SlideShare una empresa de Scribd logo
1 de 55
Interview Questions for Desktop Support Technician/Analyst

General Questions

Q. What desktop operating systems are you familiar with?
A. Before you answer this question, you should have some background information on what operating
systems are used within the organization you are interviewing with. Undoubtedly, you will be asked to
elaborate on your skill set with each of these operating systems so it’s best to tailor your elaboration to
the operating systems that are relevant to the hiring manager. This being said, don’t leave out mentioning
experience in other operating systems. You never know whether the company may be evaluating the
migration to a different OS.

Q. Have you used imaging software before? How do you find these tools useful?
A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the
tools that you’ve used. Hiring managers want to assess your in-depth knowledge and experience with
using these tools. This means talking about how you use their various feature sets. (If you have an
opinion, you probably know the product pretty well.)

Q. What are the pitfalls of using imaging software?
A. This question is meant to assess how well you know these products. For example, discussing the
importance of testing the image demonstrates that you use these tools on a regular basis.

Q. Have you used any software distribution tools? If so, which ones and how were they used?
A. Like imaging software, software distribution tools are an important part of your job. Hiring managers
are looking for knowledge that these tools exist and how they can be used to support your organization.

Q. What do you like most about desktop support?
A. Hiring managers are looking for what motivates you. Hopefully your answer will match the
characteristics of the job: being busy, working with different people, and the challenges of learning new
operating systems and configurations.

Q. What do you like least about desktop support?
A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here
would be not being able to resolve a problem in a timely manner for reasons outside your control, such as
hardware failure. Stick to things outside of your control for the best response.

Q. When solving a desktop problem, do you prefer to work with the end-user, your peers, or on
your own?
A. This is another question to determine your fit within the organization. Hiring managers understand that
to be successful as a support technician you will have to work in a team environment. This means working
with other employees, vendors, and end-users on a constant basis.

Q. Can you describe a situation where you have had to deal with a difficult person? How did you
handle it? Would you do anything differently?
A. Desktop support can be very demanding some days. End-users only see their own priority needs and
often are not interested in other demands on your time. This question explores how you deal with a
difficult end-user by understanding their problem, assessing priorities, and communicating a timeframe
for resolution. Often good communication can help both sides come to an agreement. Make sure you
have an example with a successful outcome.

Q. How would you say you are able to handle stress?
A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress.
Sometimes from the answer, they can also determine whether you are prone to stress. When responding,
some techniques for handling stress that you may want to talk about include continually evaluating what’s
on your plate and prioritizing, communicating with your manager on what your priorities are, and making
sure that you take a break to reenergize, particularly at lunch time.

Q. What do you see yourself doing two or three years from now?
A. Hiring managers want you to stick around. They realize that you will not be in this position forever, and
they want to make sure there’s a desire to move up within the organization as well as the right fit. They
ask this question to see whether there’s a growth path for you possible within the organization. As a
desktop technician, natural growth paths are team leads, quality assurance, engineering positions, and
entry-level development. Be honest about where you want to be in two to three years, and ask the
interviewer whether they see your career path as a possibility.

Q. How do you learn new technologies?
A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning
technology on their own and who has the foresight to look for training opportunities. Besides the
traditional books and manuals, don’t forget to include user groups, eLearning subscriptions, and IT
professional sites such as CramSession.

Q. How do you prioritize tasks and manage your time?
A. What hiring managers want to know is whether you have time-management skills. Everyone manages
their time differently, but think about how you handle e-mail, when you check voice mail, how you
respond to pages, when you research and document, and how you pick up new trouble tickets.

Q. Imagine the following situation: you receive three simultaneous calls from three
vicepresidents who need assistance immediately. How do you manage these conflictingpriorities?
A. Obviously this is a trick question. What the hiring manager is trying to assess is how you set
expectations with each of the individuals, knowing very well that you won’t be able to assist all of them at
the same time. They are also looking for how you will prioritize each of these incidents, including seeking
assistance from peers and supervisors in order to meet user expectations. Don’t allow the “tyranny of the
urgent” to divert you from managementestablished support priorities.

Q. How would you handle a user who continually misdiagnoses their PC issues?
A. By asking this question, the hiring manager is assessing your customer service skills. In this situation,
you may want to discuss that the key is to not offend the user and turn them off to your support services.
In handling this situation, you would pay particular attention to ways you can build trust with the user and
lead them to the right resolution to their problem.
These components may include:

        Acknowledging the user’s diagnosis
        Asking the user to reproduce the problem
        Finding a solution that works
Q. How do you handle setting up new employees?
A. This question is used by the hiring manager to assess your knowledge of common practices within the
IT department, such as setting up new users. Obviously, the IT department plays a critical role in the
productivity of the new employee. The role of the desktop technician is to help ease the new employee
into the resources available to them and get them up to speed quickly. In responding to this question,
you may want to talk about some of the tools you’ve used in
the past to help users acquaint themselves with their new environment. Some tools that help are:

        A new-user welcome letter that is customized to the specific user with all their relevant
        information including telephone extension, how to access voice mail, and how to log in. It might
        also include a FAQ on getting help.
        A “Getting to Know Your Helpdesk” document that provides an orientation to helpdesk service,
        such as how to contact the helpdesk, its hours of operation, what is and what is not supported by
        the helpdesk, and answers to common new-user questions.


Technical Questions

Q. What questions would you ask to help isolate a user’s problem?
A. This question is used by the hiring manger to assess your problem-solving abilities. The following
represent some of the common questions that you would ask the end-user to help diagnose a situation:

        When did the problem first start?
        Has the system ever worked properly?
        What was the last thing done to the system prior to the failure?
        Is the issue intermittent or ongoing/constant?
        Are there any error messages? If so, what are the specific error messages?
        Has any new hardware been added to the system?
        Has any new software been added to the system, including downloads from the Internet?
        Has anything changed with the system (for example, has it been moved) since the issue presented
        itself?
        Has anyone else had access to the system?
        Are there any environmental factors that could be causing the issue?
        Have you done any troubleshooting on the system on your own?
        Have you checked all the cables/connections for a tight fit?

Q. What are the main differences between the following operating systems?
A. Unfortunately, most companies have not been able to standardize the operating systems used by users.
It’s always critical that you know more than just the current version because there will always be a user
who has a problem with an older version. By asking this question, the hiring manager is actually testing
your knowledge of different operating systems that you may need to support. The following provides a
concise summary of some of the major differences.

Windows 2000 and XP

Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the
hands of consumers. The major changes include the following:
Device driver rollback
        Remote control (single-user terminal services)
        New Start menu, control panel, and user interface elements
        Fast user switching
        Encrypted file system support for redirected folders
        Better support for roaming wireless networking
        Enhanced policies
        Credential Manager
        Personal firewall

Q. What are typical virus sources and how do you prevent virus attacks?
A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses.
Possible virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To
prevent virus infections:

        Use anti-virus software.
        Perform regular updates to the virus software definition files and scan engines. Verify updates
        have succeeded.
        Perform regularly scheduled virus checks.
        Configure software to check all files, not just program files.
        Educate users on virus attacks, their consequences, and how to prevent them.
        Know where all software came from.
        Do regular backups.
        Develop reporting mechanisms to inform server administrators of observed desktop infections
        and how these could impact the server environment (such as deletions or corruption of files on
        public shares, hidden payload files that might have been uploaded to servers, and so on).

Q. What are some of the guidelines you would recommend for implementing security at the user
level?

A. Security is a major part of the desktop technician’s day-to-day responsibilities. As the closest point of
contact to the end-users, technicians need to be savvy on the different methods for enforcing security.
Some of the top techniques are included below.

Anti-virus software:

        Ensure that all users install and regularly use anti-virus software on their PCs.
        Instruct users to immediately notify the helpdesk when they suspect they’ve contracted a virus.

Password security:

        Instruct users not to give out their passwords.
        Instruct users not to write down their passwords.
        Instruct users to make sure their password cannot be easily guessed by using a combination of
        alphanumeric characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { } / ? < > , ; :  |
        ` ’ ” .).
        Instruct users to change their password if they think there is even a slight chance someone knows
        it.
Instruct users to ensure their password is at least eight characters long.
        Instruct users not to use a variation of their user ID.
        Regularly change passwords on Administrator accounts on PCs (NT, Windows 2000 and XP)

Desktop security:

        Instruct users not to leave their workstation logged in overnight.
        Instruct users to enable screen savers that automatically lock their PC when there is no activity on
        it for more than five minutes.

Microsoft Active Directory Questions.

        What is Active Directory?

Active Directory is Microsoft's trademarked directory service, an integral part of the Windows 2000
architecture. Like other directory services, such as Novell Directory Services (NDS), Active Directory is a
centralized and standardized system that automates network management of user data, security, and
distributed resources, and enables interoperation with other directories. Active Directory is designed
especially for distributed networking environments.

        What is LDAP?

Short for Lightweight Directory Access Protocol, a set of protocols for accessing information directories.
LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And
unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because it's a
simpler version of X.500, LDAP is sometimes called X.500-lite.

       Can you connect Active Directory to other 3rd-party Directory Services? Name a few
options?

Yes. Microsoft Identity Integration Server (MIIS) is used to connect Active Directory to other 3rd-party
Directory Services (including directories used by SAP, Domino, etc).

Active Directory Lightweight Directory Services (AD LDS) : This service is ideal if you are required to
support directory-enabled applications. AD LDS is a Lightweight Directory Access Protocol (LDAP)
compliant directory service.

Active Directory Rights Management Services (AD RMS) : This service augments an organization’s
security strategy by protecting information through persistent usage policies. The key to the service is that
the right management policies are bound to the information no matter where it resides or to where it is
moved. AD RMS is used to lock down documents, spreadsheets, e-mail, and so on from being infiltrated
or ending up in the wrong hands. AD RMS, for example, prevents e-mails from being accidentally
forwarded to the wrong people.

The Application Server role : This role supports the deployment and operation of custom business
applications that are built with Microsoft .NET Framework. The Application Server role lets you choose
services for applications that require COM+, Message Queuing, Web services, and Distributed
Coordinated Transactions.

DHCP and DNS : These two roles install these two critical network service services required for every
network. They support Active Directory integration and support IPv6.

Fax Server role : The fax server lets you set up a service to send and receive faxes over your network.
The role creates a fax server and installs the Fax Service Manager and the Fax service on the server.

File Server role : This role lets you set up all the bits, bells, and whistles that come with a Windows file
server. This role also lets you install Share and Storage Management, the Distributed File System (DFS),
the File Server Resource Manager application for managing file servers, Services for Network File
System (NFS), Windows File Services, which include stuff like the File Replication Service (FRS), and so
on.

Network Policy and Access Services : This provides the following network connectivity solutions:
Network Access Protection (NAP), the client health policy creation, enforcement,and remediation
technology; secure wireless and wired access (802.1X), wireless access points, remote access solutions,
virtual private network (VPN) services, Radius, and more.

Print Management role : The print services provide a single interface that you use to manage multiple
printers and print servers on your network.

Terminal Services role : This service provides technologies that enable users to access Windows-based
programs that are installed on a terminal server. Users can execute applications remotely (they still run on
the remote server) or they can access the full Windowsdesktop on the target server.

Universal Description, Discovery, and Integration (UDDI) : UDDI Services provide capabilities for
sharing information about Web services. UDDI is used on the intranet, between entities participating on
an extranet, or on the Internet.

Web Server role : This role provides IIS 7.0, the Web server, ASP.NET, and the Windows
Communication Foundation (WCF).

Windows Deployment Services : These services are used for deployment of new computers in medium
to large organizations.

Hyper-V Role : A Hypervisor platform to host and manage virtual machines in an efficient way.
                                  Introduced in Windows 2008.


                                    Applying SQL Server SP3 Failed, How to
                                    fix it?
                                    1. This is a common error we will get regularly in SQL clusters.

                                    2. If you trying to install the SP3 on the active node, make sure that
                                    there is nobody logged on to the passive node. Why because when
the active node tries to install the SP3 on passive node remotely, it will try to look for some processes. So
at that time if nobody on the passive node, it will install without any errors.

3. If any locked files found while you installing the SP3, ignore them and continue with installation, you
can reboot both nodes one at a time later.

4. Finally after rebooting the both nodes, check the versions of the application on them. Make sure the
version should be same on both nodes. That's it we are done.

Note : This applies to SQL Server 2005 Edition only.

Thank you for your support, keep visiting my blog.


How to RENAME a Windows 2003 Domain ?
Guys,

Domain renaming is a new future included in Windows server 2003. We can rename the domain without
making it down. That is the beauty of Windows 2003. In some situations, one company acquires the other
like Sun Microsystems was acquired by Oracle. In this type of cases, if they want to rename all the
domains in Sun Microsystems to Oracle corporation how they will do it. Its just an example, i am not
telling those guys are following this. But here what i am trying to explain is that, the Microsoft has
released a standard procedure to rename the domains that are in production environment.




Please follow the steps from the below document carefully to rename your prod domain.


How to reset TCP/IP in Windows or How to delete TCP/IP
entries from Registry ?
Resetting TCP/IP solves many problems. So how to reset it ?

Actually all the parameters of the TCP/IP for every interface is stored in Windows Registry Database. Its
not stored in a single location, but in many locations. So finding all the values and deleting them manually
is not at all possible. It may disturb our system configuration if you edit the registry manually. My sincere
request is backup your system registry before you modify anything, otherwise you will get lot of issues. :)




So to simplify this situation, we have a command in windows, which takes care of everything in resetting
tcp/ip. Finally the beautiful command is ―netsh‖. It really helps us in many conditions. And it can be
available as a download from microsoft.com for older machines.




How to work with it ?

1. Apply command netsh at the command prompt.
2. Type interface command at netsh> prompt

3. Type ip command at netsh interface> prompt

4. Type reset reset.txt command, to reset the tcp/ip.

But here what is reset.txt, we are just sending the output details to that file, if anything goes wrong you
can get back to your previous config from this file.




5. Go and look at your tcp/ip properties tab, you will set to ―Obtain Automatically Mode‖, surprised!!!

6. This command is used in situations like follows….

  sometimes DNS servers information will not erase from the registry

  sometimes virtual ip settings also not erase from the registry

  sometimes configuration changes doesn’t takes place


What is Clustering? How it works?
What is Clustering?

Clustering is a technology in which one or more computers work together as a single instance by sharing
their resources. Clustering is used mainly for redundancy of the services hosted on it. In other words, in a
cluster all the hosts are work together, if one of the host fails all the services hosted on it comes online
immediately on to another host with out any downtime. Apart from the redundancy a cluster is used for
load balancing also, in this case what ever the load comes to the cluster is shared by all the hosts in it.

What are the types of Clusters and How do we configure them ?

Clustering is two types, Active/Active and Active/Passive.

Active/Active : In this scenario all the hosts configured in the cluster takes all the load comes to that
cluster, and if any one of the host fails the remaining hosts share the requests to make it online all the
time. If you have same copies of application configured on multiple hosts this type of clustering is
applicable.

Active/Passive : In this scenario load balancing is not works, as at any point of time only one host
receives all the requests, and if any of the host fails the remaining hosts takes those services and make
them available online. That means, only one host is active at any point of time and the other one is
passive.

What are the requirements to configure a cluster and How it works?
There are so many requirements to configure the cluster, but all those requirements are inter dependable
on each other. And these requirements (we call them as resources in clustering), are shared between all
the hosts, that means these should be available to all the hosts in the cluster. for example, SAN storage
resource, the storage which configured in network and is accessible by all hosts (Click here for SAN
Information). In the same way all the resources are accessible by all the hosts in a cluster. If one of the
host fails, all these resources are moved to another host. In detail, at a particular time one host is
accessing these resources, at that time those are locked by that particular host, whenever this host fails,
the lock was released and those resources are locked by another host. But in active/active clusters these
resources have multiple copies as multiple instances on all hosts.

See the below video for better understanding.


What is Cloud Computing? How it works ?
Cloud computing…the word which is been in the industry from past few years. The technology became
very popular now a days. so what is the secret behind it and what makes this technology successful? May
be these are the questions which are currently in your mind. Let me explain this emerging technology in
simple way.




Generally what we all do is, we install whatever the required apps like MS Office, Photoshop, Acrobat
Reader etc on to our machine once after the OS installation is finished. But here in this case, these apps
are running on a specific hardware and OS. They are having some limitations, along with those limitations
they are having some performance issues because they are dependent on Hardware and OS.




If we take the same scenario with cloud computing, a cloud is a collection or grid of computers with
different hardware and OS’s installed on them and acting as a single virtual computer. So what happens
when we install/run a website or an application on to this cloud, it takes all the advantage of the total
hardware. And these applications (ex: Google docs) are OS independent also. So with all the resources
sponsored by all the machines the applications runs faster. If the demand for that application is increased
you can simply add some more machines to this cloud without disturbing the application and current
cloud.

Advantages:

You can access the application from anywhere in the world

As it is accessed from the web, you can run it on any of the OS & Hardware

No need to install applications on to your machine

Best Live Example : Cloud Computing - ITaS - Cloudshare

For better idea how the cloud apps works, go and take a look at the below web sites.

Photoshop Like App = Splashup (www.splashup.com), Pixlr (www.pixlr.com)
MS Office Like App = Google Docs (docs.google.com)

Messenger App = Meebo (www.meebo.com)
OS like interface = beta.cloudo.com (simple) , www.oos.cc (resembles windows), www.eyeos.info (with lot
of apps)

Read this article for better understanding

Cloud Computing : ITaS (Infrastructure as a Service)


How to fix Remote Desktop Connection Problems in Windows
Server 2008?
Remote desktop is a piece of software which comes with all the windows operating systems which is
useful the manage windows machines remotely.

To configure this on a Windows Machine we need to follow below steps.
1. Configure the machine with correct network settings and make it is pinging from other computers.

                                             2. Check the firewall options to allow the Remote Desktop
                                             Connection.

                                             3. Right Click on My Computer, Select Properties and go
                                             to Remote Tab. Enable Remote Desktop option. If you
                                             want to specify a specific users on the machine to connect
                                             remotely through Remote Desktop click on Select Remote
                                             Users and add the users to the list.

                                             4. Try to access this machine using the mstsc client from
                                             another machine. If it connects perfectly everything OK.

                                             5. Again do these steps another machine to get practiced.
                                             That's it.

                                             NOTE : IN WINDOWS 2008 IF THE FIREWALL SERVICE
                                             IS STOPPED THE SERVER WILL NOT ACCEPT THE
                                             REMOTE DESKTOP CONNECTIONS. MAKE SURE IT IS
                                             RUNNING AND IF YOU WANT TO STOP THE
                                             FIREWALL, JUST CLICK IT OFF IN WINDOWS
FIREWALL OPTIONS.


Interview : A quick view of yourself
See these videos first before reading the content… so informative and so
funny…                    Video1: An Ugly Answer, Video2: A Bad Answer, Video3 : A Good Answer

In my experience Interview is nothing but ―Marketing Yourself‖, the word changes your confidence level.
This has been told to me by my brother Krishna Prasad(May be he read it some where else). Opportunity
comes only one time, and that is the only door to your success in the career. When the opportunity is in
your hand, try until it goes of from you. So try hard to market yourself in every possible way.

