed?
Answered by: praveen on: Aug 2nd, 2012
!st check thee cable...and immediate click on network connectivity...go to run cmd den ipconfig /release
then..ipconfig /renew den refresh2 to 3 times on desktop...definitely..it should works...
Answered by: Vinit on: Jul 26th, 2012
If you're getting an error message limited activity by right clicking on the connectivity icon on the task
bar, use ipconfig /release then ipconfig /renew commands refresh the desktop and check. If th...
Answer Question Select Best Answer
Remote connection
Asked By: ras2008 | Asked On: Jun 7th, 2008
17 answers
If you have client in a different location and want to access that client from server, what is the best way
to access that client from server?
Answered by: praveen on: Aug 2nd, 2012
domain and remote option...must be there or vnc(virtuval net computing)its the solutions
Answered by: khojem praymaswala on: Aug 2nd, 2012
best way to go throgh VNC.
and also remote desktop.
20. Answer Question Select Best Answer
Java application installers
Asked By: Renee | Asked On: Sep 12th, 2011
1 answer
What are the most common tools to develop the installer of Java applications or applications in general?
Answered by: Ketan Chiplunkar on: Jul 29th, 2012
you can use the Eclipse software & Net beans software.
Eclipse is best for All Java Applications except EJB.
EJB you can do in Net beans.
Answer Question Select Best Answer
Enable usb ports
Asked By: blayne | Asked On: Sep 20th, 2011
8 answers
I have disabled all usb ports on my stationary computer, my mouse and keyboard don't work... How do I
enable it back? Please help... i cannot press f2 to get into bios, nothing works... Keyboard or mouse...
Answered by: Vinit on: Jul 26th, 2012
since you've disabled USB ports pressing F2 will not work if you're using a USB keyboard. I recommend
you to boot your system from a different source and format your system HDD or you can use a non-USB
keyboard to enter BIOS setup and enable USB ports.
Answered by: Shamim haider on: Apr 25th, 2012
First system restart and press del or F2. after bios inter enable USB keyboard & mouse support,and use
ps2 keyboard and mouse.
Answer Question Select Best Answer
What type of problems are associated with operating system like window xp?
Asked By: alam | Asked On: Aug 13th, 2007
4 answers
Answered by: Mandar Mench on: Jul 26th, 2012
If you installed winxp and windows 7 both operating system in dual boot you can define which system by
default to be start through editing in boot.ini or from go to start - run -put following command ...
Answered by: Khandokar Mahafuz Hassan on: Jun 28th, 2012
If you are installed
Multiple operating system, select which one you want it (that files Boot.ini)
Answer Question Select Best Answer
What is difference between win XP and wn 7 technically?
Asked By: Dastagir Amir Hamaja | Asked On: Jun 18th, 2011
17 answers
Answered by: Mandar Mench on: Jul 26th, 2012
The major difference between win xp and windows 7 is graphics and than it is more secure than winxp
and it has inbuilt utility like bitdiffender to encrypt the data on drive which is only accessible i...
Answered by: Simasingh on: Jun 16th, 2012
windows diffusion in windows 7 provide maxi mam security in operating system but windows xp this is
not future use
Answer Question Select Best Answer
Bootloader
Asked By: chetan_01 | Asked On: Dec 7th, 2008
4 answers
What is bootloader?
Answered by: Mandar Mench on: Jul 26th, 2012
21. Actually bootloader is a windows default utility through which when we start our system it check all the
details related to system boot means on which partion is primery and active as well as where th...
Answered by: ajey53 on: Jun 17th, 2012
Boot Loader is the part of the OS that enables booting process and loading the particular OS while start
up. The function of the Boot Loader is to perform and start up options while the users turn on...
Answer Question Select Best Answer
Ntldr error meaning
Asked By: adpatel33 | Asked On: Apr 7th, 2012
5 answers
When I boot my computer I have seen on my screen " verifying dmi pool data" and then after second
line is shown "ntldr is missing..." what is this problem and who can I solve it.
Answered by: Mandar Mench on: Jul 26th, 2012
when ntldr missing message shown than insert the os bootable cd . than go to recovery console by
pressing first R and than copy that file from i386 folder from cd to os system 32 folder and than run ...
Answered by: Vikas Kumar on: Jun 5th, 2012
Yes he is right,You need to copy it from the CD or DVD and than paste it,other wise it will not load the
OS from the HDD as it loads the OS from the bootable media
Answer Question Select Best Answer
How will you install operating system in more than 50 pc at a time when the all
pcs having same configuration.
Asked By: san_pradeep59 | Asked On: Sep 18th, 2007
19 answers
Read Best Answer
Editorial / Best Answer
Answered by: prasad samant
Answered On : Nov 20th, 2007
Other way is
If the pcs are on network you can have RIS or WDS setup. Requirement for clients is they should have
network bootable NIC
Answered by: ritesh on: Jul 14th, 2012
we can use another service like RIS (Remote Installation Server).