The Power of Support
A best example for this is, i got job in AT&T when the entire world is in a very deep financial crisis. That
means what ever happens, what may goes down the support industry will never stop. Why because if
support stops, everything will be paused. For example, if the customer care for your mobile will not
respond or if they don't provide customer support, their business will get lose lot of customers. In the
same way we will provide our support to various companies around world. Those companies need our
support, because they need to provide support to various customers around world. If a company has
website about its products, what makes that company profitable? First thing, the website needs to be run
continuously, obviously it is dependent on servers, hardware and network etc etc.. so may be so many
people providing their support to make it available continuously in the back ground. That is the reason i
can say, we are in the correct place, we have lot of opportunities. Only thing we need to get succeed in
this industry is having optimized skill set.

Get Prepared

When an opportunity is in your hands, get prepared to achieve it. That is your ultimate target, if you lose
this opportunity, you even don’t know when the next one comes. So Handle with Care. All you need to do
is, prepare well in your area of practice. Be confident, Be Frank, Say no idea to unknown answers, Be
Positive, Be Interactive, Be Proactive. :) lot of things right. All these qualities are in you. Try to develop
them, try to bring out them when the time comes, try to expose them. Success is yours.

“Plan the Implementation, Implement the Plan”

Interview Requirements

Well prepared Resume – It should resemble your career, don't include/repeat unnecessary things.

Well prepared Mindset – Ultimately this is required for those who has interview phobia like me.

Positive Attitude – Life will never stop if this goes of from your hand, but try your level best to get it.

Interaction – Need to interact with the interviewer to market yourself, Keep eye contact with him.

Confidence – I noticed so many times, my confidence will get decreased whenever i am going for an
interview, this happens to so many. It makes you a loser. Avoid thinking about the interview and
interviewer to get rid of this problem. Meditation is the best practice i suggest.

“ Your life today is the result of your attitudes and choices in the past.

 Your life tomorrow will be the result of your attitudes and the choices you make today.”

This post is useful or not, i don’t know. But these are the things i understood from my experiences and i
want to share them with you.


Understanding DNS : Domain Naming Server
Hi Friends,

First of all thanks for visiting my blog. I added ―Search‖ option for my blog, you can easily search for a
particular topic using Google Search. If you are facing any issues, or if you have any questions please
mail me atcharan@isupportyou.net Thanks.
Coming into the Topic…………….

What is DNS?

DNS stands for Domain Naming Server, it is a standard of naming domains in any operational
environment (Windows,Linux,Solaris,Any environment). It is a server which contains a database of all the
domains and all the servers which are associated with those domains.

Why it is Used?

Its a service dedicated to identify all the machines (domains & member servers) in a network. To make
this possible, every machine has to be registered in the authoritative DNS server of that network. That
means every operational network should have a dedicated DNS server to enable identification and
communication between the machines.

How it works?

As i said, it is dedicatedly used for identification, in technical words for “name resolution”. Every
machine in a network has a dedicated IP address & hostname as its identity. Whenever a machine tries
to communicate with another machine on the network it should first identify the second machine, that
means it should know the ip address of that particular machine. After knowing the identity (i.e ip address),
it will directly communicates with the second machine. So to speak, a machine should know the ip
address of the another machine, with which its going to communicate before it starts. Another question…
Why the hostnames are used, if the machine already have an identity in the terms of IP address?
Hostname is an English word which is useful for Human remembrance. It is impossible for a human being
to remember lots of IP addresses, but it is possible to remember English names of the same hosts (as
we configure the hostnames generally with employee name or department name or location name etc).
For example we can rememberwww.yahoo.com but not its ip address, because we are not having only
one website on the internet. To sum up Hostnames and IP addresses both are used to identification and
communication between two machines in a network. But machines are only able to communicate with the
IP addresses and which are impossible to remember for Humans (Keep in mind machines never
communicate with hostnames). To solve this situation DNS was implemented. It basically contains a
database of host records in a network. A host record contains ―Hostname : IP address‖, see the image
below for better under standing. Out Internet is purely depended on DNS, when we access a particular
website we will give its English name, when we press ENTER immediately the machines starts finding the
IP address of the website using the DNS server configured on it. I will explain the name resolution
process in details. And one more thing about the DNS is, it is the only largest database on the internet
which changes every second. If this database goes down by a chance, we must remember all the ip
addresses to access the internet. hahaha it will not happen, why because we have so many backup
solutions already implemented.
How the name resolution takes place?

I will explain this concept with internet as an example. Before that i want you to check some settings on
your machine. Check the TCP/IP properties and see whether DNS server is configured or not. If you are
seeing obtain automatically option, open command prompt and type ―ipconfig /all‖ and press Enter. You
will get DNS servers information along with your machine’s IP address. Now lets talk about the scenario,
When you try to open a website like www.google.com, what happens next? how your machine gets IP
address of the www.google.com. Here it goes….

1. The request sent to the DNS server which is configured on your machine.

2. The DNS server checks for the host record of www.google.com in its database, if it contains a record
forwww.google.com, it will directly send response with the IP address of www.google.com. Otherwise it
starts requesting another DNS server.

3. Before it goes to another DNS server, how it identifies which DNS server is responsible for this request
? It checks the entire hostname (it is called as FQDN : Fully Qualified Domain Name), i.e in google’s
case www.google.com. (note the FQDN ends with a period, and this period is called as root domain).

                                               4. Every DNS server contains a roothint file associated with
                                               it, and the same will be used to identify the responsible
                                               DNS server. Root hint file contains Master DNS servers
                                               information. Here you go it looks like this. These are the
                                               master DNS servers for .com, .net, .edu, .org domains etc.

                                               5. So in your case, the domain is .com, DNS server sends
                                               request to .com master DNS server (for ex: assume it as
                                               198.41.0.4), the .com master DNS server contains name
server records for all machines ending with .com . That means it definitely contains DNS server IP
address for google.com. In the same way it contains all .com servers yahoo.com, microsoft.com & so on.

6. It does not contain the IP address of google.com, it contains DNS server IP of google.com.

7. So then the request is forwarded to google.com DNS server, in that server you will have a host record
with the name www and its IP address. Finally you reached it. With the found IP address the request
comes back as a response in the same reverse way to the DNS server which is configured in your
machine, that DNS server tells the IP address ofwww.google.com to your machine.
8. This process happens in milliseconds in the background. i.e by the time you will get ―Website found
waiting for reply‖ message in the status bar of your internet explorer.

9. Oh my god!!!! Is that simple? Yes it is. The same process occurs in corporate networks also. But the
requests are handled by their local DNS servers only.


DHCP : Dynamic Host Configuration Protocol
Hi Friends,
Let’s support our organizations using simple way of IP Management. DHCP stands for Dynamic Host
Configuration Protocol.
Dynamic = Automatic
Host Configuration = Basic Network Configuration
Protocol = Rules which needs to be followed to make this happen.

DHCP is an application which is either installed on Windows Server Operating system or on UNIX OS to
service an enterprise in the aspect of IP configuration and management. Its main goal is to provide &
configure the client computers with specific ip configuration to enable identification and communication in
the network. Prior to DHCP another protocol have been used, it is called BOOTP. BOOTP(Boot Protocol)
has only one future that is Reservation. So the administrators who are worked with BOOTP, need to get
all the MAC addresses and write them on a notepad to enable the use of BOOTP. After writing all the
MAC addresses, the same need to be added to BOOTP table with corresponding IP addresses. That
makes lot of work for administrators, even though its an automated process, but admin’s need to work a
lot to get the MAC addresses of all the machines in the network. Later it has gained lot of improvements
to serve the network and became DHCP.

How to Install and Configure DHCP?
It very simple and straight forward process. First you need to install the application from Add/Remove
Windows Components. After installing you will have a console in the Administrative Tools. I think instead
of giving lot of steps.. i will post a simple video of 7mins, just watch it for better understanding of this
concept.
Video Link
Now you are ready with your DHCP server installed and configured. so lets talk about why and how it is
used? As i said previously it is used for Automatic assignment of IP addresses to client computers which
are in the same network with DHCP server. This is the way it will be used. Whenever a computer
powered on, it will check itself for the network configuration, if it is configured with manual ip address, the
machine broadcasts a message that it was powered on. If it is configured to get the ip automatically, then
the machine broadcast a message in search of DHCP server. Then starts the process. It is simply called
as ―DORA‖ process.
D = Discovery – Request for discovering DHCP server from client machine.
O = Offer – Respective DHCP server Offers the IP Configuration.
R = Received – Client receives the IP configuration.
A = Acknowledgement - Client Acknowledges that it has received the IP configuration.
Once the client gets the IP configuration, it will then broadcasts another message to all other clients in the
network with its identity.
Interview Questions related to DHCP
1. Explain the DORA process
2. What is an exclusion range and reservation?
An exclusion range is a range of IP addresses which needs to be excluded from DHCP scope, so that
these IP’s never assigned automatically. A reservation is an IP address will be reserved for a server every
time it boots up and it has been done using the MAC address of that server. Before configuring
reservations, we need to exclude them from DHCP scope.
3. How do you configure the AD Server, DNS Server, IIS Server and FTP Server using the DHCP
server?
Using the reservations only, so that every time the same address will be assigned to the server. If you
take a DNS server, it should have same IP all the time, because it is responsible for name resolutions in
that network. If the IP address getting changed every time, its very difficult to the clients which are
requesting name resolutions. That is the reason, it should have same IP all the time, we can do that
automatically using reservations.
4. What is DHCP relay agent?
DHCP relay agent, is an option configured on DHCP server. Which enables the client machine requests
to go through the routers. That means, if the DHCP server is in one network and the client is in another
network, these networks are connected by routers. By default the routes will never allow the DHCP
packets through them, by configuring this option, these requests will pass between two networks

Active Directory : Behind the Directory
Hi Friends,

As you know Active Directory is the main database for Centralized Administration of Enterprise
Environment, i want to share something with you about this extra-ordinary directory service.

       Active Directory will be installed on a stand alone Windows Server 2000/2003/2008 operating
systems when we run dcpromo command. It is an integrated module which resides hidden until we run
dcpromo.
         Active Directory stores all most all information about an enterprise. Which includes user accounts,
computer accounts, user groups, group policies, shared folders, network printers, etc. All this information
is stored in the Active Directory Database. The files associated with the Active Directory database are
located under C:WindowsNTDS and the files are as follows…
ntds.dit           This is the main file for Active Directory. All the AD information will
                   be stored in this file.
edb.log            When a change is triggered to AD database, first the information will
                   be written to this file, and the same will be then written to ntds.dit. The
                   AD performance depends on how fast the updates will be transferred
                   from edb.log to ntds.dit
res1.log &         Initial size of these files will be 10MB each, used as reserved space for
res2.log           AD updates, in case of Low disk space issues the same files will be
                   used to save the AD updates.
edb.chk            The checkpoint file (edb.chk) records transactions committed to the
                   AD database (ntds.dit) during shutdown. A "shutdown" statement is
                   written to the edb.chk file when we shutdown the AD server. Then,
                   during a reboot, AD determines that all transactions in the edb.log file
                   have been committed to the AD database. If, for some reason, the
                   edb.chk file doesn't exist on reboot or the shutdown statement isn't
                   present, AD will use the edb.log file to update the AD database.
temp.edb           This is a scratch pad used to store information about in-progress
                   transactions and to hold pages pulled out of Ntds.dit during
                   compaction.

     The file extension .DIT stands for Directory Information Tree.

     The file extension .CHK stands for Check Point file.

        If the DNS is Active Directory Integrated, its data also stored with AD Database.
Using System State option in NTBACKUP we can take the back up of Active Directory.
         When we promote the secondary domain controller all this data from these files will be replicated
to its database.
        Active Directory uses Kerberos Authentication.
        LDAP(Light Weight Directory Access Protocol) is the Protocol used to query the Network
Directories like Active Directory. It uses port number TCP 389 to query AD.
        In Windows 2008 Active Directory comes as a Service, to decrease reboot frequency.
       AD Users and Computers, AD Sites and Services & AD Domains and Trusts are the three
consoles which are used to maintain AD database in GUI.

How to join a computer to the domain which is in different
network(VLAN)?
This is a real time environment requirement. Let’s see how can we achieve this.

        Make sure both VLAN’s are communicating
        Disable windows firewall on the AD machine and Add exceptions to the following ports.
        Open required ports for DNS, NetBIOS, RPC, LDAP and ICMP in both ways from source to
destination.
        Set the AD gateway as the default gateway for client machine.

Ensure that all the required firewall ports are open to enable communication between domain controller
and client which are in different networks.


Active Directory : Replication
Hi Friends,

Welcome Back !!!! :)

In the previous post i discussed something about Active Directory and the files associated with it. In this
post i want to tell you about the magic behind Active Directory replication.

What is meant by Replication?

Replication is the process of making a replica (a copy) of something. A replication is a copy. Using
replication process we can copy the active directory database from one site to another site. This process
is initiated when we create additional domain controller for the existing domain. That means we are
                                          creating a backup/secondary copy of the original domain
                                          controller to make sure it is available in the case of failures.

                                          How the Replication happens in Windows Server?

                                          After replica of Active Directory implemented, from there on
                                          every change that is being made to Primary copy will be
                                          replicated to Secondary. When you are trying to implement a
                                          replica for the first time, in the process of implementation all the
                                          objects from Primary Domain Controller will be copied over to
                                          the Secondary Domain controller. At this point both DC’s are in
sync state. But when a new object created or deleted in/from the Primary DC, the same will be copied to
Secondary DC immediately. Remember in Windows 2003/2008 the Secondary DC are always read-only
copies. In the situation of failure of the Primary DC, we can change the Secondary DC as read/write copy.
When the Secondary DC acting as Read-Only copy, it will not allows us to create or delete objects. It only
updates it’s information from the Primary DC. This was implemented in this way to avoid conflicts in the
objects. Every object has an property called USN (Update Sequence Number), depending on this
attribute the Secondary DC identifies whether the updates are available or not. For example, for a user
object if the USN is 124 on Primary DC, and the same is 123 on Secondary DC, then the secondary DC
requests the Primary DC to send the updated information. In this way both DC’s are in sync all the time. If
one of the DC goes down, we still have updated information in the Other.

If you are creating the replica in same location as the Primary, there is no issue at all in the process of
replication, but if you are creating the replica in branch office location there might be some problems
associated with the design. You can manage the inter-site (between sites) or intra-site(same site)
replication using the AD Sites and Services. A site is a collection of computers which are working together
in the same IP Subnet. Replication is controlled by the Site Link objects created in between the sites. We
can schedule the replication process and replication interval using the Site Link Properties. The Site Links
are ―automatically generated‖ using the ISTG(Intra Site Topology Generator). KCC (Knowledge
Consistency Checker) is the part of ISTG which generates Site Link objects in Inter-Site replication. If in
any case if the automatically generated site links are not working for some reason, we can create them
manually usingrepadmin /kcc command.

If you have multiple domain controllers (multiple copies)
in each site, replication process consumes high amount
of bandwidth. To avoid this, every site must have only
one domain controller acting as the replication partner.
It is called as Bridgehead server. This bridgehead
server again sends the updates to the other DC’s which
are located in its site. In the image, the server in Russia
acting as Bridgehead for Server in Germany(Think it as
Russia Second server).




By Right clicking on a site link and by selecting ―replicate now‖ you can initiate replication between the
domain controllers in same site or different sites.
Blue screen death
Asked By: tshepisobo | Asked On: Sep 20th, 2011
                                                                                                  11 answers
What is a blue screen of death ? How do you trouble shoot the computer in such situation ?
Answered by: Maz on: Oct 5th, 2012
In most cases blue screen is there for few seconds and system keeps rebooting. First of all you need to
get to the error message. A very good feature of win xp is to press F8 on startup and select do...
Answered by: Ravinra Kulkarni on: Feb 18th, 2012
1) First check blue screen error number, is it Application Or Hardware
2) Generally this problem comes when problem in RAM so First check computer start with another RAM
Answer Question Select Best Answer

Ie browser redirect
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                    7 answers
A user calls and every time he launches internet explorer he gets the page cant be displayed right before
this his virus software had detected virus...What could be causing this problem you checked the settings
in ie and its has the correct homepage
Answered by: Abhishek Sharma on: Oct 1st, 2012
The system is affected with M a l w a r e. The only only solution to remove is to boot with bootable
antivirus rescue disk.
Answered by: Mandar Mench on: Jul 26th, 2012
Due to your network firewall or due to old internet explorer u r using on that pc this problem may be
occur so you can do one thing reset all setting to default delete all cookies and upgrade your browser
your problem may be solved .
Answer Question Select Best Answer

What is the difference between outlook & outlook express?What is ip range in
networking side? How we will troubleshoot outlook?How we will configure ldap
on outlook?
Asked By: rajeevsoniji | Asked On: Aug 1st, 2007
                                                                                                  17 answers
Answered by: Salik on: Sep 30th, 2012
Guys have done a gr8 job, nothing else left to be answered..

I just wanna say:
Gilbert, Hitesh & Syed_nrpt has provided wrong set of answers.

Everyone else (Upto my this post/msg) is right about IP range.
Answered by: Yogesh Kumar on: Apr 30th, 2012
Outlook is the edition of Microsoft Office (Outlook file Extension is .pst) & Outlook Express is the edition
of Internet Explorer (Outlook Express file Extension is .dbx).
Answer Question Select Best Answer

How do you backup emails on ms outlook?
Asked By: SiziRose | Asked On: Apr 26th, 2011
                                                                                                    4 answers
Answered by: Umesh Raghav on: Sep 28th, 2012
Go to control panel open the mail option then open the data file after that select the personnel folder and
click on open folder copy that .pst and close all the options which were open and then paste that .pst
backup where you want to place that backup
Answered by: shashi021 on: Jun 23rd, 2011
install PST Sync (http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=9003) and set
up Backup path for the respective PST.
Answer Question Select Best Answer

Spool service
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                   9 answers
How can I tell if the print spool in running and where is it located? Where does it store spooled print
jobs?
Answered by: vikara on: Sep 26th, 2012
DHCP: Port 546 (DHCP Client port for IPv6) should not be used by any other process while rogue
detection is enabled
Answered by: rakesh reddy on: Sep 23rd, 2012
type services.msc and search for print spooler service and make sure it is set to automatic, and now try
to print hope your issue should be fixed by now.
Answer Question Select Best Answer

What is the difference between language and technology?
Asked By: jeevan | Asked On: Aug 19th, 2011
                                                                                                   2 answers
Answered by: Rajan Choudhary on: Aug 19th, 2012
Technology is the way in which a current problem statement is Resolved. and Language by the way in
which the technology has been Implemented. e.g Silverlight is technology which comes from Microsoft...
Answered by: Nikhil on: Sep 4th, 2011
Launguage is used to programing to develop applications.

Technology is set of programmes to find a new way of solving current systems backlogs.
Answer Question Select Best Answer

Connectivity troubleshooting
Asked By: kalahari | Asked On: Sep 26th, 2010
                                                                                                   9 answers
A user in a corporate network contacts service desk saying he/she has lost network connectivity: how will
you troubleshoot the issue? What are the steps to followed?
Answered by: praveen on: Aug 2nd, 2012
!st check thee cable...and immediate click on network connectivity...go to run cmd den ipconfig /release
then..ipconfig /renew den refresh2 to 3 times on desktop...definitely..it should works...
Answered by: Vinit on: Jul 26th, 2012
If you're getting an error message limited activity by right clicking on the connectivity icon on the task
bar, use ipconfig /release then ipconfig /renew commands refresh the desktop and check. If th...
Answer Question Select Best Answer

Remote connection
Asked By: ras2008 | Asked On: Jun 7th, 2008
                                                                                                  17 answers
If you have client in a different location and want to access that client from server, what is the best way
to access that client from server?
Answered by: praveen on: Aug 2nd, 2012
domain and remote option...must be there or vnc(virtuval net computing)its the solutions
Answered by: khojem praymaswala on: Aug 2nd, 2012
best way to go throgh VNC.
and also remote desktop.
Answer Question Select Best Answer

Java application installers
Asked By: Renee | Asked On: Sep 12th, 2011
                                                                                                 1 answer
What are the most common tools to develop the installer of Java applications or applications in general?
Answered by: Ketan Chiplunkar on: Jul 29th, 2012
you can use the Eclipse software & Net beans software.
Eclipse is best for All Java Applications except EJB.
EJB you can do in Net beans.
Answer Question Select Best Answer

Enable usb ports
Asked By: blayne | Asked On: Sep 20th, 2011
                                                                                                8 answers
I have disabled all usb ports on my stationary computer, my mouse and keyboard don't work... How do I
enable it back? Please help... i cannot press f2 to get into bios, nothing works... Keyboard or mouse...
Answered by: Vinit on: Jul 26th, 2012
since you've disabled USB ports pressing F2 will not work if you're using a USB keyboard. I recommend
you to boot your system from a different source and format your system HDD or you can use a non-USB
keyboard to enter BIOS setup and enable USB ports.
Answered by: Shamim haider on: Apr 25th, 2012
First system restart and press del or F2. after bios inter enable USB keyboard & mouse support,and use
ps2 keyboard and mouse.
Answer Question Select Best Answer

What type of problems are associated with operating system like window xp?
Asked By: alam | Asked On: Aug 13th, 2007
                                                                                                4 answers
Answered by: Mandar Mench on: Jul 26th, 2012
If you installed winxp and windows 7 both operating system in dual boot you can define which system by
default to be start through editing in boot.ini or from go to start - run -put following command ...
Answered by: Khandokar Mahafuz Hassan on: Jun 28th, 2012
If you are installed
Multiple operating system, select which one you want it (that files Boot.ini)
Answer Question Select Best Answer

What is difference between win XP and wn 7 technically?
Asked By: Dastagir Amir Hamaja | Asked On: Jun 18th, 2011
                                                                                               17 answers
Answered by: Mandar Mench on: Jul 26th, 2012
The major difference between win xp and windows 7 is graphics and than it is more secure than winxp
and it has inbuilt utility like bitdiffender to encrypt the data on drive which is only accessible i...
Answered by: Simasingh on: Jun 16th, 2012
windows diffusion in windows 7 provide maxi mam security in operating system but windows xp this is
not future use
Answer Question Select Best Answer

Bootloader
Asked By: chetan_01 | Asked On: Dec 7th, 2008
                                                                                                4 answers
What is bootloader?
Answered by: Mandar Mench on: Jul 26th, 2012
Actually bootloader is a windows default utility through which when we start our system it check all the
details related to system boot means on which partion is primery and active as well as where th...
Answered by: ajey53 on: Jun 17th, 2012
Boot Loader is the part of the OS that enables booting process and loading the particular OS while start
up. The function of the Boot Loader is to perform and start up options while the users turn on...
Answer Question Select Best Answer

Ntldr error meaning
Asked By: adpatel33 | Asked On: Apr 7th, 2012
                                                                                                      5 answers
When I boot my computer I have seen on my screen " verifying dmi pool data" and then after second
line is shown "ntldr is missing..." what is this problem and who can I solve it.
Answered by: Mandar Mench on: Jul 26th, 2012
when ntldr missing message shown than insert the os bootable cd . than go to recovery console by
pressing first R and than copy that file from i386 folder from cd to os system 32 folder and than run ...
Answered by: Vikas Kumar on: Jun 5th, 2012
Yes he is right,You need to copy it from the CD or DVD and than paste it,other wise it will not load the
OS from the HDD as it loads the OS from the bootable media
Answer Question Select Best Answer

How will you install operating system in more than 50 pc at a time when the all
pcs having same configuration.
Asked By: san_pradeep59 | Asked On: Sep 18th, 2007
                                                                                                    19 answers
    Read Best Answer
Editorial / Best Answer

Answered by: prasad samant
Answered On : Nov 20th, 2007
Other way is
If the pcs are on network you can have RIS or WDS setup. Requirement for clients is they should have
network bootable NIC
Answered by: ritesh on: Jul 14th, 2012
we can use another service like RIS (Remote Installation Server).
By the help of it we can install o/s to multiple systems
Answered by: raj on: Jul 1st, 2012
ghost is not secured installed WDS (windows deployment services) it is the way for network instillation
Improve Answer

Removal of virus
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                      8 answers
You have a virus that loaded several processes every time you stop the process it restarts itself you tried
going into safe mode but it does the same thing...You found the dll files associated with it but you cant
stop or delete them what is the easiest way to repair?
Answered by: mukeshg on: Jun 1st, 2012
Reinstall the operating system, at the time of installation choose repair option, it repairs all corrupt dll
files, and keep ur data as it is.
Answered by: thilak on: May 12th, 2012
First Remove the system from network and run the virus scan. Deleted the file from Quarantine if the
system scanned fully copy the data in externaml drive and format the syustem
Answer Question Select Best Answer

How to install os from server to all system?
Asked By: tejeshwarao | Asked On: Sep 1st, 2011
                                                                                                   7 answers
Answered by: Yogesh Kumar on: Apr 30th, 2012
We can RIS service in Windows Server 2003SP1 and WDS Services Windows serve 2003SP2 and also
WDS in Windows server 2008.
but we have .inf file of all systems of a network those boot from network.
so we can easily install from Server.

Answered by: Himanshu dihauliya on: Mar 31st, 2012
100% we will use WDS. Window Deployment Services Feature, That is Available in Windows 2008....
Answer Question Select Best Answer

How to install operating system in usb pen drive?
Asked By: Mohd.Mumtaz007 | Asked On: Mar 9th, 2012
                                                                                                   2 answers
Answered by: Shamim Haider on: Apr 28th, 2012
First create usb bootable to pen drive, then select first boot device (usb device) from bios
Answered by: rickevans on: Mar 9th, 2012
Step 1. Format the USB Flash Disk Run CMD (elevated) and type: 1. diskpart 2. list disk (*now find your
USB disk number, youll find it by its size) 3. select disk 1 (*if your USB is disk 1)...
Answer Question Select Best Answer

What is difference between msi and exe file ?
Asked By: pkarle | Asked On: May 14th, 2011
                                                                                                   7 answers
Answered by: itmanpjs on: Apr 26th, 2012
There is no relationship between an MSI file and an .EXE file. An .exe file, like a .com file is produced
when source code is complied and creates a Windows executable program. An .MSI file is a file...
Answered by: Jisthi Khan on: Feb 21st, 2012
MSI file is only for installation purpose. EXE file can be anything that executes on windows.
Answer Question Select Best Answer

Desktop icons
Asked By: Abdul subahan.H | Asked On: Dec 7th, 2008
                                                                                                   6 answers
How to make the desktop icons smaller or lager?
Answered by: kam on: Apr 25th, 2012
Right click on desktop-> view-> select any option (large/medium/small icons)
Answered by: Tahir Khalil on: Dec 19th, 2011
You can enlarge desktop icon simply by mouse in Win-7 , that is ( Hold " CTRL Button " and then Move
Mouse Scroll To UP ) .. Thnx

Mobile outlook
Asked By: Dastagir Amir Hamaja | Asked On: Jun 18th, 2011
                                                                                                    1 answer
How to configure outlook in mobile in exchange 2007 environment?
Answered by: chetan on: Apr 4th, 2012
you can configure outlook in all type of BlackBerry phone..
1st u need create blackberry account from your network provider .
then configure that ID in your exchange server to that domain id of user
Answer Question Select Best Answer

How a virus program destabilize ms windows XP
Asked By: albrq | Asked On: May 12th, 2008
                                                                                                  3 answers
What is the mechanism of combating those malicious program? Evaluate each technique
Answered by: Rahul Sharma on: Mar 7th, 2012
Follow these steps
1)Run ->Cmd
2)Type netsh
3)Firewall
4)Now type in "set opmode enable" to start firewall and "set opmode disable" to stop fire wall.
Answered by: daperfetto on: Feb 24th, 2011
By corrupting, or deleting data
Answer Question Select Best Answer

How to do a complete refresh of computer using back up discs ?
Asked By: dorothy828 | Asked On: Aug 17th, 2011
                                                                                                  2 answers
Answered by: Upendra Sabat on: Feb 29th, 2012
Firstly You to take the system backup on a External hdd, then You format and load os, then You restore
the data through system backup.. thanx.
Answered by: shrikant dongre on: Dec 12th, 2011
This using the external hard disk and personal data back up the external hard disk. second thing format
your computer...;
Answer Question Select Best Answer

Microsoft outlook pst file size limit
Asked By: Pravin Bargode | Asked On: Jun 23rd, 2011
                                                                                                  7 answers
What is the pst size limit in outlook97, 2000, 2003, 2007 and 2010?
Answered by: Sundar S on: Feb 19th, 2012
In Outlook 2002 and earlier, the .pst files are in the American National Standards Institute (ANSI) format,
and the overall size has a limit of 2 GB. In Outlook 2003 and after, the .pst files are in ...
Answered by: Shafi23 on: Sep 6th, 2011
MS outlook in 2003 and 2007 is 2GB, in 2010 is 50GB
Answer Question Select Best Answer

A users application on their desktop is not working, explain what you would do
to resolve this problem
Asked By: ramraje | Asked On: Mar 4th, 2011
                                                                                                  3 answers
Answered by: pravin on: Feb 15th, 2012
1. Go to task manager the partiquer applicatoin right click application and go to process and End Task.
2. Then go to Event viewer
3. Check application
Answered by: AdhamFadel on: Feb 5th, 2012
Maybe application is disabled by Antivirus
Answer Question Select Best Answer

Reset user password
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                  6 answers
How do you reset the users password give the steps it took to get you to the user account.
Answered by: Jayaram. on: Jan 28th, 2012
If it is for a domain user go to active directory users and computers. Type username and click search.
Below you can see user name. Click mouse right button on user name and click on reset password. T...
Answered by: raj_smart on: Jul 3rd, 2009
If its domain environment here all the user accounts info will be maintained with some security Questions
add some security measures. By this tool user account can change his/her password every size l...
Answer Question Select Best Answer

What is APIpa stand for?
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                  13 answers
What does APIpa stand for and how can you tell if your computer is using it? Why would your computer
be using it?
Answered by: sunny lohar on: Jan 4th, 2012
APIPA stands for automatic private ip address, it is the feature of Windows XP, automatic takes an IP
from the range 169.254.1.0 to 169.254.255.255, at the time when when DHCP and TCP/IP not able to
assign an IP to the local computers.
Answered by: saubhagya shakti singh on: Dec 22nd, 2011
APIPA - Automatic Private IP Addressing its a feature that used in opereting system. When DHCP is
unavailable then
APIPA provide IP ranging from 169.254.0.0 to 169.254.255.255
Answer Question Select Best Answer

Unable to view deleted files in recycle bin (winxp)
Asked By: suresh pa | Asked On: Jun 10th, 2008
                                                                                                   6 answers
I deleted my files, but I didn't see that files in my recycle bin.Pls anybody help me...
    Read Best Answer
Editorial / Best Answer
Answered by: bspkumar
View all answers by bspkumar
Member Since Sep-2007 | Answered On : Jul 25th, 2009


Every one is suggesting what to do next time. he is asking how to recover the deleted file now.

First step you need to do is stop working on the hard disk in which you have lost the file. Otherwise, the
file will be overwritten by another file.

Then run any of the file recovery software.

If you have already used the same hard disk, the chances of recovering the file is less.
Answered by: sivananduri on: Nov 28th, 2011
File deletion will be 2 types. Temporary & Permanent. If the file is deleted without selecting shift button,
it will come to recycle bin. Otherwise the file will be deleted permanently. In such cas...
Answered by: bspkumar on: Jul 25th, 2009
Every one is suggesting what to do next time. he is asking how to recover the deleted file now.First step
you need to do is stop working on the hard disk in which you have lost the file. Otherwise, th...
Improve Answer
Going straight to desktop without having to login
Asked By: ups5363 | Asked On: Oct 15th, 2011
                                                                                                    3 answers
How do u go straight to your desktop when you reboot rather than having to login every time you reboot
or turn on your computer on?
Answered by: ravi on: Oct 18th, 2011
First you right click on computer and then click on manage.at that time a window appear. Then go to
local users and groups. Then the total users will appear. Then right click on user name what u r ent...
Answered by: rajan on: Oct 17th, 2011
By removing the user name or with out user name you can directly log in to the windows
Answer Question Select Best Answer

How do you check who are invited for the meeting
Asked By: snehaspandana | Asked On: Aug 2nd, 2011
                                                                                                    2 answers
If a meeting request is received, how will you check who all are invited in a meeting in outlook?
Answered by: RAJ on: Sep 24th, 2011
1.Open the meeting request or notification. To view your calendar, click Calendar. Note A new meeting
request will appear as a tentative on your calendar. 2.Do one of the following: Accept, ten...
Answered by: vijaya on: Aug 17th, 2011
In 2010 if you check meeting tab and open specific meeting appointment you have an option tracking in
access toolbar
Answer Question Select Best Answer

Artribation process
Asked By: rameshrgen | Asked On: Jun 28th, 2009
                                                                                                    2 answers
Which layer provides physical link, flow control, artribation process?
Answered by: S.Prabu on: Sep 5th, 2011
Cable related doing activity called physical layer.Hub is working on physical layer.
Answered by: drum4ravi on: Jul 10th, 2009
Its the Data Link Layer
Answer Question Select Best Answer

Network logon failures
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                    5 answers
A user calls you they cant login in said they have tried several times what is the best way to troubleshoot
this.
Answered by: uma on: Aug 22nd, 2011
1.Check whether the caps button is on or not and then give user name and password 2.Check whether all
the network cables connected properly 3.Check whether the user is added in domain 4.Can reset the...
Answered by: SUMIT GUPTA on: Aug 10th, 2011
Just Check the user's account in active directory & finally check system is in domain or LAN is working
fine or not.

This is the only troubleshooting for that issue
Answer Question Select Best Answer

What are the steps to create .Pst in client system ?
Asked By: Pramod Dhende | Asked On: Aug 7th, 2011
                                                                                                    1 answer
Answered by: Yogesh Dhiman on: Aug 10th, 2011
we have two option for creation of Archive folder or PST(Personal Storage Template) or personal folder 1.
Automatic Archive 2. Manually Archive Manually Archive for 2007 and 2010 For Outlook 2007 ...
Answer Question Select Best Answer

Backup of computer
Asked By: LAVLEEN SAINI | Asked On: Jul 16th, 2011
                                                                                                  2 answers
How to take the backup of computer? After taking backing is there d and f drive programs also
recovered?
Answered by: Kannan Kanna on: Aug 4th, 2011
types of backup

incremental backup update backup file
daily backup daily fixed time backup
normal backup Copy and past backup
full backup any timE full hdd backup

Answered by: Hamid Ali on: Jul 20th, 2011
If you wanna backup your system like D and F drives follow the steps, 1.Click on my computer icon.
2.Left click on the drive which you wanna backup and go to properties 3.Go in Tools tab there you wi...
Answer Question Select Best Answer

Low level formatting
Asked By: parameshg | Asked On: Apr 5th, 2009
                                                                                                  3 answers
Define low level formatting?
Answered by: Hamid Ali on: Jul 20th, 2011
Low-level formatting is the process of outlining the positions of the tracks and sectors on the hard disk,
and writing the control structures that define where the tracks and sectors are. This is ofte...
Answered by: veda prakash on: Jul 7th, 2011
creating new tracks and sectors on the hard disk
Answer Question Select Best Answer

What is imap? How does it work?
Asked By: Mohammed Saif | Asked On: Jul 14th, 2007
                                                                                                 10 answers
Answered by: Hamid Ali on: Jul 20th, 2011
The Internet Message Access Protocol (commonly known as IMAP) is an Application Layer Internet
protocol that allows an e-mail client to access e-mail on a remote mail server.
Answered by: Amit Maurya on: Jul 17th, 2011
IMAP is stands for Internet message access protocol, which is used for accessing mails from the server
and this protocol leave not remove the mail from the server but if we POP(Post Office Protocol) it can be
remove from the server mails.
Answer Question Select Best Answer

Difference between *.Ost and *.Pst
Asked By: Pravin Bargode | Asked On: Jun 23rd, 2011
                                                                                                  2 answers
What is the difference between *.Ost and *.Pst ? How does it work?
Answered by: Hamid Ali on: Jul 20th, 2011
Offline folders (.ost) files are stored on your computer and are available even when the network is down.
The default location for the .ost is your current Windows folder. Like personal folders (.pst) files, .ost files
can be compacted to save space on your computer.
Answered by: Narendra jogani on: Jul 17th, 2011
Offline folders (.ost) files are stored on your computer and are available even when the network is down.
The default location for the .ost is your current Windows folder. Like personal folders (.pst)...
Answer Question Select Best Answer

Windows XP boot options
Asked By: Shaishav | Asked On: Mar 21st, 2009
                                                                                                      5 answers
What advance boot options are available for windows xp?
Answered by: Hamid Ali on: Jul 20th, 2011
1)Safe Mode 2)Safe Mode with Networking 3)Safe Mode with command Prompt 4)Enable Boot Logging
5)Enable VGA Mode 6)Last known Good Configuration(your most recent settings that worked) 7)Directory
Servi...
Answered by: Atul Keshri on: Jul 20th, 2011
Safe Mode
Safe Mode With Networking
Safe Mode With Command Prompt
Enable Boot Logging
Enable VGA Mode
Last Known Good Configuration
Directory Services Restore Mode
Debugging Mode
Disable automatic restart on system failure
Start Windows Normally
Reboot
Return to OS Choice Menu
Answer Question Select Best Answer

Installing printer
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                      4 answers
You are required to install a new printer on the print server what are your steps? Remember this will be a
shared printer
Answered by: komodosp on: May 25th, 2010
To share it on the network, in Control Panel / Printers and Faxes, you can right-click on it, and in the
menu, click on Sharing
Answered by: syed_nrp on: Apr 30th, 2009
First Start--->Control Panel--->Printers---->Add printer--->Local (or) Network
Printer--->Choose which brand printer and which one type of printer

(if it's needed drivers, push the driver CD in that PC)---->Select TYPE (LPT1 or USB)--->Finish.

It's ready to use printer. now printer is online.
Answer Question Select Best Answer

How can you view startup items
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                      4 answers
There are a couple of way to view and disable the items that start to the task pain... How would you go
about doing it and give me the full path to get you there
Answered by: pks07pro on: Jan 7th, 2010
To see the most start up item,
Go to start>programm>start up
To make any changes, enable or disable
Go to Run & type "msconfig"

How to take backup of emails on outlook ?
Asked By: Charanjeetsingh79 | Asked On: May 7th, 2011
                                                                                                        4 answers
Answered by: shashi021 on: Jun 23rd, 2011
Other way to take backup install PST SYNC
(http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=9003)

and set backup path for which pst want to be backup. it,s take much less time as using copying method.
Answered by: anshulmehra_2007 on: May 27th, 2011
 log in with some user->delete files->tools->options->maintenance->store folder->copy the path-
 >create new folder->paste the path to the new folder created->import->messages->MS outlook->select
 the user from where files is deleted->browse folder where the path was pasted->finish
Answer Question Select Best Answer

Printing problems
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                        3 answers
User sent a job but it is stuck in the local cue how can you delete it? Name a couple ways
   Read Best Answer
Editorial / Best Answer
Answered by: syed_nrp
View all questions by syed_nrp View all answers by syed_nrp
Member Since Apr-2008 | Answered On : Jan 3rd, 2009


You first Install the proper printer driver install. Check that printer is on/off status. Then give a test page.
The test page is not printing, go To
RUN-->services.msc

check printspooler give stop and start. it's work fine
Answered by: Dastagir Amir Hamaja on: Jun 18th, 2011
Go to start, setting , priter and faxes, there you will see your printer, double click that printer, you will
find jobs you have printed, right click that job and try to delete it.
If not deleting then restart printer spooler services. if not deleting then restart printer and pc.