By the help of it we can install o/s to multiple systems
Answered by: raj on: Jul 1st, 2012
ghost is not secured installed WDS (windows deployment services) it is the way for network instillation
Improve Answer
Removal of virus
Asked By: Big Al | Asked On: May 12th, 2008
8 answers
You have a virus that loaded several processes every time you stop the process it restarts itself you tried
going into safe mode but it does the same thing...You found the dll files associated with it but you cant
stop or delete them what is the easiest way to repair?
Answered by: mukeshg on: Jun 1st, 2012
Reinstall the operating system, at the time of installation choose repair option, it repairs all corrupt dll
files, and keep ur data as it is.
Answered by: thilak on: May 12th, 2012
First Remove the system from network and run the virus scan. Deleted the file from Quarantine if the
system scanned fully copy the data in externaml drive and format the syustem
22. Answer Question Select Best Answer
How to install os from server to all system?
Asked By: tejeshwarao | Asked On: Sep 1st, 2011
7 answers
Answered by: Yogesh Kumar on: Apr 30th, 2012
We can RIS service in Windows Server 2003SP1 and WDS Services Windows serve 2003SP2 and also
WDS in Windows server 2008.
but we have .inf file of all systems of a network those boot from network.
so we can easily install from Server.
Answered by: Himanshu dihauliya on: Mar 31st, 2012
100% we will use WDS. Window Deployment Services Feature, That is Available in Windows 2008....
Answer Question Select Best Answer
How to install operating system in usb pen drive?
Asked By: Mohd.Mumtaz007 | Asked On: Mar 9th, 2012
2 answers
Answered by: Shamim Haider on: Apr 28th, 2012
First create usb bootable to pen drive, then select first boot device (usb device) from bios
Answered by: rickevans on: Mar 9th, 2012
Step 1. Format the USB Flash Disk Run CMD (elevated) and type: 1. diskpart 2. list disk (*now find your
USB disk number, youll find it by its size) 3. select disk 1 (*if your USB is disk 1)...
Answer Question Select Best Answer
What is difference between msi and exe file ?
Asked By: pkarle | Asked On: May 14th, 2011
7 answers
Answered by: itmanpjs on: Apr 26th, 2012
There is no relationship between an MSI file and an .EXE file. An .exe file, like a .com file is produced
when source code is complied and creates a Windows executable program. An .MSI file is a file...
Answered by: Jisthi Khan on: Feb 21st, 2012
MSI file is only for installation purpose. EXE file can be anything that executes on windows.
Answer Question Select Best Answer
Desktop icons
Asked By: Abdul subahan.H | Asked On: Dec 7th, 2008
6 answers
How to make the desktop icons smaller or lager?
Answered by: kam on: Apr 25th, 2012
Right click on desktop-> view-> select any option (large/medium/small icons)
Answered by: Tahir Khalil on: Dec 19th, 2011
You can enlarge desktop icon simply by mouse in Win-7 , that is ( Hold " CTRL Button " and then Move
Mouse Scroll To UP ) .. Thnx
Mobile outlook
Asked By: Dastagir Amir Hamaja | Asked On: Jun 18th, 2011
1 answer
How to configure outlook in mobile in exchange 2007 environment?
Answered by: chetan on: Apr 4th, 2012
you can configure outlook in all type of BlackBerry phone..
1st u need create blackberry account from your network provider .
then configure that ID in your exchange server to that domain id of user
23. Answer Question Select Best Answer
How a virus program destabilize ms windows XP
Asked By: albrq | Asked On: May 12th, 2008
3 answers
What is the mechanism of combating those malicious program? Evaluate each technique
Answered by: Rahul Sharma on: Mar 7th, 2012
Follow these steps
1)Run ->Cmd
2)Type netsh
3)Firewall
4)Now type in "set opmode enable" to start firewall and "set opmode disable" to stop fire wall.
Answered by: daperfetto on: Feb 24th, 2011
By corrupting, or deleting data
Answer Question Select Best Answer
How to do a complete refresh of computer using back up discs ?
Asked By: dorothy828 | Asked On: Aug 17th, 2011
2 answers
Answered by: Upendra Sabat on: Feb 29th, 2012
Firstly You to take the system backup on a External hdd, then You format and load os, then You restore
the data through system backup.. thanx.
Answered by: shrikant dongre on: Dec 12th, 2011
This using the external hard disk and personal data back up the external hard disk. second thing format
your computer...;
Answer Question Select Best Answer
Microsoft outlook pst file size limit
Asked By: Pravin Bargode | Asked On: Jun 23rd, 2011
7 answers
What is the pst size limit in outlook97, 2000, 2003, 2007 and 2010?