Thanks,
Dastagir
Answered by: syed_nrp on: Jan 3rd, 2009
You first Install the proper printer driver install. Check that printer is on/off status. Then give a test page.
The test page is not printing, go To
RUN-->services.msc

check printspooler give stop and start. it's work fine
Improve Answer

Printers
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                 2 answers
How do you install a pre existing printer on a users desktop
Answered by: pavankumarnagisetti on: May 21st, 2009
Go to Start-> Settings -> Printers and Faxes
This opens a new window now click on add a printer from right side panel.

Follow the steps.
You can add normal as well network printer using this.
Answered by: rrsain on: Sep 13th, 2008
Go to control panel and then go to add hardware wizard After that read all the options carefully. When
system requires software for that, insert the software CD otherwise system will install automatically.
Restart the system, if it is not working, tell me, I will give you complete solution
Answer Question Select Best Answer

Dealing with irate customers
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                 2 answers
You take a call from a customer who is very upset they cant work how do you deal with this?
Answered by: udaykalidindi on: Jun 2nd, 2009
This is a common problem faced by a every one working in helpdesk.1st thing don't try to argue with
him. 2ndly try to understand the issues or problems he is facing.3rdly don't promise him heaven and ...
Answered by: tintin3011 on: Sep 3rd, 2008
Talk politely and try to know the problem, and solve as fast as you can.
Answer Question Select Best Answer

Firewire port
Asked By: akki4444 | Asked On: Apr 3rd, 2009
                                                                                                 3 answers
What is firewire port? What are its uses?
Answered by: khurramjol on: Apr 21st, 2010
Firewire port is a form of Serial Port that make use of FireWire Technology to transfer data rapidly from
one electronic device to another.FireWire port has the ability to interact with a number of&nb...
Answered by: delhi.itsupport on: May 22nd, 2009
Firewire generally ports are genereally comes with laptop & apple desktop/laptops. You can connect
various external hardware with this. e.g HDD, CDROM, Cameras etc. the transfer rate of
a FireWire port can reach up to 400 Mbps.
Answer Question Select Best Answer

Virtual memory
Asked By: punitgoyal88 | Asked On: Jan 27th, 2011
                                                                                                 2 answers
How to improve virual memory of pc?
Answered by: Dastagir Amir Hamaja on: Jun 18th, 2011
Go to system propert--> Advanced Tab--> click on setting of performance--> Advanced Tab--> Click on
Change 0f Virtual memory--> now here you can increase virtual memory

Dastagir
Answered by: srbnew on: Feb 4th, 2011
just right click on my computer icon
select properties
go to advance
go to performance
select virtual memory
select how much u want
apply and click ok
thatz itz
Answer Question Select Best Answer

Restore windows XP
Asked By: krabhilas | Asked On: Sep 23rd, 2008
                                                                                               4 answers
How to restore windows XP in command mode.
Answered by: ashi786 on: Aug 18th, 2009
To start System Restore Windows XP first you create a system restore point by following steps:1. Click
start and go help and support options on right hand side you see under pick a task options.2. C...
Answered by: mahadeva83 on: Apr 7th, 2009
To start System Restore using the Command prompt, follow these steps: Restart your computer, and
then press and hold F8 during the initial startup to start your computer in safe mode with a Command
pr...
Answer Question Select Best Answer

Pxe use
Asked By: walker233 | Asked On: Jan 14th, 2011
                                                                                               2 answers
What is pxe used for? What dependencies does it have to be useful?
Answered by: sharmavivek096 on: Jun 2nd, 2011
The Preboot eXecution Environment (PXE, also known as Pre-Execution Environment; sometimes
pronounced "pixie") is an environment to boot computers using a network interface independently of
data stora...
Answered by: s.pandilwar on: Jan 28th, 2011
Preboot Execution Environment (PXE) :- When we are trying to boot system from network we need to
enable PXE boot device from BIOS. It is helpful to install OS from network & it will pick IP address
automaticaly. It is helpful in large network were we cannot install OS manualy.
Answer Question Select Best Answer

Home folders
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                               3 answers
User has a home folder setup in ad when he logs in it maps the u drive which point to the share on the
server.. He accidenTALLY deleted it what is the fastest way to get it back from a command line?
Answered by: khurramjol on: Apr 20th, 2010
Re-mapping will restore the home folder, and we can do in Command line as
net use u: serverhome
Answered by: taiwolasile on: Jun 2nd, 2009
Reboot the PC to re-load the roaming profile
Answer Question Select Best Answer

Ldap on outlook
Asked By: saahil4u | Asked On: Sep 10th, 2008
                                                                                               2 answers
What is the ip range in networking side? How do we troubleshoot outlook? How do we configure ldap on
outlook?
Answered by: Ushadavuluri on: Jul 29th, 2009
I am hoping I am submiting the correct answer. IP range in netwroking side is related to DHCP and
Address pools. Ex: 192.168.0.10 to 192.168.0.200 -> Can be defined as address range allowed to dist...
Answered by: Ushadavuluri on: Jul 29th, 2009
From Microsoft OutlookSelect: Tools->Account settings->AddressBook->New Address book-> select
Internet Directory Service(LDAP) radio button-> Next step will take you to the window of se...
Answer Question Select Best Answer

Set ip address from cmd prompt
Asked By: dreamcast | Asked On: Apr 27th, 2010
                                                                                                  3 answers
How do you set the ip address by using the command prompt?
Answered by: arunbathery on: Aug 5th, 2010
There are Two ways to Set the IP address from CMD Prompt1. Go to start, select run, type CMD, and in
CMD Prompt type the command C:>netsh interface ip set address name="Local A...
Answered by: lila123 on: May 28th, 2010
Set IP address from CMD prompt :type cmd in run type following command in sequence like IP
address,Subnet mask, Default Getway, DNS,Wins, ect...exmpl : netsh interface ip set address name="...
Answer Question Select Best Answer

What is the difference between lcd and tft ?
Asked By: vhthakor | Asked On: Nov 5th, 2007
                                                                                                  3 answers
Answered by: shashi jadhav on: Sep 26th, 2008
A TFT monitor uses thin-film transistor technology. Nearly all LCD monitors today use TFT technology.
The benefit of a TFT monitor is a separate, tiny transistor for each pixel on the display. Because...
Answered by: SONY & RAVI on: Nov 22nd, 2007
LCD Means Liquid crystal display TFT means Thin Film Transistor Liquid Crystal Display.What I think you
mean is Active and Passive matrix LCD panels. This is where there is a difference in price. A ty...
Answer Question Select Best Answer

What is the difference between server os and desktop os
Asked By: cnchandrashekar | Asked On: Jun 3rd, 2008
                                                                                                  6 answers
Answered by: Karimulla Shaik on: Apr 7th, 2011
server OS manages Network resources centrally along with its internal resources. desktop OS Manages
only its internal resources(like memory, cpu, i/o, user interface).
Answered by: tdpanee on: Jul 30th, 2010
Server OS can be used to configure a centralised administration for computer network. Desktop OS can
be used to configure client Machine to SErver.
Answer Question Select Best Answer

Enable or disable firewall
Asked By: jcsrinath | Asked On: Feb 18th, 2011
                                                                                                   1 answer
How would you enable or disable the firewall in windows xp?
Answered by: adnanj85 on: Feb 22nd, 2011
To enable Windows Firewall, follow these steps:Click Start, click Run, type Firewall.cpl, and then click
OK.On the General tab, click On (recommended).Click OK.------------------------------To disable...
Answer Question Select Best Answer
Install operating system on more than 50 pc
Asked By: saahil4u | Asked On: Sep 10th, 2008
                                                                                                   4 answers
How will you install operating system in more than 50 pc at a time when the all pcs having same
configuration.
Answered by: Laxman on: Jan 28th, 2011
We use image ghost if all PC hardware requirments are same.
Answered by: walker233 on: Jan 14th, 2011
This depends on your operating system and target hardware.If you are deploying XP then you are bound
by the hardware, and are required to make an image of the OS, using ghost or another image capture ...
Answer Question Select Best Answer

Add a user to network
Asked By: charla | Asked On: Sep 15th, 2009
                                                                                                   6 answers
Explain how will you add a user to network?
Answered by: egyptianfalcon on: Jan 20th, 2011
This answer is specially for windows 7 and I think it would be usiful in all the kind of windowsfirst go to
start menu-controll panel-user accounts-manage another account-creat new account-then w...
Answered by: elmagoal on: Jun 10th, 2010
First you need to figure out what role the user is going to have and if there is anyone on that has the
correct set of permissions as the user. If this is true, on the server or on your desktop if you...
Answer Question Select Best Answer

Create an email account for a user already in ad
Asked By: saahil4u | Asked On: Sep 10th, 2008
                                                                                                   2 answers
How would you create an email account for a user already in ad?
Answered by: Anele Takane on: Jan 6th, 2011
If the user account has been created with a mailbox (mailbox enabled) you may follow ameetsaha's
instructions, but if you need to create an email account (mailbox) you will have to go to your Active d...
Answered by: ameetsaha on: Nov 4th, 2008
Open Micosoft Outlook if you are using office 2000, and click on "Tools" tab. Go to "Email Accounts".
There you can find two option like Email and Directory. Click on "Add a n...
Answer Question Select Best Answer

Sms update
Asked By: msid82 | Asked On: Nov 6th, 2010
                                                                                                    1 answer
A pc did not receive an update from sms. What steps would we take to resolve this?
Answered by: Prabu2009 on: Dec 17th, 2010
If SMS not updated in client system.

1. Need to check system getting IPaddress or not.
2. Need to check system in domain or not
3.Ensure that windows firewall should be off.

Above reason SMS will not update to the client system.
Answer Question Select Best Answer

Troubleshooting a slow computer
Asked By: sanj108 | Asked On: Nov 12th, 2009
                                                                                                   8 answers
A user calls in and complains that her computer and network is running very slow. How would go about
troubleshooting it?
    Read Best Answer
Editorial / Best Answer
Answered by: smokedragon
View all answers by smokedragon
Member Since Nov-2009 | Answered On : Nov 18th, 2009


I would first ask the user whether every application on the computer is slow or is it just one particular
application. if it is just one, try and sort that out.
If the answer is all applications are running slow, look at common causes like, virus scans scheduled, free
disk space on the home drive, RAM, lastly if the deployment team is rolling out any updates (which should
not be done during business hours, but i've seen that happen too ;)
If you suspect network latency, a simple ping test from the user's computer will tell you how many milli
seconds network traffic is taking to reach the server.
Answered by: rgawthorne on: Oct 26th, 2010
First question, when did the problem start? Is anyone else in the same work group experience
slowness.Does it happen all the time, or is it intermittent, any patterns of timings eg, in the morning ...
Answered by: DanielGoad on: Jul 23rd, 2010
'Slow' is a relative question, so first determine what the user is experiencing. Is it slow opening
applications or while working in them? is this a networked application or local? ...
Improve Answer

Windows XP firewall
Asked By: navaneethreddy | Asked On: Jul 12th, 2010
                                                                                                      4 answers
How would you enable or disable the firewall in windows xp?
Answered by: rampraveshraju on: Aug 9th, 2010
Press window+r key on keyboard than type firewall.cpl than you can easily On or Off firewall.
Answered by: Dhamodharan15 on: Aug 5th, 2010
Goto Command prompt, type Services.msc, in the services windows search for Windows Firewall /
Internet Connection Sharing(ICS) and start the service.

Creating email account
Asked By: Big Al | Asked On: May 12th, 2008
                                                                                                      2 answers
How would you create an email account for a user already in ad
Answered by: tdpanee on: Jul 30th, 2010
If you have installed exchnage server, then select the properties of user account and change the mail
enable user check box.
Answered by: abujibrael on: Apr 20th, 2010
1- First click the OU that the users resides. 2- Right click the user, with whom you wanna create an email
account. 3- Now click Exchange Task 4- Click next to the wizard 5- Choose create mailbox 6- C...
Answer Question Select Best Answer

Blackberry synchronization
Asked By: Rrahul Arora | Asked On: Oct 21st, 2009
                                                                                                      3 answers
If a customers blackberry stopped syncing their calendar wirelessly, what would you do?
Answered by: elmagoal on: Jun 10th, 2010
The first step before wiping the Blackberry is to remove the battery for 20 sec. put it back and check the
sync again. While all other steps are correct, most BB issues will be resolve by a hard reset.
Answered by: mdabid on: Dec 10th, 2009
Take Complete Backberry backup using desktop Manager and wipe your handheld, then syncronize by
doing enterprise activation, and restore backup.



Regards,
Mohammed Abid Razvi
Answer Question Select Best Answer

Install pre-existing printer
Asked By: saahil4u | Asked On: Sep 10th, 2008
                                                                                                 2 answers
How do you install a pre existing printer on a users desktop?
Answered by: komodosp on: May 25th, 2010
You may have to install printer hooked to the network. If it has an IP address:1. Control Panel / Printers
& Faxes2. Next past Welcome message3. Local Printer attached to this computer, Next4. Cre...
Answered by: rrsain on: Sep 12th, 2008
Go to control panel and then go to add hardware wizard After that read all the options carefully. When
system requires software for that, insert the software CD otherwise system will install automa...
Answer Question Select Best Answer

What is the difference between windows XP and windows 2000
Asked By: cnchandrashekar | Asked On: Jun 3rd, 2008
                                                                                                 7 answers
    Read Best Answer
Editorial / Best Answer
Answered by: bspkumar
View all answers by bspkumar
Member Since Sep-2007 | Answered On : Jul 20th, 2008


Windows XP Vs windows 2000
.



                       OS                      XP                           2000
Feature

Release                                  2001                            2000



NT                                       5.1                             5.0



32/64 bit                                32/64 bit                       32 bit
built-in CD writer support               y                               n


Remote Desktop Connection,
Internet Connection Firewall,
Fast UserSwitching

                                         y                               n
Windows Media Player and
Windows Messenge


File sys support                         FAT16,32,NTFS,HPFS (High-       FAT16,32,NTFS
                                         Performance File System)




Answered by: syed_nrp on: Apr 30th, 2009
Windows XP has 4 Versions, Windows 2000 has 3 ver. (Win 2000 Pro, Server & AD. Server).Windows XP
has last known good configuration [last used desktop] which is not present in Windows 2000. Remo...
Answered by: hezysasson on: Nov 10th, 2008
Win. XP has drivers that "recognize" hardware easier and faster with system set up.
Improve Answer

Larger desktop icons
Asked By: ghada | Asked On: Feb 22nd, 2009
                                                                                                  1 answer
How to make desktop icons appear larger?
Answered by: Ravi9 on: Feb 23rd, 2009
Right click on desktop. Go to properties and then click on appearance tab. Then further click on effects
tab. A window will open. Select the use large option. Then click on apply OK. Thats it.
Answer Question Select Best Answer

Steps to secure windows
Asked By: ravila23 | Asked On: Feb 21st, 2008
                                                                                                 2 answers
Describe steps you would take to secure windows 2000 server resources and files.
   Read Best Answer
Editorial / Best Answer
Answered by: shashi jadhav
View all answers by shashi jadhav
Member Since Sep-2008 | Answered On : Sep 26th, 2008


There are lot of secure option for Windows, You can secure by -
 Set a difficult password for administrator
 Disable gust account
 Give minimum & limit permissions to administrator's members
Make minimum share folder on your Windows's
Give minimum share permission on that folder & full control to trust users
Always change the administrator password
Install third part firewall & set minimum port.
Access & deny those user's & IP which you don't want to access to your computer.
Don't share your password.


Answered by: shashi jadhav on: Sep 26th, 2008
There are lot of secure option for Windows, You can secure by - Set a difficult password for administrator
Disable gust account Give minimum & limit permissions to administrator's members ...
Answered by: amjad1233 on: Apr 26th, 2008
To Secure the windows following steps should be considered :
1. Making admistration account and giving only requried rights to child accounts
2. Putting some external Anti-Virus to protect from the threats
3. Making some registray changes to be help full
and other
Improve Answer

What is ldap sserver?
Asked By: kaps200 | Asked On: Jul 8th, 2008
                                                                                                2 answers
    Read Best Answer
Editorial / Best Answer
Answered by: aravind kalyan
View all answers by aravind kalyan
Member Since Jul-2008 | Answered On : Jul 15th, 2008


LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to
look up information from a server.
Answered by: Karthikumaran on: Aug 25th, 2008
LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to
look up information from a server.
Answered by: aravind kalyan on: Jul 15th, 2008
LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to
look up information from a server.
Improve Answer

Desktop support & help desk
Asked By: Brianseawood | Asked On: Jun 17th, 2008
                                                                                                 1 answer
What is the technical difference between desktop support & help desk ?
  Read Best Answer
Editorial / Best Answer
Answered by: radelapena
View all answers by radelapena
Member Since Aug-2008 | Answered On : Aug 24th, 2008
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop
Desktop

Más contenido relacionado

La actualidad más candente

Design For Strangers
Design For StrangersDesign For Strangers
Design For Strangerstest99
 
Designfo#{1} #{2}trangers
Designfo#{1} #{2}trangersDesignfo#{1} #{2}trangers
Designfo#{1} #{2}trangersguest0437b8
 
Mastering the Unpredictable - Improving Knowledge Work
Mastering the Unpredictable - Improving Knowledge WorkMastering the Unpredictable - Improving Knowledge Work
Mastering the Unpredictable - Improving Knowledge WorkAdaPro GmbH
 
Streamlining Escalations
Streamlining EscalationsStreamlining Escalations
Streamlining EscalationsShikhar Sindhu
 
Task Manager – an innovative approach to improving hospital communication aft...
Task Manager – an innovative approach to improving hospital communication aft...Task Manager – an innovative approach to improving hospital communication aft...
Task Manager – an innovative approach to improving hospital communication aft...Health Informatics New Zealand
 
Careers in System Administration (2007)
Careers in System Administration (2007)Careers in System Administration (2007)
Careers in System Administration (2007)Fran Fabrizio
 
High Performance Approach for Customer Support Teams
High Performance Approach for Customer Support TeamsHigh Performance Approach for Customer Support Teams
High Performance Approach for Customer Support TeamsIrfan Khalid
 
Top 10 Tips for Sucessful Operations Slides
Top 10 Tips for Sucessful Operations SlidesTop 10 Tips for Sucessful Operations Slides
Top 10 Tips for Sucessful Operations SlidesLERN_AC_2015
 
Project Management Practitioner: Problem Solving and Decision Making
Project Management Practitioner: Problem Solving and Decision MakingProject Management Practitioner: Problem Solving and Decision Making
Project Management Practitioner: Problem Solving and Decision Makinglearnonline4
 
How To Elminate Errors and Increase Efficiency
How To Elminate Errors and Increase EfficiencyHow To Elminate Errors and Increase Efficiency
How To Elminate Errors and Increase EfficiencySmartDraw Software
 

La actualidad más candente (15)

Design For Strangers
Design For StrangersDesign For Strangers
Design For Strangers
 
Designfo#{1} #{2}trangers
Designfo#{1} #{2}trangersDesignfo#{1} #{2}trangers
Designfo#{1} #{2}trangers
 
Mastering the Unpredictable - Improving Knowledge Work
Mastering the Unpredictable - Improving Knowledge WorkMastering the Unpredictable - Improving Knowledge Work
Mastering the Unpredictable - Improving Knowledge Work
 
Streamlining Escalations
Streamlining EscalationsStreamlining Escalations
Streamlining Escalations
 
Salvaging a call center
Salvaging a call centerSalvaging a call center
Salvaging a call center
 
Task Manager – an innovative approach to improving hospital communication aft...
Task Manager – an innovative approach to improving hospital communication aft...Task Manager – an innovative approach to improving hospital communication aft...
Task Manager – an innovative approach to improving hospital communication aft...
 