Answered by: Sundar S on: Feb 19th, 2012
In Outlook 2002 and earlier, the .pst files are in the American National Standards Institute (ANSI) format,
and the overall size has a limit of 2 GB. In Outlook 2003 and after, the .pst files are in ...
Answered by: Shafi23 on: Sep 6th, 2011
MS outlook in 2003 and 2007 is 2GB, in 2010 is 50GB
Answer Question Select Best Answer
A users application on their desktop is not working, explain what you would do
to resolve this problem
Asked By: ramraje | Asked On: Mar 4th, 2011
3 answers
Answered by: pravin on: Feb 15th, 2012
1. Go to task manager the partiquer applicatoin right click application and go to process and End Task.
2. Then go to Event viewer
3. Check application
Answered by: AdhamFadel on: Feb 5th, 2012
Maybe application is disabled by Antivirus
Answer Question Select Best Answer
Reset user password
Asked By: Big Al | Asked On: May 12th, 2008
6 answers
24. How do you reset the users password give the steps it took to get you to the user account.
Answered by: Jayaram. on: Jan 28th, 2012
If it is for a domain user go to active directory users and computers. Type username and click search.
Below you can see user name. Click mouse right button on user name and click on reset password. T...
Answered by: raj_smart on: Jul 3rd, 2009
If its domain environment here all the user accounts info will be maintained with some security Questions
add some security measures. By this tool user account can change his/her password every size l...
Answer Question Select Best Answer
What is APIpa stand for?
Asked By: Big Al | Asked On: May 12th, 2008
13 answers
What does APIpa stand for and how can you tell if your computer is using it? Why would your computer
be using it?
Answered by: sunny lohar on: Jan 4th, 2012
APIPA stands for automatic private ip address, it is the feature of Windows XP, automatic takes an IP
from the range 169.254.1.0 to 169.254.255.255, at the time when when DHCP and TCP/IP not able to
assign an IP to the local computers.
Answered by: saubhagya shakti singh on: Dec 22nd, 2011
APIPA - Automatic Private IP Addressing its a feature that used in opereting system. When DHCP is
unavailable then
APIPA provide IP ranging from 169.254.0.0 to 169.254.255.255
Answer Question Select Best Answer
Unable to view deleted files in recycle bin (winxp)
Asked By: suresh pa | Asked On: Jun 10th, 2008
6 answers
I deleted my files, but I didn't see that files in my recycle bin.Pls anybody help me...
Read Best Answer
Editorial / Best Answer
Answered by: bspkumar
View all answers by bspkumar
Member Since Sep-2007 | Answered On : Jul 25th, 2009
Every one is suggesting what to do next time. he is asking how to recover the deleted file now.
First step you need to do is stop working on the hard disk in which you have lost the file. Otherwise, the
file will be overwritten by another file.
Then run any of the file recovery software.
If you have already used the same hard disk, the chances of recovering the file is less.
Answered by: sivananduri on: Nov 28th, 2011
File deletion will be 2 types. Temporary & Permanent. If the file is deleted without selecting shift button,
it will come to recycle bin. Otherwise the file will be deleted permanently. In such cas...
Answered by: bspkumar on: Jul 25th, 2009
Every one is suggesting what to do next time. he is asking how to recover the deleted file now.First step
you need to do is stop working on the hard disk in which you have lost the file. Otherwise, th...
Improve Answer
25. Going straight to desktop without having to login
Asked By: ups5363 | Asked On: Oct 15th, 2011
3 answers
How do u go straight to your desktop when you reboot rather than having to login every time you reboot
or turn on your computer on?
Answered by: ravi on: Oct 18th, 2011
First you right click on computer and then click on manage.at that time a window appear. Then go to
local users and groups. Then the total users will appear. Then right click on user name what u r ent...
Answered by: rajan on: Oct 17th, 2011
By removing the user name or with out user name you can directly log in to the windows
Answer Question Select Best Answer
How do you check who are invited for the meeting
Asked By: snehaspandana | Asked On: Aug 2nd, 2011
2 answers
If a meeting request is received, how will you check who all are invited in a meeting in outlook?
Answered by: RAJ on: Sep 24th, 2011
1.Open the meeting request or notification. To view your calendar, click Calendar. Note A new meeting
request will appear as a tentative on your calendar. 2.Do one of the following: Accept, ten...
Answered by: vijaya on: Aug 17th, 2011
In 2010 if you check meeting tab and open specific meeting appointment you have an option tracking in
access toolbar
Answer Question Select Best Answer
Artribation process
Asked By: rameshrgen | Asked On: Jun 28th, 2009
2 answers
Which layer provides physical link, flow control, artribation process?
Answered by: S.Prabu on: Sep 5th, 2011
Cable related doing activity called physical layer.Hub is working on physical layer.
Answered by: drum4ravi on: Jul 10th, 2009
Its the Data Link Layer
Answer Question Select Best Answer
Network logon failures
Asked By: Big Al | Asked On: May 12th, 2008
5 answers
A user calls you they cant login in said they have tried several times what is the best way to troubleshoot
this.
Answered by: uma on: Aug 22nd, 2011
1.Check whether the caps button is on or not and then give user name and password 2.Check whether all
the network cables connected properly 3.Check whether the user is added in domain 4.Can reset the...
Answered by: SUMIT GUPTA on: Aug 10th, 2011
Just Check the user's account in active directory & finally check system is in domain or LAN is working
fine or not.
This is the only troubleshooting for that issue
Answer Question Select Best Answer
What are the steps to create .Pst in client system ?
Asked By: Pramod Dhende | Asked On: Aug 7th, 2011
1 answer
Answered by: Yogesh Dhiman on: Aug 10th, 2011
26. we have two option for creation of Archive folder or PST(Personal Storage Template) or personal folder 1.
Automatic Archive 2. Manually Archive Manually Archive for 2007 and 2010 For Outlook 2007 ...
Answer Question Select Best Answer
Backup of computer
Asked By: LAVLEEN SAINI | Asked On: Jul 16th, 2011
2 answers
How to take the backup of computer? After taking backing is there d and f drive programs also
recovered?
Answered by: Kannan Kanna on: Aug 4th, 2011
types of backup
incremental backup update backup file
daily backup daily fixed time backup
normal backup Copy and past backup
full backup any timE full hdd backup
Answered by: Hamid Ali on: Jul 20th, 2011
If you wanna backup your system like D and F drives follow the steps, 1.Click on my computer icon.
2.Left click on the drive which you wanna backup and go to properties 3.Go in Tools tab there you wi...
Answer Question Select Best Answer
Low level formatting
Asked By: parameshg | Asked On: Apr 5th, 2009
3 answers
Define low level formatting?
Answered by: Hamid Ali on: Jul 20th, 2011
Low-level formatting is the process of outlining the positions of the tracks and sectors on the hard disk,
and writing the control structures that define where the tracks and sectors are. This is ofte...
Answered by: veda prakash on: Jul 7th, 2011
creating new tracks and sectors on the hard disk
Answer Question Select Best Answer
What is imap? How does it work?
Asked By: Mohammed Saif | Asked On: Jul 14th, 2007
10 answers
Answered by: Hamid Ali on: Jul 20th, 2011
The Internet Message Access Protocol (commonly known as IMAP) is an Application Layer Internet
protocol that allows an e-mail client to access e-mail on a remote mail server.
Answered by: Amit Maurya on: Jul 17th, 2011
IMAP is stands for Internet message access protocol, which is used for accessing mails from the server
and this protocol leave not remove the mail from the server but if we POP(Post Office Protocol) it can be
remove from the server mails.
Answer Question Select Best Answer
Difference between *.Ost and *.Pst
Asked By: Pravin Bargode | Asked On: Jun 23rd, 2011
2 answers
What is the difference between *.Ost and *.Pst ? How does it work?
Answered by: Hamid Ali on: Jul 20th, 2011
27. Offline folders (.ost) files are stored on your computer and are available even when the network is down.
The default location for the .ost is your current Windows folder. Like personal folders (.pst) files, .ost files
can be compacted to save space on your computer.
Answered by: Narendra jogani on: Jul 17th, 2011
Offline folders (.ost) files are stored on your computer and are available even when the network is down.
The default location for the .ost is your current Windows folder. Like personal folders (.pst)...
Answer Question Select Best Answer
Windows XP boot options
Asked By: Shaishav | Asked On: Mar 21st, 2009
5 answers
What advance boot options are available for windows xp?
Answered by: Hamid Ali on: Jul 20th, 2011
1)Safe Mode 2)Safe Mode with Networking 3)Safe Mode with command Prompt 4)Enable Boot Logging
5)Enable VGA Mode 6)Last known Good Configuration(your most recent settings that worked) 7)Directory
Servi...
Answered by: Atul Keshri on: Jul 20th, 2011
Safe Mode
Safe Mode With Networking
Safe Mode With Command Prompt
Enable Boot Logging
Enable VGA Mode
Last Known Good Configuration
Directory Services Restore Mode
Debugging Mode
Disable automatic restart on system failure
Start Windows Normally
Reboot
Return to OS Choice Menu
Answer Question Select Best Answer
Installing printer
Asked By: Big Al | Asked On: May 12th, 2008
4 answers
You are required to install a new printer on the print server what are your steps? Remember this will be a
shared printer
Answered by: komodosp on: May 25th, 2010
To share it on the network, in Control Panel / Printers and Faxes, you can right-click on it, and in the
menu, click on Sharing
Answered by: syed_nrp on: Apr 30th, 2009
First Start--->Control Panel--->Printers---->Add printer--->Local (or) Network
Printer--->Choose which brand printer and which one type of printer
(if it's needed drivers, push the driver CD in that PC)---->Select TYPE (LPT1 or USB)--->Finish.