Faqs rpa
Faqs rpaFaqs rpa
Faqs rpa
 
Careers in System Administration (2007)
Careers in System Administration (2007)Careers in System Administration (2007)
Careers in System Administration (2007)
 
High Performance Approach for Customer Support Teams
High Performance Approach for Customer Support TeamsHigh Performance Approach for Customer Support Teams
High Performance Approach for Customer Support Teams
 
Top 10 Tips for Sucessful Operations Slides
Top 10 Tips for Sucessful Operations SlidesTop 10 Tips for Sucessful Operations Slides
Top 10 Tips for Sucessful Operations Slides
 
FMEA: How to Find the Value
FMEA: How to Find the Value FMEA: How to Find the Value
FMEA: How to Find the Value
 
Escalation lets do it right
Escalation   lets do it rightEscalation   lets do it right
Escalation lets do it right
 
KFwk5paper
KFwk5paperKFwk5paper
KFwk5paper
 
Project Management Practitioner: Problem Solving and Decision Making
Project Management Practitioner: Problem Solving and Decision MakingProject Management Practitioner: Problem Solving and Decision Making
Project Management Practitioner: Problem Solving and Decision Making
 
How To Elminate Errors and Increase Efficiency
How To Elminate Errors and Increase EfficiencyHow To Elminate Errors and Increase Efficiency
How To Elminate Errors and Increase Efficiency
 

Destacado

Generations of computer
Generations of computerGenerations of computer
Generations of computerJan Ralph
 
Generations Of Computer
Generations Of ComputerGenerations Of Computer
Generations Of Computerdpchn
 
Top 10 tier 1 support interview questions and answers
Top 10 tier 1 support interview questions and answersTop 10 tier 1 support interview questions and answers
Top 10 tier 1 support interview questions and answerskatherinealex32
 
Generations of computers
Generations of computersGenerations of computers
Generations of computersZafar Ayub
 
History of Computers
History of ComputersHistory of Computers
History of Computersmshihab
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERRajat More
 
Top 10 pc support technician interview questions and answers
Top 10 pc support technician interview questions and answersTop 10 pc support technician interview questions and answers
Top 10 pc support technician interview questions and answersmarcdanny68
 

Destacado (12)

Generation of computer
Generation of computerGeneration of computer
Generation of computer
 
Generation os computers
Generation os computersGeneration os computers
Generation os computers
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
 
5 GENERATIONS OF COMPUTER
5 GENERATIONS OF COMPUTER5 GENERATIONS OF COMPUTER
5 GENERATIONS OF COMPUTER
 
Generations Of Computer
Generations Of ComputerGenerations Of Computer
Generations Of Computer
 
Top 10 tier 1 support interview questions and answers
Top 10 tier 1 support interview questions and answersTop 10 tier 1 support interview questions and answers
Top 10 tier 1 support interview questions and answers
 
Generations of computers
Generations of computersGenerations of computers
Generations of computers
 
History of Computers
History of ComputersHistory of Computers
History of Computers
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTER
 
Top 10 pc support technician interview questions and answers
Top 10 pc support technician interview questions and answersTop 10 pc support technician interview questions and answers
Top 10 pc support technician interview questions and answers
 
GENERATION OF COMPUTERS.
GENERATION OF COMPUTERS.GENERATION OF COMPUTERS.
GENERATION OF COMPUTERS.
 

Similar a Desktop

Top 10 Interview Questions for computer operator job.docx
Top 10 Interview Questions for computer operator job.docxTop 10 Interview Questions for computer operator job.docx
Top 10 Interview Questions for computer operator job.docxSurendra Gusain
 
Usability Testing and QA 12 11-15
Usability Testing and QA 12 11-15Usability Testing and QA 12 11-15
Usability Testing and QA 12 11-15Shilpa Thanawala
 
Testing and quality romi
Testing and quality romiTesting and quality romi
Testing and quality romiromi wisarta
 
Linking characteristics to IT industry
Linking characteristics to IT industryLinking characteristics to IT industry
Linking characteristics to IT industryAjay Jassi
 
Should I Stay or Should I Go
Should I Stay or Should I GoShould I Stay or Should I Go
Should I Stay or Should I GoTech Benders
 
Testing – Why We Do It Badly2
Testing – Why We Do It Badly2Testing – Why We Do It Badly2
Testing – Why We Do It Badly2adevney
 
Chapter 1 Introduction to Help Desk Support Roles - Part 1.pptx
Chapter 1 Introduction to Help Desk Support Roles - Part 1.pptxChapter 1 Introduction to Help Desk Support Roles - Part 1.pptx
Chapter 1 Introduction to Help Desk Support Roles - Part 1.pptxssuser073948
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design DecisionsRikki Wright
 
Role of system analyst
Role of system analystRole of system analyst
Role of system analystShaileshModi9
 
Problem Solving Methodology 2011 - 2014
Problem Solving Methodology 2011 - 2014Problem Solving Methodology 2011 - 2014
Problem Solving Methodology 2011 - 2014snoonan
 
Engineering Career Paths.pdf
Engineering Career Paths.pdfEngineering Career Paths.pdf
Engineering Career Paths.pdfVladimirRadzivil
 
Testing and quality
Testing and qualityTesting and quality
Testing and qualityOzi Saputra
 
How to do usability testing and eye tracking
How to do usability testing and eye trackingHow to do usability testing and eye tracking
How to do usability testing and eye trackingObjective Experience
 
Test Automation in Agile: A Successful Implementation
Test Automation in Agile: A Successful ImplementationTest Automation in Agile: A Successful Implementation
Test Automation in Agile: A Successful ImplementationTechWell
 
Bt0081 software engineering
Bt0081   software engineeringBt0081   software engineering
Bt0081 software engineeringsmumbahelp
 
Paving the road to production
Paving the road to productionPaving the road to production
Paving the road to productionMatthew Reynolds
 
A Detailed Explanation On The Marking Criteria For Ielts Writing Task 1 ...
A Detailed Explanation On The Marking Criteria For Ielts Writing Task 1 ...A Detailed Explanation On The Marking Criteria For Ielts Writing Task 1 ...
A Detailed Explanation On The Marking Criteria For Ielts Writing Task 1 ...Shannon Olsen
 
How to select and Implement an ERP System
How to select and Implement an ERP SystemHow to select and Implement an ERP System
How to select and Implement an ERP SystemShalini Saha
 
Usability in product development
Usability in product developmentUsability in product development
Usability in product developmentRavi Shyam
 

Similar a Desktop (20)

Top 10 Interview Questions for computer operator job.docx
Top 10 Interview Questions for computer operator job.docxTop 10 Interview Questions for computer operator job.docx
Top 10 Interview Questions for computer operator job.docx
 
Factors in Software Selection
Factors in Software SelectionFactors in Software Selection
Factors in Software Selection
 
Usability Testing and QA 12 11-15
Usability Testing and QA 12 11-15Usability Testing and QA 12 11-15
Usability Testing and QA 12 11-15
 
Testing and quality romi
Testing and quality romiTesting and quality romi
Testing and quality romi
 
Linking characteristics to IT industry
Linking characteristics to IT industryLinking characteristics to IT industry
Linking characteristics to IT industry
 
Should I Stay or Should I Go
Should I Stay or Should I GoShould I Stay or Should I Go
Should I Stay or Should I Go
 
Testing – Why We Do It Badly2
Testing – Why We Do It Badly2Testing – Why We Do It Badly2
Testing – Why We Do It Badly2
 
Chapter 1 Introduction to Help Desk Support Roles - Part 1.pptx
Chapter 1 Introduction to Help Desk Support Roles - Part 1.pptxChapter 1 Introduction to Help Desk Support Roles - Part 1.pptx
Chapter 1 Introduction to Help Desk Support Roles - Part 1.pptx
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
 
Role of system analyst
Role of system analystRole of system analyst
Role of system analyst
 
Problem Solving Methodology 2011 - 2014
Problem Solving Methodology 2011 - 2014Problem Solving Methodology 2011 - 2014
Problem Solving Methodology 2011 - 2014
 
Engineering Career Paths.pdf
Engineering Career Paths.pdfEngineering Career Paths.pdf
Engineering Career Paths.pdf
 
Testing and quality
Testing and qualityTesting and quality
Testing and quality
 
How to do usability testing and eye tracking
How to do usability testing and eye trackingHow to do usability testing and eye tracking
How to do usability testing and eye tracking
 
Test Automation in Agile: A Successful Implementation
Test Automation in Agile: A Successful ImplementationTest Automation in Agile: A Successful Implementation
Test Automation in Agile: A Successful Implementation
 
Bt0081 software engineering
Bt0081   software engineeringBt0081   software engineering
Bt0081 software engineering
 
Paving the road to production
Paving the road to productionPaving the road to production
Paving the road to production
 
A Detailed Explanation On The Marking Criteria For Ielts Writing Task 1 ...
A Detailed Explanation On The Marking Criteria For Ielts Writing Task 1 ...A Detailed Explanation On The Marking Criteria For Ielts Writing Task 1 ...
A Detailed Explanation On The Marking Criteria For Ielts Writing Task 1 ...
 
How to select and Implement an ERP System
How to select and Implement an ERP SystemHow to select and Implement an ERP System
How to select and Implement an ERP System
 
Usability in product development
Usability in product developmentUsability in product development
Usability in product development
 

Último

401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptxwaghmare9860lavin
 
Design, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptxDesign, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptxaaronbasko1
 
Senior IT Professional with Master’s Degree with 21+ years of experience is...
Senior IT Professional with Master’s Degree with 21+ years of experience   is...Senior IT Professional with Master’s Degree with 21+ years of experience   is...
Senior IT Professional with Master’s Degree with 21+ years of experience is...Anas Acharath Parakat
 
Banged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls DubaiBanged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls Dubaikojalkojal131
 
How to make career in advance 3d animation
How to make career in advance 3d animationHow to make career in advance 3d animation
How to make career in advance 3d animationsantoshjadhav126
 
Complete Benefits of career counseling in India
Complete Benefits of career counseling in IndiaComplete Benefits of career counseling in India
Complete Benefits of career counseling in IndiaMere Mentor
 
dentinalhypersensitivity, classification and material used
dentinalhypersensitivity,  classification and material useddentinalhypersensitivity,  classification and material used
dentinalhypersensitivity, classification and material usedaishwaryakhare5
 
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作rpb5qxou
 
Nathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathanBaughman3
 
Training for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.pptTraining for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.pptVidalMendoza5
 
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道7283h7lh
 
The Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating PressThe Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating Pressmatingpress170
 
APSC Motor Vechile Inspector 18 Posts.pdf
APSC Motor Vechile Inspector 18 Posts.pdfAPSC Motor Vechile Inspector 18 Posts.pdf
APSC Motor Vechile Inspector 18 Posts.pdfsoumita869
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3Ajumarkdiezmo1
 
What is the career path of a VFX artist?
What is the career path of a VFX artist?What is the career path of a VFX artist?
What is the career path of a VFX artist?santoshjadhav126
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoubGhobrial1
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping materialnadeemcollege26
 
Get to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdfGet to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdfRaquel Thompson Barbados
 
Network to Success - Using Social Media in Job Search
Network to Success - Using Social Media in Job SearchNetwork to Success - Using Social Media in Job Search
Network to Success - Using Social Media in Job SearchBruce Bennett
 
Thomas Calculus 12th Edition Textbook and helping material
Thomas Calculus 12th Edition Textbook and helping materialThomas Calculus 12th Edition Textbook and helping material
Thomas Calculus 12th Edition Textbook and helping materialsafdarhussainbhutta4
 

Último (20)

401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
 
Design, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptxDesign, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptx
 
Senior IT Professional with Master’s Degree with 21+ years of experience is...
Senior IT Professional with Master’s Degree with 21+ years of experience   is...Senior IT Professional with Master’s Degree with 21+ years of experience   is...
Senior IT Professional with Master’s Degree with 21+ years of experience is...
 
Banged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls DubaiBanged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls Dubai
 
How to make career in advance 3d animation
How to make career in advance 3d animationHow to make career in advance 3d animation
How to make career in advance 3d animation
 
Complete Benefits of career counseling in India
Complete Benefits of career counseling in IndiaComplete Benefits of career counseling in India
Complete Benefits of career counseling in India
 
dentinalhypersensitivity, classification and material used
dentinalhypersensitivity,  classification and material useddentinalhypersensitivity,  classification and material used
dentinalhypersensitivity, classification and material used
 
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
 
Nathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editor
 
Training for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.pptTraining for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.ppt
 
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道
 
The Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating PressThe Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating Press
 
APSC Motor Vechile Inspector 18 Posts.pdf
APSC Motor Vechile Inspector 18 Posts.pdfAPSC Motor Vechile Inspector 18 Posts.pdf
APSC Motor Vechile Inspector 18 Posts.pdf
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3A
 
What is the career path of a VFX artist?
What is the career path of a VFX artist?What is the career path of a VFX artist?
What is the career path of a VFX artist?
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdf
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping material
 
Get to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdfGet to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdf
 
Network to Success - Using Social Media in Job Search
Network to Success - Using Social Media in Job SearchNetwork to Success - Using Social Media in Job Search
Network to Success - Using Social Media in Job Search
 
Thomas Calculus 12th Edition Textbook and helping material
Thomas Calculus 12th Edition Textbook and helping materialThomas Calculus 12th Edition Textbook and helping material
Thomas Calculus 12th Edition Textbook and helping material
 