It's ready to use printer. now printer is online.
Answer Question Select Best Answer
How can you view startup items
Asked By: Big Al | Asked On: May 12th, 2008
4 answers
28. There are a couple of way to view and disable the items that start to the task pain... How would you go
about doing it and give me the full path to get you there
Answered by: pks07pro on: Jan 7th, 2010
To see the most start up item,
Go to start>programm>start up
To make any changes, enable or disable
Go to Run & type "msconfig"
How to take backup of emails on outlook ?
Asked By: Charanjeetsingh79 | Asked On: May 7th, 2011
4 answers
Answered by: shashi021 on: Jun 23rd, 2011
Other way to take backup install PST SYNC
(http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=9003)
and set backup path for which pst want to be backup. it,s take much less time as using copying method.
Answered by: anshulmehra_2007 on: May 27th, 2011
log in with some user->delete files->tools->options->maintenance->store folder->copy the path-
>create new folder->paste the path to the new folder created->import->messages->MS outlook->select
the user from where files is deleted->browse folder where the path was pasted->finish
Answer Question Select Best Answer
Printing problems
Asked By: Big Al | Asked On: May 12th, 2008
3 answers
User sent a job but it is stuck in the local cue how can you delete it? Name a couple ways
Read Best Answer
Editorial / Best Answer
Answered by: syed_nrp
View all questions by syed_nrp View all answers by syed_nrp
Member Since Apr-2008 | Answered On : Jan 3rd, 2009
You first Install the proper printer driver install. Check that printer is on/off status. Then give a test page.
The test page is not printing, go To
RUN-->services.msc
check printspooler give stop and start. it's work fine
Answered by: Dastagir Amir Hamaja on: Jun 18th, 2011
Go to start, setting , priter and faxes, there you will see your printer, double click that printer, you will
find jobs you have printed, right click that job and try to delete it.
If not deleting then restart printer spooler services. if not deleting then restart printer and pc.
Thanks,
Dastagir
Answered by: syed_nrp on: Jan 3rd, 2009
You first Install the proper printer driver install. Check that printer is on/off status. Then give a test page.
The test page is not printing, go To
RUN-->services.msc
check printspooler give stop and start. it's work fine
29. Improve Answer
Printers
Asked By: Big Al | Asked On: May 12th, 2008
2 answers
How do you install a pre existing printer on a users desktop
Answered by: pavankumarnagisetti on: May 21st, 2009
Go to Start-> Settings -> Printers and Faxes
This opens a new window now click on add a printer from right side panel.
Follow the steps.
You can add normal as well network printer using this.
Answered by: rrsain on: Sep 13th, 2008
Go to control panel and then go to add hardware wizard After that read all the options carefully. When
system requires software for that, insert the software CD otherwise system will install automatically.
Restart the system, if it is not working, tell me, I will give you complete solution
Answer Question Select Best Answer
Dealing with irate customers
Asked By: Big Al | Asked On: May 12th, 2008
2 answers
You take a call from a customer who is very upset they cant work how do you deal with this?
Answered by: udaykalidindi on: Jun 2nd, 2009
This is a common problem faced by a every one working in helpdesk.1st thing don't try to argue with
him. 2ndly try to understand the issues or problems he is facing.3rdly don't promise him heaven and ...
Answered by: tintin3011 on: Sep 3rd, 2008
Talk politely and try to know the problem, and solve as fast as you can.
Answer Question Select Best Answer
Firewire port
Asked By: akki4444 | Asked On: Apr 3rd, 2009
3 answers
What is firewire port? What are its uses?
Answered by: khurramjol on: Apr 21st, 2010
Firewire port is a form of Serial Port that make use of FireWire Technology to transfer data rapidly from
one electronic device to another.FireWire port has the ability to interact with a number of&nb...
Answered by: delhi.itsupport on: May 22nd, 2009
Firewire generally ports are genereally comes with laptop & apple desktop/laptops. You can connect
various external hardware with this. e.g HDD, CDROM, Cameras etc. the transfer rate of
a FireWire port can reach up to 400 Mbps.
Answer Question Select Best Answer
Virtual memory
Asked By: punitgoyal88 | Asked On: Jan 27th, 2011
2 answers
How to improve virual memory of pc?
Answered by: Dastagir Amir Hamaja on: Jun 18th, 2011
Go to system propert--> Advanced Tab--> click on setting of performance--> Advanced Tab--> Click on
Change 0f Virtual memory--> now here you can increase virtual memory
Dastagir
Answered by: srbnew on: Feb 4th, 2011
30. just right click on my computer icon
select properties
go to advance
go to performance
select virtual memory
select how much u want
apply and click ok
thatz itz
Answer Question Select Best Answer
Restore windows XP
Asked By: krabhilas | Asked On: Sep 23rd, 2008
4 answers
How to restore windows XP in command mode.
Answered by: ashi786 on: Aug 18th, 2009
To start System Restore Windows XP first you create a system restore point by following steps:1. Click
start and go help and support options on right hand side you see under pick a task options.2. C...
Answered by: mahadeva83 on: Apr 7th, 2009
To start System Restore using the Command prompt, follow these steps: Restart your computer, and
then press and hold F8 during the initial startup to start your computer in safe mode with a Command
pr...
Answer Question Select Best Answer
Pxe use
Asked By: walker233 | Asked On: Jan 14th, 2011
2 answers
What is pxe used for? What dependencies does it have to be useful?
Answered by: sharmavivek096 on: Jun 2nd, 2011
The Preboot eXecution Environment (PXE, also known as Pre-Execution Environment; sometimes
pronounced "pixie") is an environment to boot computers using a network interface independently of
data stora...
Answered by: s.pandilwar on: Jan 28th, 2011
Preboot Execution Environment (PXE) :- When we are trying to boot system from network we need to
enable PXE boot device from BIOS. It is helpful to install OS from network & it will pick IP address
automaticaly. It is helpful in large network were we cannot install OS manualy.
Answer Question Select Best Answer
Home folders
Asked By: Big Al | Asked On: May 12th, 2008
3 answers
User has a home folder setup in ad when he logs in it maps the u drive which point to the share on the
server.. He accidenTALLY deleted it what is the fastest way to get it back from a command line?
Answered by: khurramjol on: Apr 20th, 2010
Re-mapping will restore the home folder, and we can do in Command line as
net use u: serverhome
Answered by: taiwolasile on: Jun 2nd, 2009
Reboot the PC to re-load the roaming profile
Answer Question Select Best Answer
Ldap on outlook
Asked By: saahil4u | Asked On: Sep 10th, 2008
2 answers
31. What is the ip range in networking side? How do we troubleshoot outlook? How do we configure ldap on
outlook?
Answered by: Ushadavuluri on: Jul 29th, 2009
I am hoping I am submiting the correct answer. IP range in netwroking side is related to DHCP and
Address pools. Ex: 192.168.0.10 to 192.168.0.200 -> Can be defined as address range allowed to dist...
Answered by: Ushadavuluri on: Jul 29th, 2009
From Microsoft OutlookSelect: Tools->Account settings->AddressBook->New Address book-> select
Internet Directory Service(LDAP) radio button-> Next step will take you to the window of se...
Answer Question Select Best Answer
Set ip address from cmd prompt
Asked By: dreamcast | Asked On: Apr 27th, 2010
3 answers
How do you set the ip address by using the command prompt?
Answered by: arunbathery on: Aug 5th, 2010
There are Two ways to Set the IP address from CMD Prompt1. Go to start, select run, type CMD, and in
CMD Prompt type the command C:>netsh interface ip set address name="Local A...
Answered by: lila123 on: May 28th, 2010
Set IP address from CMD prompt :type cmd in run type following command in sequence like IP
address,Subnet mask, Default Getway, DNS,Wins, ect...exmpl : netsh interface ip set address name="...
Answer Question Select Best Answer
What is the difference between lcd and tft ?
Asked By: vhthakor | Asked On: Nov 5th, 2007
3 answers
Answered by: shashi jadhav on: Sep 26th, 2008
A TFT monitor uses thin-film transistor technology. Nearly all LCD monitors today use TFT technology.
The benefit of a TFT monitor is a separate, tiny transistor for each pixel on the display. Because...
Answered by: SONY & RAVI on: Nov 22nd, 2007
LCD Means Liquid crystal display TFT means Thin Film Transistor Liquid Crystal Display.What I think you
mean is Active and Passive matrix LCD panels. This is where there is a difference in price. A ty...
Answer Question Select Best Answer
What is the difference between server os and desktop os
Asked By: cnchandrashekar | Asked On: Jun 3rd, 2008
6 answers
Answered by: Karimulla Shaik on: Apr 7th, 2011
server OS manages Network resources centrally along with its internal resources. desktop OS Manages
only its internal resources(like memory, cpu, i/o, user interface).
Answered by: tdpanee on: Jul 30th, 2010
Server OS can be used to configure a centralised administration for computer network. Desktop OS can
be used to configure client Machine to SErver.
Answer Question Select Best Answer
Enable or disable firewall
Asked By: jcsrinath | Asked On: Feb 18th, 2011
1 answer
How would you enable or disable the firewall in windows xp?