Desktop

  • 1. Interview Questions for Desktop Support Technician/Analyst General Questions Q. What desktop operating systems are you familiar with? A. Before you answer this question, you should have some background information on what operating systems are used within the organization you are interviewing with. Undoubtedly, you will be asked to elaborate on your skill set with each of these operating systems so it’s best to tailor your elaboration to the operating systems that are relevant to the hiring manager. This being said, don’t leave out mentioning experience in other operating systems. You never know whether the company may be evaluating the migration to a different OS. Q. Have you used imaging software before? How do you find these tools useful? A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that you’ve used. Hiring managers want to assess your in-depth knowledge and experience with using these tools. This means talking about how you use their various feature sets. (If you have an opinion, you probably know the product pretty well.) Q. What are the pitfalls of using imaging software? A. This question is meant to assess how well you know these products. For example, discussing the importance of testing the image demonstrates that you use these tools on a regular basis. Q. Have you used any software distribution tools? If so, which ones and how were they used? A. Like imaging software, software distribution tools are an important part of your job. Hiring managers are looking for knowledge that these tools exist and how they can be used to support your organization. Q. What do you like most about desktop support? A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the job: being busy, working with different people, and the challenges of learning new operating systems and configurations. Q. What do you like least about desktop support? A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here would be not being able to resolve a problem in a timely manner for reasons outside your control, such as hardware failure. Stick to things outside of your control for the best response. Q. When solving a desktop problem, do you prefer to work with the end-user, your peers, or on your own? A. This is another question to determine your fit within the organization. Hiring managers understand that to be successful as a support technician you will have to work in a team environment. This means working with other employees, vendors, and end-users on a constant basis. Q. Can you describe a situation where you have had to deal with a difficult person? How did you handle it? Would you do anything differently? A. Desktop support can be very demanding some days. End-users only see their own priority needs and often are not interested in other demands on your time. This question explores how you deal with a difficult end-user by understanding their problem, assessing priorities, and communicating a timeframe
  • 2. for resolution. Often good communication can help both sides come to an agreement. Make sure you have an example with a successful outcome. Q. How would you say you are able to handle stress? A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress. Sometimes from the answer, they can also determine whether you are prone to stress. When responding, some techniques for handling stress that you may want to talk about include continually evaluating what’s on your plate and prioritizing, communicating with your manager on what your priorities are, and making sure that you take a break to reenergize, particularly at lunch time. Q. What do you see yourself doing two or three years from now? A. Hiring managers want you to stick around. They realize that you will not be in this position forever, and they want to make sure there’s a desire to move up within the organization as well as the right fit. They ask this question to see whether there’s a growth path for you possible within the organization. As a desktop technician, natural growth paths are team leads, quality assurance, engineering positions, and entry-level development. Be honest about where you want to be in two to three years, and ask the interviewer whether they see your career path as a possibility. Q. How do you learn new technologies? A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning technology on their own and who has the foresight to look for training opportunities. Besides the traditional books and manuals, don’t forget to include user groups, eLearning subscriptions, and IT professional sites such as CramSession. Q. How do you prioritize tasks and manage your time? A. What hiring managers want to know is whether you have time-management skills. Everyone manages their time differently, but think about how you handle e-mail, when you check voice mail, how you respond to pages, when you research and document, and how you pick up new trouble tickets. Q. Imagine the following situation: you receive three simultaneous calls from three vicepresidents who need assistance immediately. How do you manage these conflictingpriorities? A. Obviously this is a trick question. What the hiring manager is trying to assess is how you set expectations with each of the individuals, knowing very well that you won’t be able to assist all of them at the same time. They are also looking for how you will prioritize each of these incidents, including seeking assistance from peers and supervisors in order to meet user expectations. Don’t allow the “tyranny of the urgent” to divert you from managementestablished support priorities. Q. How would you handle a user who continually misdiagnoses their PC issues? A. By asking this question, the hiring manager is assessing your customer service skills. In this situation, you may want to discuss that the key is to not offend the user and turn them off to your support services. In handling this situation, you would pay particular attention to ways you can build trust with the user and lead them to the right resolution to their problem. These components may include: Acknowledging the user’s diagnosis Asking the user to reproduce the problem Finding a solution that works
  • 3. Q. How do you handle setting up new employees? A. This question is used by the hiring manager to assess your knowledge of common practices within the IT department, such as setting up new users. Obviously, the IT department plays a critical role in the productivity of the new employee. The role of the desktop technician is to help ease the new employee into the resources available to them and get them up to speed quickly. In responding to this question, you may want to talk about some of the tools you’ve used in the past to help users acquaint themselves with their new environment. Some tools that help are: A new-user welcome letter that is customized to the specific user with all their relevant information including telephone extension, how to access voice mail, and how to log in. It might also include a FAQ on getting help. A “Getting to Know Your Helpdesk” document that provides an orientation to helpdesk service, such as how to contact the helpdesk, its hours of operation, what is and what is not supported by the helpdesk, and answers to common new-user questions. Technical Questions Q. What questions would you ask to help isolate a user’s problem? A. This question is used by the hiring manger to assess your problem-solving abilities. The following represent some of the common questions that you would ask the end-user to help diagnose a situation: When did the problem first start? Has the system ever worked properly? What was the last thing done to the system prior to the failure? Is the issue intermittent or ongoing/constant? Are there any error messages? If so, what are the specific error messages? Has any new hardware been added to the system? Has any new software been added to the system, including downloads from the Internet? Has anything changed with the system (for example, has it been moved) since the issue presented itself? Has anyone else had access to the system? Are there any environmental factors that could be causing the issue? Have you done any troubleshooting on the system on your own? Have you checked all the cables/connections for a tight fit? Q. What are the main differences between the following operating systems? A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you know more than just the current version because there will always be a user who has a problem with an older version. By asking this question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The following provides a concise summary of some of the major differences. Windows 2000 and XP Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the hands of consumers. The major changes include the following:
  • 4. Device driver rollback Remote control (single-user terminal services) New Start menu, control panel, and user interface elements Fast user switching Encrypted file system support for redirected folders Better support for roaming wireless networking Enhanced policies Credential Manager Personal firewall Q. What are typical virus sources and how do you prevent virus attacks? A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections: Use anti-virus software. Perform regular updates to the virus software definition files and scan engines. Verify updates have succeeded. Perform regularly scheduled virus checks. Configure software to check all files, not just program files. Educate users on virus attacks, their consequences, and how to prevent them. Know where all software came from. Do regular backups. Develop reporting mechanisms to inform server administrators of observed desktop infections and how these could impact the server environment (such as deletions or corruption of files on public shares, hidden payload files that might have been uploaded to servers, and so on). Q. What are some of the guidelines you would recommend for implementing security at the user level? A. Security is a major part of the desktop technician’s day-to-day responsibilities. As the closest point of contact to the end-users, technicians need to be savvy on the different methods for enforcing security. Some of the top techniques are included below. Anti-virus software: Ensure that all users install and regularly use anti-virus software on their PCs. Instruct users to immediately notify the helpdesk when they suspect they’ve contracted a virus. Password security: Instruct users not to give out their passwords. Instruct users not to write down their passwords. Instruct users to make sure their password cannot be easily guessed by using a combination of alphanumeric characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { } / ? < > , ; : | ` ’ ” .). Instruct users to change their password if they think there is even a slight chance someone knows it.
  • 5. Instruct users to ensure their password is at least eight characters long. Instruct users not to use a variation of their user ID. Regularly change passwords on Administrator accounts on PCs (NT, Windows 2000 and XP) Desktop security: Instruct users not to leave their workstation logged in overnight. Instruct users to enable screen savers that automatically lock their PC when there is no activity on it for more than five minutes. Microsoft Active Directory Questions. What is Active Directory? Active Directory is Microsoft's trademarked directory service, an integral part of the Windows 2000 architecture. Like other directory services, such as Novell Directory Services (NDS), Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. What is LDAP? Short for Lightweight Directory Access Protocol, a set of protocols for accessing information directories. LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because it's a simpler version of X.500, LDAP is sometimes called X.500-lite. Can you connect Active Directory to other 3rd-party Directory Services? Name a few options? Yes. Microsoft Identity Integration Server (MIIS) is used to connect Active Directory to other 3rd-party Directory Services (including directories used by SAP, Domino, etc). Active Directory Lightweight Directory Services (AD LDS) : This service is ideal if you are required to support directory-enabled applications. AD LDS is a Lightweight Directory Access Protocol (LDAP) compliant directory service. Active Directory Rights Management Services (AD RMS) : This service augments an organization’s security strategy by protecting information through persistent usage policies. The key to the service is that the right management policies are bound to the information no matter where it resides or to where it is moved. AD RMS is used to lock down documents, spreadsheets, e-mail, and so on from being infiltrated or ending up in the wrong hands. AD RMS, for example, prevents e-mails from being accidentally forwarded to the wrong people. The Application Server role : This role supports the deployment and operation of custom business applications that are built with Microsoft .NET Framework. The Application Server role lets you choose
  • 6. services for applications that require COM+, Message Queuing, Web services, and Distributed Coordinated Transactions. DHCP and DNS : These two roles install these two critical network service services required for every network. They support Active Directory integration and support IPv6. Fax Server role : The fax server lets you set up a service to send and receive faxes over your network. The role creates a fax server and installs the Fax Service Manager and the Fax service on the server. File Server role : This role lets you set up all the bits, bells, and whistles that come with a Windows file server. This role also lets you install Share and Storage Management, the Distributed File System (DFS), the File Server Resource Manager application for managing file servers, Services for Network File System (NFS), Windows File Services, which include stuff like the File Replication Service (FRS), and so on. Network Policy and Access Services : This provides the following network connectivity solutions: Network Access Protection (NAP), the client health policy creation, enforcement,and remediation technology; secure wireless and wired access (802.1X), wireless access points, remote access solutions, virtual private network (VPN) services, Radius, and more. Print Management role : The print services provide a single interface that you use to manage multiple printers and print servers on your network. Terminal Services role : This service provides technologies that enable users to access Windows-based programs that are installed on a terminal server. Users can execute applications remotely (they still run on the remote server) or they can access the full Windowsdesktop on the target server. Universal Description, Discovery, and Integration (UDDI) : UDDI Services provide capabilities for sharing information about Web services. UDDI is used on the intranet, between entities participating on an extranet, or on the Internet. Web Server role : This role provides IIS 7.0, the Web server, ASP.NET, and the Windows Communication Foundation (WCF). Windows Deployment Services : These services are used for deployment of new computers in medium to large organizations. Hyper-V Role : A Hypervisor platform to host and manage virtual machines in an efficient way. Introduced in Windows 2008. Applying SQL Server SP3 Failed, How to fix it? 1. This is a common error we will get regularly in SQL clusters. 2. If you trying to install the SP3 on the active node, make sure that there is nobody logged on to the passive node. Why because when
  • 7. the active node tries to install the SP3 on passive node remotely, it will try to look for some processes. So at that time if nobody on the passive node, it will install without any errors. 3. If any locked files found while you installing the SP3, ignore them and continue with installation, you can reboot both nodes one at a time later. 4. Finally after rebooting the both nodes, check the versions of the application on them. Make sure the version should be same on both nodes. That's it we are done. Note : This applies to SQL Server 2005 Edition only. Thank you for your support, keep visiting my blog. How to RENAME a Windows 2003 Domain ? Guys, Domain renaming is a new future included in Windows server 2003. We can rename the domain without making it down. That is the beauty of Windows 2003. In some situations, one company acquires the other like Sun Microsystems was acquired by Oracle. In this type of cases, if they want to rename all the domains in Sun Microsystems to Oracle corporation how they will do it. Its just an example, i am not telling those guys are following this. But here what i am trying to explain is that, the Microsoft has released a standard procedure to rename the domains that are in production environment. Please follow the steps from the below document carefully to rename your prod domain. How to reset TCP/IP in Windows or How to delete TCP/IP entries from Registry ? Resetting TCP/IP solves many problems. So how to reset it ? Actually all the parameters of the TCP/IP for every interface is stored in Windows Registry Database. Its not stored in a single location, but in many locations. So finding all the values and deleting them manually is not at all possible. It may disturb our system configuration if you edit the registry manually. My sincere request is backup your system registry before you modify anything, otherwise you will get lot of issues. :) So to simplify this situation, we have a command in windows, which takes care of everything in resetting tcp/ip. Finally the beautiful command is ―netsh‖. It really helps us in many conditions. And it can be available as a download from microsoft.com for older machines. How to work with it ? 1. Apply command netsh at the command prompt.
  • 8. 2. Type interface command at netsh> prompt 3. Type ip command at netsh interface> prompt 4. Type reset reset.txt command, to reset the tcp/ip. But here what is reset.txt, we are just sending the output details to that file, if anything goes wrong you can get back to your previous config from this file. 5. Go and look at your tcp/ip properties tab, you will set to ―Obtain Automatically Mode‖, surprised!!! 6. This command is used in situations like follows…. sometimes DNS servers information will not erase from the registry sometimes virtual ip settings also not erase from the registry sometimes configuration changes doesn’t takes place What is Clustering? How it works? What is Clustering? Clustering is a technology in which one or more computers work together as a single instance by sharing their resources. Clustering is used mainly for redundancy of the services hosted on it. In other words, in a cluster all the hosts are work together, if one of the host fails all the services hosted on it comes online immediately on to another host with out any downtime. Apart from the redundancy a cluster is used for load balancing also, in this case what ever the load comes to the cluster is shared by all the hosts in it. What are the types of Clusters and How do we configure them ? Clustering is two types, Active/Active and Active/Passive. Active/Active : In this scenario all the hosts configured in the cluster takes all the load comes to that cluster, and if any one of the host fails the remaining hosts share the requests to make it online all the time. If you have same copies of application configured on multiple hosts this type of clustering is applicable. Active/Passive : In this scenario load balancing is not works, as at any point of time only one host receives all the requests, and if any of the host fails the remaining hosts takes those services and make them available online. That means, only one host is active at any point of time and the other one is passive. What are the requirements to configure a cluster and How it works?
  • 9. There are so many requirements to configure the cluster, but all those requirements are inter dependable on each other. And these requirements (we call them as resources in clustering), are shared between all the hosts, that means these should be available to all the hosts in the cluster. for example, SAN storage resource, the storage which configured in network and is accessible by all hosts (Click here for SAN Information). In the same way all the resources are accessible by all the hosts in a cluster. If one of the host fails, all these resources are moved to another host. In detail, at a particular time one host is accessing these resources, at that time those are locked by that particular host, whenever this host fails, the lock was released and those resources are locked by another host. But in active/active clusters these resources have multiple copies as multiple instances on all hosts. See the below video for better understanding. What is Cloud Computing? How it works ? Cloud computing…the word which is been in the industry from past few years. The technology became very popular now a days. so what is the secret behind it and what makes this technology successful? May be these are the questions which are currently in your mind. Let me explain this emerging technology in simple way. Generally what we all do is, we install whatever the required apps like MS Office, Photoshop, Acrobat Reader etc on to our machine once after the OS installation is finished. But here in this case, these apps are running on a specific hardware and OS. They are having some limitations, along with those limitations they are having some performance issues because they are dependent on Hardware and OS. If we take the same scenario with cloud computing, a cloud is a collection or grid of computers with different hardware and OS’s installed on them and acting as a single virtual computer. So what happens when we install/run a website or an application on to this cloud, it takes all the advantage of the total hardware. And these applications (ex: Google docs) are OS independent also. So with all the resources sponsored by all the machines the applications runs faster. If the demand for that application is increased you can simply add some more machines to this cloud without disturbing the application and current cloud. Advantages: You can access the application from anywhere in the world As it is accessed from the web, you can run it on any of the OS & Hardware No need to install applications on to your machine Best Live Example : Cloud Computing - ITaS - Cloudshare For better idea how the cloud apps works, go and take a look at the below web sites. Photoshop Like App = Splashup (www.splashup.com), Pixlr (www.pixlr.com) MS Office Like App = Google Docs (docs.google.com) Messenger App = Meebo (www.meebo.com)
  • 10. OS like interface = beta.cloudo.com (simple) , www.oos.cc (resembles windows), www.eyeos.info (with lot of apps) Read this article for better understanding Cloud Computing : ITaS (Infrastructure as a Service) How to fix Remote Desktop Connection Problems in Windows Server 2008? Remote desktop is a piece of software which comes with all the windows operating systems which is useful the manage windows machines remotely. To configure this on a Windows Machine we need to follow below steps. 1. Configure the machine with correct network settings and make it is pinging from other computers. 2. Check the firewall options to allow the Remote Desktop Connection. 3. Right Click on My Computer, Select Properties and go to Remote Tab. Enable Remote Desktop option. If you want to specify a specific users on the machine to connect remotely through Remote Desktop click on Select Remote Users and add the users to the list. 4. Try to access this machine using the mstsc client from another machine. If it connects perfectly everything OK. 5. Again do these steps another machine to get practiced. That's it. NOTE : IN WINDOWS 2008 IF THE FIREWALL SERVICE IS STOPPED THE SERVER WILL NOT ACCEPT THE REMOTE DESKTOP CONNECTIONS. MAKE SURE IT IS RUNNING AND IF YOU WANT TO STOP THE FIREWALL, JUST CLICK IT OFF IN WINDOWS FIREWALL OPTIONS. Interview : A quick view of yourself See these videos first before reading the content… so informative and so funny… Video1: An Ugly Answer, Video2: A Bad Answer, Video3 : A Good Answer In my experience Interview is nothing but ―Marketing Yourself‖, the word changes your confidence level. This has been told to me by my brother Krishna Prasad(May be he read it some where else). Opportunity comes only one time, and that is the only door to your success in the career. When the opportunity is in your hand, try until it goes of from you. So try hard to market yourself in every possible way. The Power of Support
  • 11. A best example for this is, i got job in AT&T when the entire world is in a very deep financial crisis. That means what ever happens, what may goes down the support industry will never stop. Why because if support stops, everything will be paused. For example, if the customer care for your mobile will not respond or if they don't provide customer support, their business will get lose lot of customers. In the same way we will provide our support to various companies around world. Those companies need our support, because they need to provide support to various customers around world. If a company has website about its products, what makes that company profitable? First thing, the website needs to be run continuously, obviously it is dependent on servers, hardware and network etc etc.. so may be so many people providing their support to make it available continuously in the back ground. That is the reason i can say, we are in the correct place, we have lot of opportunities. Only thing we need to get succeed in this industry is having optimized skill set. Get Prepared When an opportunity is in your hands, get prepared to achieve it. That is your ultimate target, if you lose this opportunity, you even don’t know when the next one comes. So Handle with Care. All you need to do is, prepare well in your area of practice. Be confident, Be Frank, Say no idea to unknown answers, Be Positive, Be Interactive, Be Proactive. :) lot of things right. All these qualities are in you. Try to develop them, try to bring out them when the time comes, try to expose them. Success is yours. “Plan the Implementation, Implement the Plan” Interview Requirements Well prepared Resume – It should resemble your career, don't include/repeat unnecessary things. Well prepared Mindset – Ultimately this is required for those who has interview phobia like me. Positive Attitude – Life will never stop if this goes of from your hand, but try your level best to get it. Interaction – Need to interact with the interviewer to market yourself, Keep eye contact with him. Confidence – I noticed so many times, my confidence will get decreased whenever i am going for an interview, this happens to so many. It makes you a loser. Avoid thinking about the interview and interviewer to get rid of this problem. Meditation is the best practice i suggest. “ Your life today is the result of your attitudes and choices in the past. Your life tomorrow will be the result of your attitudes and the choices you make today.” This post is useful or not, i don’t know. But these are the things i understood from my experiences and i want to share them with you. Understanding DNS : Domain Naming Server Hi Friends, First of all thanks for visiting my blog. I added ―Search‖ option for my blog, you can easily search for a particular topic using Google Search. If you are facing any issues, or if you have any questions please mail me atcharan@isupportyou.net Thanks.