Answered by: adnanj85 on: Feb 22nd, 2011
To enable Windows Firewall, follow these steps:Click Start, click Run, type Firewall.cpl, and then click
OK.On the General tab, click On (recommended).Click OK.------------------------------To disable...
Answer Question Select Best Answer
32. Install operating system on more than 50 pc
Asked By: saahil4u | Asked On: Sep 10th, 2008
4 answers
How will you install operating system in more than 50 pc at a time when the all pcs having same
configuration.
Answered by: Laxman on: Jan 28th, 2011
We use image ghost if all PC hardware requirments are same.
Answered by: walker233 on: Jan 14th, 2011
This depends on your operating system and target hardware.If you are deploying XP then you are bound
by the hardware, and are required to make an image of the OS, using ghost or another image capture ...
Answer Question Select Best Answer
Add a user to network
Asked By: charla | Asked On: Sep 15th, 2009
6 answers
Explain how will you add a user to network?
Answered by: egyptianfalcon on: Jan 20th, 2011
This answer is specially for windows 7 and I think it would be usiful in all the kind of windowsfirst go to
start menu-controll panel-user accounts-manage another account-creat new account-then w...
Answered by: elmagoal on: Jun 10th, 2010
First you need to figure out what role the user is going to have and if there is anyone on that has the
correct set of permissions as the user. If this is true, on the server or on your desktop if you...
Answer Question Select Best Answer
Create an email account for a user already in ad
Asked By: saahil4u | Asked On: Sep 10th, 2008
2 answers
How would you create an email account for a user already in ad?
Answered by: Anele Takane on: Jan 6th, 2011
If the user account has been created with a mailbox (mailbox enabled) you may follow ameetsaha's
instructions, but if you need to create an email account (mailbox) you will have to go to your Active d...
Answered by: ameetsaha on: Nov 4th, 2008
Open Micosoft Outlook if you are using office 2000, and click on "Tools" tab. Go to "Email Accounts".
There you can find two option like Email and Directory. Click on "Add a n...
Answer Question Select Best Answer
Sms update
Asked By: msid82 | Asked On: Nov 6th, 2010
1 answer
A pc did not receive an update from sms. What steps would we take to resolve this?
Answered by: Prabu2009 on: Dec 17th, 2010
If SMS not updated in client system.
1. Need to check system getting IPaddress or not.
2. Need to check system in domain or not
3.Ensure that windows firewall should be off.
Above reason SMS will not update to the client system.
Answer Question Select Best Answer
Troubleshooting a slow computer
Asked By: sanj108 | Asked On: Nov 12th, 2009
8 answers
33. A user calls in and complains that her computer and network is running very slow. How would go about
troubleshooting it?
Read Best Answer
Editorial / Best Answer
Answered by: smokedragon
View all answers by smokedragon
Member Since Nov-2009 | Answered On : Nov 18th, 2009
I would first ask the user whether every application on the computer is slow or is it just one particular
application. if it is just one, try and sort that out.
If the answer is all applications are running slow, look at common causes like, virus scans scheduled, free
disk space on the home drive, RAM, lastly if the deployment team is rolling out any updates (which should
not be done during business hours, but i've seen that happen too ;)
If you suspect network latency, a simple ping test from the user's computer will tell you how many milli
seconds network traffic is taking to reach the server.
Answered by: rgawthorne on: Oct 26th, 2010
First question, when did the problem start? Is anyone else in the same work group experience
slowness.Does it happen all the time, or is it intermittent, any patterns of timings eg, in the morning ...
Answered by: DanielGoad on: Jul 23rd, 2010
'Slow' is a relative question, so first determine what the user is experiencing. Is it slow opening
applications or while working in them? is this a networked application or local? ...
Improve Answer
Windows XP firewall
Asked By: navaneethreddy | Asked On: Jul 12th, 2010
4 answers
How would you enable or disable the firewall in windows xp?
Answered by: rampraveshraju on: Aug 9th, 2010
Press window+r key on keyboard than type firewall.cpl than you can easily On or Off firewall.
Answered by: Dhamodharan15 on: Aug 5th, 2010
Goto Command prompt, type Services.msc, in the services windows search for Windows Firewall /
Internet Connection Sharing(ICS) and start the service.
Creating email account
Asked By: Big Al | Asked On: May 12th, 2008
2 answers
How would you create an email account for a user already in ad
Answered by: tdpanee on: Jul 30th, 2010
If you have installed exchnage server, then select the properties of user account and change the mail
enable user check box.
Answered by: abujibrael on: Apr 20th, 2010
1- First click the OU that the users resides. 2- Right click the user, with whom you wanna create an email
account. 3- Now click Exchange Task 4- Click next to the wizard 5- Choose create mailbox 6- C...
Answer Question Select Best Answer
Blackberry synchronization
Asked By: Rrahul Arora | Asked On: Oct 21st, 2009
3 answers
If a customers blackberry stopped syncing their calendar wirelessly, what would you do?
Answered by: elmagoal on: Jun 10th, 2010
34. The first step before wiping the Blackberry is to remove the battery for 20 sec. put it back and check the
sync again. While all other steps are correct, most BB issues will be resolve by a hard reset.
Answered by: mdabid on: Dec 10th, 2009
Take Complete Backberry backup using desktop Manager and wipe your handheld, then syncronize by
doing enterprise activation, and restore backup.
Regards,
Mohammed Abid Razvi
Answer Question Select Best Answer
Install pre-existing printer
Asked By: saahil4u | Asked On: Sep 10th, 2008
2 answers
How do you install a pre existing printer on a users desktop?
Answered by: komodosp on: May 25th, 2010
You may have to install printer hooked to the network. If it has an IP address:1. Control Panel / Printers
& Faxes2. Next past Welcome message3. Local Printer attached to this computer, Next4. Cre...
Answered by: rrsain on: Sep 12th, 2008
Go to control panel and then go to add hardware wizard After that read all the options carefully. When
system requires software for that, insert the software CD otherwise system will install automa...
Answer Question Select Best Answer
What is the difference between windows XP and windows 2000
Asked By: cnchandrashekar | Asked On: Jun 3rd, 2008
7 answers
Read Best Answer
Editorial / Best Answer
Answered by: bspkumar
View all answers by bspkumar
Member Since Sep-2007 | Answered On : Jul 20th, 2008
Windows XP Vs windows 2000
.
OS XP 2000
Feature
Release 2001 2000
NT 5.1 5.0
32/64 bit 32/64 bit 32 bit
35. built-in CD writer support y n
Remote Desktop Connection,
Internet Connection Firewall,
Fast UserSwitching
y n
Windows Media Player and
Windows Messenge
File sys support FAT16,32,NTFS,HPFS (High- FAT16,32,NTFS
Performance File System)
Answered by: syed_nrp on: Apr 30th, 2009
Windows XP has 4 Versions, Windows 2000 has 3 ver. (Win 2000 Pro, Server & AD. Server).Windows XP
has last known good configuration [last used desktop] which is not present in Windows 2000. Remo...
Answered by: hezysasson on: Nov 10th, 2008
Win. XP has drivers that "recognize" hardware easier and faster with system set up.
Improve Answer
Larger desktop icons
Asked By: ghada | Asked On: Feb 22nd, 2009
1 answer
How to make desktop icons appear larger?
Answered by: Ravi9 on: Feb 23rd, 2009
Right click on desktop. Go to properties and then click on appearance tab. Then further click on effects
tab. A window will open. Select the use large option. Then click on apply OK. Thats it.
Answer Question Select Best Answer
Steps to secure windows
Asked By: ravila23 | Asked On: Feb 21st, 2008
2 answers
Describe steps you would take to secure windows 2000 server resources and files.
Read Best Answer
Editorial / Best Answer
Answered by: shashi jadhav
View all answers by shashi jadhav
Member Since Sep-2008 | Answered On : Sep 26th, 2008
There are lot of secure option for Windows, You can secure by -
Set a difficult password for administrator
Disable gust account
Give minimum & limit permissions to administrator's members
36. Make minimum share folder on your Windows's
Give minimum share permission on that folder & full control to trust users
Always change the administrator password
Install third part firewall & set minimum port.
Access & deny those user's & IP which you don't want to access to your computer.
Don't share your password.
Answered by: shashi jadhav on: Sep 26th, 2008
There are lot of secure option for Windows, You can secure by - Set a difficult password for administrator
Disable gust account Give minimum & limit permissions to administrator's members ...
Answered by: amjad1233 on: Apr 26th, 2008
To Secure the windows following steps should be considered :
1. Making admistration account and giving only requried rights to child accounts
2. Putting some external Anti-Virus to protect from the threats
3. Making some registray changes to be help full
and other
Improve Answer
What is ldap sserver?
Asked By: kaps200 | Asked On: Jul 8th, 2008
2 answers
Read Best Answer
Editorial / Best Answer
Answered by: aravind kalyan
View all answers by aravind kalyan
Member Since Jul-2008 | Answered On : Jul 15th, 2008
LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to
look up information from a server.
Answered by: Karthikumaran on: Aug 25th, 2008
LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to
look up information from a server.
Answered by: aravind kalyan on: Jul 15th, 2008
LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to
look up information from a server.
Improve Answer
Desktop support & help desk
Asked By: Brianseawood | Asked On: Jun 17th, 2008
1 answer
What is the technical difference between desktop support & help desk ?
Read Best Answer
Editorial / Best Answer
Answered by: radelapena
View all answers by radelapena
Member Since Aug-2008 | Answered On : Aug 24th, 2008