  • 12. Coming into the Topic……………. What is DNS? DNS stands for Domain Naming Server, it is a standard of naming domains in any operational environment (Windows,Linux,Solaris,Any environment). It is a server which contains a database of all the domains and all the servers which are associated with those domains. Why it is Used? Its a service dedicated to identify all the machines (domains & member servers) in a network. To make this possible, every machine has to be registered in the authoritative DNS server of that network. That means every operational network should have a dedicated DNS server to enable identification and communication between the machines. How it works? As i said, it is dedicatedly used for identification, in technical words for “name resolution”. Every machine in a network has a dedicated IP address & hostname as its identity. Whenever a machine tries to communicate with another machine on the network it should first identify the second machine, that means it should know the ip address of that particular machine. After knowing the identity (i.e ip address), it will directly communicates with the second machine. So to speak, a machine should know the ip address of the another machine, with which its going to communicate before it starts. Another question… Why the hostnames are used, if the machine already have an identity in the terms of IP address? Hostname is an English word which is useful for Human remembrance. It is impossible for a human being to remember lots of IP addresses, but it is possible to remember English names of the same hosts (as we configure the hostnames generally with employee name or department name or location name etc). For example we can rememberwww.yahoo.com but not its ip address, because we are not having only one website on the internet. To sum up Hostnames and IP addresses both are used to identification and communication between two machines in a network. But machines are only able to communicate with the IP addresses and which are impossible to remember for Humans (Keep in mind machines never communicate with hostnames). To solve this situation DNS was implemented. It basically contains a database of host records in a network. A host record contains ―Hostname : IP address‖, see the image below for better under standing. Out Internet is purely depended on DNS, when we access a particular website we will give its English name, when we press ENTER immediately the machines starts finding the IP address of the website using the DNS server configured on it. I will explain the name resolution process in details. And one more thing about the DNS is, it is the only largest database on the internet which changes every second. If this database goes down by a chance, we must remember all the ip addresses to access the internet. hahaha it will not happen, why because we have so many backup solutions already implemented.
  • 13. How the name resolution takes place? I will explain this concept with internet as an example. Before that i want you to check some settings on your machine. Check the TCP/IP properties and see whether DNS server is configured or not. If you are seeing obtain automatically option, open command prompt and type ―ipconfig /all‖ and press Enter. You will get DNS servers information along with your machine’s IP address. Now lets talk about the scenario, When you try to open a website like www.google.com, what happens next? how your machine gets IP address of the www.google.com. Here it goes…. 1. The request sent to the DNS server which is configured on your machine. 2. The DNS server checks for the host record of www.google.com in its database, if it contains a record forwww.google.com, it will directly send response with the IP address of www.google.com. Otherwise it starts requesting another DNS server. 3. Before it goes to another DNS server, how it identifies which DNS server is responsible for this request ? It checks the entire hostname (it is called as FQDN : Fully Qualified Domain Name), i.e in google’s case www.google.com. (note the FQDN ends with a period, and this period is called as root domain). 4. Every DNS server contains a roothint file associated with it, and the same will be used to identify the responsible DNS server. Root hint file contains Master DNS servers information. Here you go it looks like this. These are the master DNS servers for .com, .net, .edu, .org domains etc. 5. So in your case, the domain is .com, DNS server sends request to .com master DNS server (for ex: assume it as 198.41.0.4), the .com master DNS server contains name server records for all machines ending with .com . That means it definitely contains DNS server IP address for google.com. In the same way it contains all .com servers yahoo.com, microsoft.com & so on. 6. It does not contain the IP address of google.com, it contains DNS server IP of google.com. 7. So then the request is forwarded to google.com DNS server, in that server you will have a host record with the name www and its IP address. Finally you reached it. With the found IP address the request comes back as a response in the same reverse way to the DNS server which is configured in your machine, that DNS server tells the IP address ofwww.google.com to your machine.
  • 14. 8. This process happens in milliseconds in the background. i.e by the time you will get ―Website found waiting for reply‖ message in the status bar of your internet explorer. 9. Oh my god!!!! Is that simple? Yes it is. The same process occurs in corporate networks also. But the requests are handled by their local DNS servers only. DHCP : Dynamic Host Configuration Protocol Hi Friends, Let’s support our organizations using simple way of IP Management. DHCP stands for Dynamic Host Configuration Protocol. Dynamic = Automatic Host Configuration = Basic Network Configuration Protocol = Rules which needs to be followed to make this happen. DHCP is an application which is either installed on Windows Server Operating system or on UNIX OS to service an enterprise in the aspect of IP configuration and management. Its main goal is to provide & configure the client computers with specific ip configuration to enable identification and communication in the network. Prior to DHCP another protocol have been used, it is called BOOTP. BOOTP(Boot Protocol) has only one future that is Reservation. So the administrators who are worked with BOOTP, need to get all the MAC addresses and write them on a notepad to enable the use of BOOTP. After writing all the MAC addresses, the same need to be added to BOOTP table with corresponding IP addresses. That makes lot of work for administrators, even though its an automated process, but admin’s need to work a lot to get the MAC addresses of all the machines in the network. Later it has gained lot of improvements to serve the network and became DHCP. How to Install and Configure DHCP? It very simple and straight forward process. First you need to install the application from Add/Remove Windows Components. After installing you will have a console in the Administrative Tools. I think instead of giving lot of steps.. i will post a simple video of 7mins, just watch it for better understanding of this concept. Video Link Now you are ready with your DHCP server installed and configured. so lets talk about why and how it is used? As i said previously it is used for Automatic assignment of IP addresses to client computers which are in the same network with DHCP server. This is the way it will be used. Whenever a computer powered on, it will check itself for the network configuration, if it is configured with manual ip address, the machine broadcasts a message that it was powered on. If it is configured to get the ip automatically, then the machine broadcast a message in search of DHCP server. Then starts the process. It is simply called as ―DORA‖ process. D = Discovery – Request for discovering DHCP server from client machine. O = Offer – Respective DHCP server Offers the IP Configuration. R = Received – Client receives the IP configuration. A = Acknowledgement - Client Acknowledges that it has received the IP configuration. Once the client gets the IP configuration, it will then broadcasts another message to all other clients in the network with its identity. Interview Questions related to DHCP 1. Explain the DORA process 2. What is an exclusion range and reservation? An exclusion range is a range of IP addresses which needs to be excluded from DHCP scope, so that these IP’s never assigned automatically. A reservation is an IP address will be reserved for a server every time it boots up and it has been done using the MAC address of that server. Before configuring reservations, we need to exclude them from DHCP scope. 3. How do you configure the AD Server, DNS Server, IIS Server and FTP Server using the DHCP server? Using the reservations only, so that every time the same address will be assigned to the server. If you take a DNS server, it should have same IP all the time, because it is responsible for name resolutions in
  • 15. that network. If the IP address getting changed every time, its very difficult to the clients which are requesting name resolutions. That is the reason, it should have same IP all the time, we can do that automatically using reservations. 4. What is DHCP relay agent? DHCP relay agent, is an option configured on DHCP server. Which enables the client machine requests to go through the routers. That means, if the DHCP server is in one network and the client is in another network, these networks are connected by routers. By default the routes will never allow the DHCP packets through them, by configuring this option, these requests will pass between two networks Active Directory : Behind the Directory Hi Friends, As you know Active Directory is the main database for Centralized Administration of Enterprise Environment, i want to share something with you about this extra-ordinary directory service. Active Directory will be installed on a stand alone Windows Server 2000/2003/2008 operating systems when we run dcpromo command. It is an integrated module which resides hidden until we run dcpromo. Active Directory stores all most all information about an enterprise. Which includes user accounts, computer accounts, user groups, group policies, shared folders, network printers, etc. All this information is stored in the Active Directory Database. The files associated with the Active Directory database are located under C:WindowsNTDS and the files are as follows… ntds.dit This is the main file for Active Directory. All the AD information will be stored in this file. edb.log When a change is triggered to AD database, first the information will be written to this file, and the same will be then written to ntds.dit. The AD performance depends on how fast the updates will be transferred from edb.log to ntds.dit res1.log & Initial size of these files will be 10MB each, used as reserved space for res2.log AD updates, in case of Low disk space issues the same files will be used to save the AD updates. edb.chk The checkpoint file (edb.chk) records transactions committed to the AD database (ntds.dit) during shutdown. A "shutdown" statement is written to the edb.chk file when we shutdown the AD server. Then, during a reboot, AD determines that all transactions in the edb.log file have been committed to the AD database. If, for some reason, the edb.chk file doesn't exist on reboot or the shutdown statement isn't present, AD will use the edb.log file to update the AD database. temp.edb This is a scratch pad used to store information about in-progress transactions and to hold pages pulled out of Ntds.dit during compaction. The file extension .DIT stands for Directory Information Tree. The file extension .CHK stands for Check Point file. If the DNS is Active Directory Integrated, its data also stored with AD Database.
  • 16. Using System State option in NTBACKUP we can take the back up of Active Directory. When we promote the secondary domain controller all this data from these files will be replicated to its database. Active Directory uses Kerberos Authentication. LDAP(Light Weight Directory Access Protocol) is the Protocol used to query the Network Directories like Active Directory. It uses port number TCP 389 to query AD. In Windows 2008 Active Directory comes as a Service, to decrease reboot frequency. AD Users and Computers, AD Sites and Services & AD Domains and Trusts are the three consoles which are used to maintain AD database in GUI. How to join a computer to the domain which is in different network(VLAN)? This is a real time environment requirement. Let’s see how can we achieve this. Make sure both VLAN’s are communicating Disable windows firewall on the AD machine and Add exceptions to the following ports. Open required ports for DNS, NetBIOS, RPC, LDAP and ICMP in both ways from source to destination. Set the AD gateway as the default gateway for client machine. Ensure that all the required firewall ports are open to enable communication between domain controller and client which are in different networks. Active Directory : Replication Hi Friends, Welcome Back !!!! :) In the previous post i discussed something about Active Directory and the files associated with it. In this post i want to tell you about the magic behind Active Directory replication. What is meant by Replication? Replication is the process of making a replica (a copy) of something. A replication is a copy. Using replication process we can copy the active directory database from one site to another site. This process is initiated when we create additional domain controller for the existing domain. That means we are creating a backup/secondary copy of the original domain controller to make sure it is available in the case of failures. How the Replication happens in Windows Server? After replica of Active Directory implemented, from there on every change that is being made to Primary copy will be replicated to Secondary. When you are trying to implement a replica for the first time, in the process of implementation all the objects from Primary Domain Controller will be copied over to the Secondary Domain controller. At this point both DC’s are in
  • 17. sync state. But when a new object created or deleted in/from the Primary DC, the same will be copied to Secondary DC immediately. Remember in Windows 2003/2008 the Secondary DC are always read-only copies. In the situation of failure of the Primary DC, we can change the Secondary DC as read/write copy. When the Secondary DC acting as Read-Only copy, it will not allows us to create or delete objects. It only updates it’s information from the Primary DC. This was implemented in this way to avoid conflicts in the objects. Every object has an property called USN (Update Sequence Number), depending on this attribute the Secondary DC identifies whether the updates are available or not. For example, for a user object if the USN is 124 on Primary DC, and the same is 123 on Secondary DC, then the secondary DC requests the Primary DC to send the updated information. In this way both DC’s are in sync all the time. If one of the DC goes down, we still have updated information in the Other. If you are creating the replica in same location as the Primary, there is no issue at all in the process of replication, but if you are creating the replica in branch office location there might be some problems associated with the design. You can manage the inter-site (between sites) or intra-site(same site) replication using the AD Sites and Services. A site is a collection of computers which are working together in the same IP Subnet. Replication is controlled by the Site Link objects created in between the sites. We can schedule the replication process and replication interval using the Site Link Properties. The Site Links are ―automatically generated‖ using the ISTG(Intra Site Topology Generator). KCC (Knowledge Consistency Checker) is the part of ISTG which generates Site Link objects in Inter-Site replication. If in any case if the automatically generated site links are not working for some reason, we can create them manually usingrepadmin /kcc command. If you have multiple domain controllers (multiple copies) in each site, replication process consumes high amount of bandwidth. To avoid this, every site must have only one domain controller acting as the replication partner. It is called as Bridgehead server. This bridgehead server again sends the updates to the other DC’s which are located in its site. In the image, the server in Russia acting as Bridgehead for Server in Germany(Think it as Russia Second server). By Right clicking on a site link and by selecting ―replicate now‖ you can initiate replication between the domain controllers in same site or different sites.
  • 18. Blue screen death Asked By: tshepisobo | Asked On: Sep 20th, 2011 11 answers What is a blue screen of death ? How do you trouble shoot the computer in such situation ? Answered by: Maz on: Oct 5th, 2012 In most cases blue screen is there for few seconds and system keeps rebooting. First of all you need to get to the error message. A very good feature of win xp is to press F8 on startup and select do... Answered by: Ravinra Kulkarni on: Feb 18th, 2012 1) First check blue screen error number, is it Application Or Hardware 2) Generally this problem comes when problem in RAM so First check computer start with another RAM Answer Question Select Best Answer Ie browser redirect Asked By: Big Al | Asked On: May 12th, 2008 7 answers A user calls and every time he launches internet explorer he gets the page cant be displayed right before this his virus software had detected virus...What could be causing this problem you checked the settings in ie and its has the correct homepage Answered by: Abhishek Sharma on: Oct 1st, 2012 The system is affected with M a l w a r e. The only only solution to remove is to boot with bootable antivirus rescue disk. Answered by: Mandar Mench on: Jul 26th, 2012 Due to your network firewall or due to old internet explorer u r using on that pc this problem may be occur so you can do one thing reset all setting to default delete all cookies and upgrade your browser your problem may be solved . Answer Question Select Best Answer What is the difference between outlook & outlook express?What is ip range in networking side? How we will troubleshoot outlook?How we will configure ldap on outlook? Asked By: rajeevsoniji | Asked On: Aug 1st, 2007 17 answers Answered by: Salik on: Sep 30th, 2012 Guys have done a gr8 job, nothing else left to be answered.. I just wanna say: Gilbert, Hitesh & Syed_nrpt has provided wrong set of answers. Everyone else (Upto my this post/msg) is right about IP range. Answered by: Yogesh Kumar on: Apr 30th, 2012 Outlook is the edition of Microsoft Office (Outlook file Extension is .pst) & Outlook Express is the edition of Internet Explorer (Outlook Express file Extension is .dbx). Answer Question Select Best Answer How do you backup emails on ms outlook? Asked By: SiziRose | Asked On: Apr 26th, 2011 4 answers Answered by: Umesh Raghav on: Sep 28th, 2012 Go to control panel open the mail option then open the data file after that select the personnel folder and click on open folder copy that .pst and close all the options which were open and then paste that .pst backup where you want to place that backup Answered by: shashi021 on: Jun 23rd, 2011
  • 19. install PST Sync (http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=9003) and set up Backup path for the respective PST. Answer Question Select Best Answer Spool service Asked By: Big Al | Asked On: May 12th, 2008 9 answers How can I tell if the print spool in running and where is it located? Where does it store spooled print jobs? Answered by: vikara on: Sep 26th, 2012 DHCP: Port 546 (DHCP Client port for IPv6) should not be used by any other process while rogue detection is enabled Answered by: rakesh reddy on: Sep 23rd, 2012 type services.msc and search for print spooler service and make sure it is set to automatic, and now try to print hope your issue should be fixed by now. Answer Question Select Best Answer What is the difference between language and technology? Asked By: jeevan | Asked On: Aug 19th, 2011 2 answers Answered by: Rajan Choudhary on: Aug 19th, 2012 Technology is the way in which a current problem statement is Resolved. and Language by the way in which the technology has been Implemented. e.g Silverlight is technology which comes from Microsoft... Answered by: Nikhil on: Sep 4th, 2011 Launguage is used to programing to develop applications. Technology is set of programmes to find a new way of solving current systems backlogs. Answer Question Select Best Answer Connectivity troubleshooting Asked By: kalahari | Asked On: Sep 26th, 2010 9 answers A user in a corporate network contacts service desk saying he/she has lost network connectivity: how will you troubleshoot the issue? What are the steps to followed? Answered by: praveen on: Aug 2nd, 2012 !st check thee cable...and immediate click on network connectivity...go to run cmd den ipconfig /release then..ipconfig /renew den refresh2 to 3 times on desktop...definitely..it should works... Answered by: Vinit on: Jul 26th, 2012 If you're getting an error message limited activity by right clicking on the connectivity icon on the task bar, use ipconfig /release then ipconfig /renew commands refresh the desktop and check. If th... Answer Question Select Best Answer Remote connection Asked By: ras2008 | Asked On: Jun 7th, 2008 17 answers If you have client in a different location and want to access that client from server, what is the best way to access that client from server? Answered by: praveen on: Aug 2nd, 2012 domain and remote option...must be there or vnc(virtuval net computing)its the solutions Answered by: khojem praymaswala on: Aug 2nd, 2012 best way to go throgh VNC. and also remote desktop.
  • 20. Answer Question Select Best Answer Java application installers Asked By: Renee | Asked On: Sep 12th, 2011 1 answer What are the most common tools to develop the installer of Java applications or applications in general? Answered by: Ketan Chiplunkar on: Jul 29th, 2012 you can use the Eclipse software & Net beans software. Eclipse is best for All Java Applications except EJB. EJB you can do in Net beans. Answer Question Select Best Answer Enable usb ports Asked By: blayne | Asked On: Sep 20th, 2011 8 answers I have disabled all usb ports on my stationary computer, my mouse and keyboard don't work... How do I enable it back? Please help... i cannot press f2 to get into bios, nothing works... Keyboard or mouse... Answered by: Vinit on: Jul 26th, 2012 since you've disabled USB ports pressing F2 will not work if you're using a USB keyboard. I recommend you to boot your system from a different source and format your system HDD or you can use a non-USB keyboard to enter BIOS setup and enable USB ports. Answered by: Shamim haider on: Apr 25th, 2012 First system restart and press del or F2. after bios inter enable USB keyboard & mouse support,and use ps2 keyboard and mouse. Answer Question Select Best Answer What type of problems are associated with operating system like window xp? Asked By: alam | Asked On: Aug 13th, 2007 4 answers Answered by: Mandar Mench on: Jul 26th, 2012 If you installed winxp and windows 7 both operating system in dual boot you can define which system by default to be start through editing in boot.ini or from go to start - run -put following command ... Answered by: Khandokar Mahafuz Hassan on: Jun 28th, 2012 If you are installed Multiple operating system, select which one you want it (that files Boot.ini) Answer Question Select Best Answer What is difference between win XP and wn 7 technically? Asked By: Dastagir Amir Hamaja | Asked On: Jun 18th, 2011 17 answers Answered by: Mandar Mench on: Jul 26th, 2012 The major difference between win xp and windows 7 is graphics and than it is more secure than winxp and it has inbuilt utility like bitdiffender to encrypt the data on drive which is only accessible i... Answered by: Simasingh on: Jun 16th, 2012 windows diffusion in windows 7 provide maxi mam security in operating system but windows xp this is not future use Answer Question Select Best Answer Bootloader Asked By: chetan_01 | Asked On: Dec 7th, 2008 4 answers What is bootloader? Answered by: Mandar Mench on: Jul 26th, 2012
  • 21. Actually bootloader is a windows default utility through which when we start our system it check all the details related to system boot means on which partion is primery and active as well as where th... Answered by: ajey53 on: Jun 17th, 2012 Boot Loader is the part of the OS that enables booting process and loading the particular OS while start up. The function of the Boot Loader is to perform and start up options while the users turn on... Answer Question Select Best Answer Ntldr error meaning Asked By: adpatel33 | Asked On: Apr 7th, 2012 5 answers When I boot my computer I have seen on my screen " verifying dmi pool data" and then after second line is shown "ntldr is missing..." what is this problem and who can I solve it. Answered by: Mandar Mench on: Jul 26th, 2012 when ntldr missing message shown than insert the os bootable cd . than go to recovery console by pressing first R and than copy that file from i386 folder from cd to os system 32 folder and than run ... Answered by: Vikas Kumar on: Jun 5th, 2012 Yes he is right,You need to copy it from the CD or DVD and than paste it,other wise it will not load the OS from the HDD as it loads the OS from the bootable media Answer Question Select Best Answer How will you install operating system in more than 50 pc at a time when the all pcs having same configuration. Asked By: san_pradeep59 | Asked On: Sep 18th, 2007 19 answers Read Best Answer Editorial / Best Answer Answered by: prasad samant Answered On : Nov 20th, 2007 Other way is If the pcs are on network you can have RIS or WDS setup. Requirement for clients is they should have network bootable NIC Answered by: ritesh on: Jul 14th, 2012 we can use another service like RIS (Remote Installation Server). By the help of it we can install o/s to multiple systems Answered by: raj on: Jul 1st, 2012 ghost is not secured installed WDS (windows deployment services) it is the way for network instillation Improve Answer Removal of virus Asked By: Big Al | Asked On: May 12th, 2008 8 answers You have a virus that loaded several processes every time you stop the process it restarts itself you tried going into safe mode but it does the same thing...You found the dll files associated with it but you cant stop or delete them what is the easiest way to repair? Answered by: mukeshg on: Jun 1st, 2012 Reinstall the operating system, at the time of installation choose repair option, it repairs all corrupt dll files, and keep ur data as it is. Answered by: thilak on: May 12th, 2012 First Remove the system from network and run the virus scan. Deleted the file from Quarantine if the system scanned fully copy the data in externaml drive and format the syustem
  • 22. Answer Question Select Best Answer How to install os from server to all system? Asked By: tejeshwarao | Asked On: Sep 1st, 2011 7 answers Answered by: Yogesh Kumar on: Apr 30th, 2012 We can RIS service in Windows Server 2003SP1 and WDS Services Windows serve 2003SP2 and also WDS in Windows server 2008. but we have .inf file of all systems of a network those boot from network. so we can easily install from Server. Answered by: Himanshu dihauliya on: Mar 31st, 2012 100% we will use WDS. Window Deployment Services Feature, That is Available in Windows 2008.... Answer Question Select Best Answer How to install operating system in usb pen drive? Asked By: Mohd.Mumtaz007 | Asked On: Mar 9th, 2012 2 answers Answered by: Shamim Haider on: Apr 28th, 2012 First create usb bootable to pen drive, then select first boot device (usb device) from bios Answered by: rickevans on: Mar 9th, 2012 Step 1. Format the USB Flash Disk Run CMD (elevated) and type: 1. diskpart 2. list disk (*now find your USB disk number, youll find it by its size) 3. select disk 1 (*if your USB is disk 1)... Answer Question Select Best Answer What is difference between msi and exe file ? Asked By: pkarle | Asked On: May 14th, 2011 7 answers Answered by: itmanpjs on: Apr 26th, 2012 There is no relationship between an MSI file and an .EXE file. An .exe file, like a .com file is produced when source code is complied and creates a Windows executable program. An .MSI file is a file... Answered by: Jisthi Khan on: Feb 21st, 2012 MSI file is only for installation purpose. EXE file can be anything that executes on windows. Answer Question Select Best Answer Desktop icons Asked By: Abdul subahan.H | Asked On: Dec 7th, 2008 6 answers How to make the desktop icons smaller or lager? Answered by: kam on: Apr 25th, 2012 Right click on desktop-> view-> select any option (large/medium/small icons) Answered by: Tahir Khalil on: Dec 19th, 2011 You can enlarge desktop icon simply by mouse in Win-7 , that is ( Hold " CTRL Button " and then Move Mouse Scroll To UP ) .. Thnx Mobile outlook Asked By: Dastagir Amir Hamaja | Asked On: Jun 18th, 2011 1 answer How to configure outlook in mobile in exchange 2007 environment? Answered by: chetan on: Apr 4th, 2012 you can configure outlook in all type of BlackBerry phone.. 1st u need create blackberry account from your network provider . then configure that ID in your exchange server to that domain id of user
  • 23. Answer Question Select Best Answer How a virus program destabilize ms windows XP Asked By: albrq | Asked On: May 12th, 2008 3 answers What is the mechanism of combating those malicious program? Evaluate each technique Answered by: Rahul Sharma on: Mar 7th, 2012 Follow these steps 1)Run ->Cmd 2)Type netsh 3)Firewall 4)Now type in "set opmode enable" to start firewall and "set opmode disable" to stop fire wall. Answered by: daperfetto on: Feb 24th, 2011 By corrupting, or deleting data Answer Question Select Best Answer How to do a complete refresh of computer using back up discs ? Asked By: dorothy828 | Asked On: Aug 17th, 2011 2 answers Answered by: Upendra Sabat on: Feb 29th, 2012 Firstly You to take the system backup on a External hdd, then You format and load os, then You restore the data through system backup.. thanx. Answered by: shrikant dongre on: Dec 12th, 2011 This using the external hard disk and personal data back up the external hard disk. second thing format your computer...; Answer Question Select Best Answer Microsoft outlook pst file size limit Asked By: Pravin Bargode | Asked On: Jun 23rd, 2011 7 answers What is the pst size limit in outlook97, 2000, 2003, 2007 and 2010? Answered by: Sundar S on: Feb 19th, 2012 In Outlook 2002 and earlier, the .pst files are in the American National Standards Institute (ANSI) format, and the overall size has a limit of 2 GB. In Outlook 2003 and after, the .pst files are in ... Answered by: Shafi23 on: Sep 6th, 2011 MS outlook in 2003 and 2007 is 2GB, in 2010 is 50GB Answer Question Select Best Answer A users application on their desktop is not working, explain what you would do to resolve this problem Asked By: ramraje | Asked On: Mar 4th, 2011 3 answers Answered by: pravin on: Feb 15th, 2012 1. Go to task manager the partiquer applicatoin right click application and go to process and End Task. 2. Then go to Event viewer 3. Check application Answered by: AdhamFadel on: Feb 5th, 2012 Maybe application is disabled by Antivirus Answer Question Select Best Answer Reset user password Asked By: Big Al | Asked On: May 12th, 2008 6 answers
  • 24. How do you reset the users password give the steps it took to get you to the user account. Answered by: Jayaram. on: Jan 28th, 2012 If it is for a domain user go to active directory users and computers. Type username and click search. Below you can see user name. Click mouse right button on user name and click on reset password. T... Answered by: raj_smart on: Jul 3rd, 2009 If its domain environment here all the user accounts info will be maintained with some security Questions add some security measures. By this tool user account can change his/her password every size l... Answer Question Select Best Answer What is APIpa stand for? Asked By: Big Al | Asked On: May 12th, 2008 13 answers What does APIpa stand for and how can you tell if your computer is using it? Why would your computer be using it? Answered by: sunny lohar on: Jan 4th, 2012 APIPA stands for automatic private ip address, it is the feature of Windows XP, automatic takes an IP from the range 169.254.1.0 to 169.254.255.255, at the time when when DHCP and TCP/IP not able to assign an IP to the local computers. Answered by: saubhagya shakti singh on: Dec 22nd, 2011 APIPA - Automatic Private IP Addressing its a feature that used in opereting system. When DHCP is unavailable then APIPA provide IP ranging from 169.254.0.0 to 169.254.255.255 Answer Question Select Best Answer Unable to view deleted files in recycle bin (winxp) Asked By: suresh pa | Asked On: Jun 10th, 2008 6 answers I deleted my files, but I didn't see that files in my recycle bin.Pls anybody help me... Read Best Answer Editorial / Best Answer Answered by: bspkumar View all answers by bspkumar Member Since Sep-2007 | Answered On : Jul 25th, 2009 Every one is suggesting what to do next time. he is asking how to recover the deleted file now. First step you need to do is stop working on the hard disk in which you have lost the file. Otherwise, the file will be overwritten by another file. Then run any of the file recovery software. If you have already used the same hard disk, the chances of recovering the file is less. Answered by: sivananduri on: Nov 28th, 2011 File deletion will be 2 types. Temporary & Permanent. If the file is deleted without selecting shift button, it will come to recycle bin. Otherwise the file will be deleted permanently. In such cas... Answered by: bspkumar on: Jul 25th, 2009 Every one is suggesting what to do next time. he is asking how to recover the deleted file now.First step you need to do is stop working on the hard disk in which you have lost the file. Otherwise, th... Improve Answer
  • 25. Going straight to desktop without having to login Asked By: ups5363 | Asked On: Oct 15th, 2011 3 answers How do u go straight to your desktop when you reboot rather than having to login every time you reboot or turn on your computer on? Answered by: ravi on: Oct 18th, 2011 First you right click on computer and then click on manage.at that time a window appear. Then go to local users and groups. Then the total users will appear. Then right click on user name what u r ent... Answered by: rajan on: Oct 17th, 2011 By removing the user name or with out user name you can directly log in to the windows Answer Question Select Best Answer How do you check who are invited for the meeting Asked By: snehaspandana | Asked On: Aug 2nd, 2011 2 answers If a meeting request is received, how will you check who all are invited in a meeting in outlook? Answered by: RAJ on: Sep 24th, 2011 1.Open the meeting request or notification. To view your calendar, click Calendar. Note A new meeting request will appear as a tentative on your calendar. 2.Do one of the following: Accept, ten... Answered by: vijaya on: Aug 17th, 2011 In 2010 if you check meeting tab and open specific meeting appointment you have an option tracking in access toolbar Answer Question Select Best Answer Artribation process Asked By: rameshrgen | Asked On: Jun 28th, 2009 2 answers Which layer provides physical link, flow control, artribation process? Answered by: S.Prabu on: Sep 5th, 2011 Cable related doing activity called physical layer.Hub is working on physical layer. Answered by: drum4ravi on: Jul 10th, 2009 Its the Data Link Layer Answer Question Select Best Answer Network logon failures Asked By: Big Al | Asked On: May 12th, 2008 5 answers A user calls you they cant login in said they have tried several times what is the best way to troubleshoot this. Answered by: uma on: Aug 22nd, 2011 1.Check whether the caps button is on or not and then give user name and password 2.Check whether all the network cables connected properly 3.Check whether the user is added in domain 4.Can reset the... Answered by: SUMIT GUPTA on: Aug 10th, 2011 Just Check the user's account in active directory & finally check system is in domain or LAN is working fine or not. This is the only troubleshooting for that issue Answer Question Select Best Answer What are the steps to create .Pst in client system ? Asked By: Pramod Dhende | Asked On: Aug 7th, 2011 1 answer Answered by: Yogesh Dhiman on: Aug 10th, 2011
  • 26. we have two option for creation of Archive folder or PST(Personal Storage Template) or personal folder 1. Automatic Archive 2. Manually Archive Manually Archive for 2007 and 2010 For Outlook 2007 ... Answer Question Select Best Answer Backup of computer Asked By: LAVLEEN SAINI | Asked On: Jul 16th, 2011 2 answers How to take the backup of computer? After taking backing is there d and f drive programs also recovered? Answered by: Kannan Kanna on: Aug 4th, 2011 types of backup incremental backup update backup file daily backup daily fixed time backup normal backup Copy and past backup full backup any timE full hdd backup Answered by: Hamid Ali on: Jul 20th, 2011 If you wanna backup your system like D and F drives follow the steps, 1.Click on my computer icon. 2.Left click on the drive which you wanna backup and go to properties 3.Go in Tools tab there you wi... Answer Question Select Best Answer Low level formatting Asked By: parameshg | Asked On: Apr 5th, 2009 3 answers Define low level formatting? Answered by: Hamid Ali on: Jul 20th, 2011 Low-level formatting is the process of outlining the positions of the tracks and sectors on the hard disk, and writing the control structures that define where the tracks and sectors are. This is ofte... Answered by: veda prakash on: Jul 7th, 2011 creating new tracks and sectors on the hard disk Answer Question Select Best Answer What is imap? How does it work? Asked By: Mohammed Saif | Asked On: Jul 14th, 2007 10 answers Answered by: Hamid Ali on: Jul 20th, 2011 The Internet Message Access Protocol (commonly known as IMAP) is an Application Layer Internet protocol that allows an e-mail client to access e-mail on a remote mail server. Answered by: Amit Maurya on: Jul 17th, 2011 IMAP is stands for Internet message access protocol, which is used for accessing mails from the server and this protocol leave not remove the mail from the server but if we POP(Post Office Protocol) it can be remove from the server mails. Answer Question Select Best Answer Difference between *.Ost and *.Pst Asked By: Pravin Bargode | Asked On: Jun 23rd, 2011 2 answers What is the difference between *.Ost and *.Pst ? How does it work? Answered by: Hamid Ali on: Jul 20th, 2011
  • 27. Offline folders (.ost) files are stored on your computer and are available even when the network is down. The default location for the .ost is your current Windows folder. Like personal folders (.pst) files, .ost files can be compacted to save space on your computer. Answered by: Narendra jogani on: Jul 17th, 2011 Offline folders (.ost) files are stored on your computer and are available even when the network is down. The default location for the .ost is your current Windows folder. Like personal folders (.pst)... Answer Question Select Best Answer Windows XP boot options Asked By: Shaishav | Asked On: Mar 21st, 2009 5 answers What advance boot options are available for windows xp? Answered by: Hamid Ali on: Jul 20th, 2011 1)Safe Mode 2)Safe Mode with Networking 3)Safe Mode with command Prompt 4)Enable Boot Logging 5)Enable VGA Mode 6)Last known Good Configuration(your most recent settings that worked) 7)Directory Servi... Answered by: Atul Keshri on: Jul 20th, 2011 Safe Mode Safe Mode With Networking Safe Mode With Command Prompt Enable Boot Logging Enable VGA Mode Last Known Good Configuration Directory Services Restore Mode Debugging Mode Disable automatic restart on system failure Start Windows Normally Reboot Return to OS Choice Menu Answer Question Select Best Answer Installing printer Asked By: Big Al | Asked On: May 12th, 2008 4 answers You are required to install a new printer on the print server what are your steps? Remember this will be a shared printer Answered by: komodosp on: May 25th, 2010 To share it on the network, in Control Panel / Printers and Faxes, you can right-click on it, and in the menu, click on Sharing Answered by: syed_nrp on: Apr 30th, 2009 First Start--->Control Panel--->Printers---->Add printer--->Local (or) Network Printer--->Choose which brand printer and which one type of printer (if it's needed drivers, push the driver CD in that PC)---->Select TYPE (LPT1 or USB)--->Finish. It's ready to use printer. now printer is online. Answer Question Select Best Answer How can you view startup items Asked By: Big Al | Asked On: May 12th, 2008 4 answers
  • 28. There are a couple of way to view and disable the items that start to the task pain... How would you go about doing it and give me the full path to get you there Answered by: pks07pro on: Jan 7th, 2010 To see the most start up item, Go to start>programm>start up To make any changes, enable or disable Go to Run & type "msconfig" How to take backup of emails on outlook ? Asked By: Charanjeetsingh79 | Asked On: May 7th, 2011 4 answers Answered by: shashi021 on: Jun 23rd, 2011 Other way to take backup install PST SYNC (http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=9003) and set backup path for which pst want to be backup. it,s take much less time as using copying method. Answered by: anshulmehra_2007 on: May 27th, 2011 log in with some user->delete files->tools->options->maintenance->store folder->copy the path- >create new folder->paste the path to the new folder created->import->messages->MS outlook->select the user from where files is deleted->browse folder where the path was pasted->finish Answer Question Select Best Answer Printing problems Asked By: Big Al | Asked On: May 12th, 2008 3 answers User sent a job but it is stuck in the local cue how can you delete it? Name a couple ways Read Best Answer Editorial / Best Answer Answered by: syed_nrp View all questions by syed_nrp View all answers by syed_nrp Member Since Apr-2008 | Answered On : Jan 3rd, 2009 You first Install the proper printer driver install. Check that printer is on/off status. Then give a test page. The test page is not printing, go To RUN-->services.msc check printspooler give stop and start. it's work fine Answered by: Dastagir Amir Hamaja on: Jun 18th, 2011 Go to start, setting , priter and faxes, there you will see your printer, double click that printer, you will find jobs you have printed, right click that job and try to delete it. If not deleting then restart printer spooler services. if not deleting then restart printer and pc. Thanks, Dastagir Answered by: syed_nrp on: Jan 3rd, 2009 You first Install the proper printer driver install. Check that printer is on/off status. Then give a test page. The test page is not printing, go To RUN-->services.msc check printspooler give stop and start. it's work fine
  • 29. Improve Answer Printers Asked By: Big Al | Asked On: May 12th, 2008 2 answers How do you install a pre existing printer on a users desktop Answered by: pavankumarnagisetti on: May 21st, 2009 Go to Start-> Settings -> Printers and Faxes This opens a new window now click on add a printer from right side panel. Follow the steps. You can add normal as well network printer using this. Answered by: rrsain on: Sep 13th, 2008 Go to control panel and then go to add hardware wizard After that read all the options carefully. When system requires software for that, insert the software CD otherwise system will install automatically. Restart the system, if it is not working, tell me, I will give you complete solution Answer Question Select Best Answer Dealing with irate customers Asked By: Big Al | Asked On: May 12th, 2008 2 answers You take a call from a customer who is very upset they cant work how do you deal with this? Answered by: udaykalidindi on: Jun 2nd, 2009 This is a common problem faced by a every one working in helpdesk.1st thing don't try to argue with him. 2ndly try to understand the issues or problems he is facing.3rdly don't promise him heaven and ... Answered by: tintin3011 on: Sep 3rd, 2008 Talk politely and try to know the problem, and solve as fast as you can. Answer Question Select Best Answer Firewire port Asked By: akki4444 | Asked On: Apr 3rd, 2009 3 answers What is firewire port? What are its uses? Answered by: khurramjol on: Apr 21st, 2010 Firewire port is a form of Serial Port that make use of FireWire Technology to transfer data rapidly from one electronic device to another.FireWire port has the ability to interact with a number of&nb... Answered by: delhi.itsupport on: May 22nd, 2009 Firewire generally ports are genereally comes with laptop & apple desktop/laptops. You can connect various external hardware with this. e.g HDD, CDROM, Cameras etc. the transfer rate of a FireWire port can reach up to 400 Mbps. Answer Question Select Best Answer Virtual memory Asked By: punitgoyal88 | Asked On: Jan 27th, 2011 2 answers How to improve virual memory of pc? Answered by: Dastagir Amir Hamaja on: Jun 18th, 2011 Go to system propert--> Advanced Tab--> click on setting of performance--> Advanced Tab--> Click on Change 0f Virtual memory--> now here you can increase virtual memory Dastagir Answered by: srbnew on: Feb 4th, 2011
  • 30. just right click on my computer icon select properties go to advance go to performance select virtual memory select how much u want apply and click ok thatz itz Answer Question Select Best Answer Restore windows XP Asked By: krabhilas | Asked On: Sep 23rd, 2008 4 answers How to restore windows XP in command mode. Answered by: ashi786 on: Aug 18th, 2009 To start System Restore Windows XP first you create a system restore point by following steps:1. Click start and go help and support options on right hand side you see under pick a task options.2. C... Answered by: mahadeva83 on: Apr 7th, 2009 To start System Restore using the Command prompt, follow these steps: Restart your computer, and then press and hold F8 during the initial startup to start your computer in safe mode with a Command pr... Answer Question Select Best Answer Pxe use Asked By: walker233 | Asked On: Jan 14th, 2011 2 answers What is pxe used for? What dependencies does it have to be useful? Answered by: sharmavivek096 on: Jun 2nd, 2011 The Preboot eXecution Environment (PXE, also known as Pre-Execution Environment; sometimes pronounced "pixie") is an environment to boot computers using a network interface independently of data stora... Answered by: s.pandilwar on: Jan 28th, 2011 Preboot Execution Environment (PXE) :- When we are trying to boot system from network we need to enable PXE boot device from BIOS. It is helpful to install OS from network & it will pick IP address automaticaly. It is helpful in large network were we cannot install OS manualy. Answer Question Select Best Answer Home folders Asked By: Big Al | Asked On: May 12th, 2008 3 answers User has a home folder setup in ad when he logs in it maps the u drive which point to the share on the server.. He accidenTALLY deleted it what is the fastest way to get it back from a command line? Answered by: khurramjol on: Apr 20th, 2010 Re-mapping will restore the home folder, and we can do in Command line as net use u: serverhome Answered by: taiwolasile on: Jun 2nd, 2009 Reboot the PC to re-load the roaming profile Answer Question Select Best Answer Ldap on outlook Asked By: saahil4u | Asked On: Sep 10th, 2008 2 answers
  • 31. What is the ip range in networking side? How do we troubleshoot outlook? How do we configure ldap on outlook? Answered by: Ushadavuluri on: Jul 29th, 2009 I am hoping I am submiting the correct answer. IP range in netwroking side is related to DHCP and Address pools. Ex: 192.168.0.10 to 192.168.0.200 -> Can be defined as address range allowed to dist... Answered by: Ushadavuluri on: Jul 29th, 2009 From Microsoft OutlookSelect: Tools->Account settings->AddressBook->New Address book-> select Internet Directory Service(LDAP) radio button-> Next step will take you to the window of se... Answer Question Select Best Answer Set ip address from cmd prompt Asked By: dreamcast | Asked On: Apr 27th, 2010 3 answers How do you set the ip address by using the command prompt? Answered by: arunbathery on: Aug 5th, 2010 There are Two ways to Set the IP address from CMD Prompt1. Go to start, select run, type CMD, and in CMD Prompt type the command C:>netsh interface ip set address name="Local A... Answered by: lila123 on: May 28th, 2010 Set IP address from CMD prompt :type cmd in run type following command in sequence like IP address,Subnet mask, Default Getway, DNS,Wins, ect...exmpl : netsh interface ip set address name="... Answer Question Select Best Answer What is the difference between lcd and tft ? Asked By: vhthakor | Asked On: Nov 5th, 2007 3 answers Answered by: shashi jadhav on: Sep 26th, 2008 A TFT monitor uses thin-film transistor technology. Nearly all LCD monitors today use TFT technology. The benefit of a TFT monitor is a separate, tiny transistor for each pixel on the display. Because... Answered by: SONY & RAVI on: Nov 22nd, 2007 LCD Means Liquid crystal display TFT means Thin Film Transistor Liquid Crystal Display.What I think you mean is Active and Passive matrix LCD panels. This is where there is a difference in price. A ty... Answer Question Select Best Answer What is the difference between server os and desktop os Asked By: cnchandrashekar | Asked On: Jun 3rd, 2008 6 answers Answered by: Karimulla Shaik on: Apr 7th, 2011 server OS manages Network resources centrally along with its internal resources. desktop OS Manages only its internal resources(like memory, cpu, i/o, user interface). Answered by: tdpanee on: Jul 30th, 2010 Server OS can be used to configure a centralised administration for computer network. Desktop OS can be used to configure client Machine to SErver. Answer Question Select Best Answer Enable or disable firewall Asked By: jcsrinath | Asked On: Feb 18th, 2011 1 answer How would you enable or disable the firewall in windows xp? Answered by: adnanj85 on: Feb 22nd, 2011 To enable Windows Firewall, follow these steps:Click Start, click Run, type Firewall.cpl, and then click OK.On the General tab, click On (recommended).Click OK.------------------------------To disable... Answer Question Select Best Answer
  • 32. Install operating system on more than 50 pc Asked By: saahil4u | Asked On: Sep 10th, 2008 4 answers How will you install operating system in more than 50 pc at a time when the all pcs having same configuration. Answered by: Laxman on: Jan 28th, 2011 We use image ghost if all PC hardware requirments are same. Answered by: walker233 on: Jan 14th, 2011 This depends on your operating system and target hardware.If you are deploying XP then you are bound by the hardware, and are required to make an image of the OS, using ghost or another image capture ... Answer Question Select Best Answer Add a user to network Asked By: charla | Asked On: Sep 15th, 2009 6 answers Explain how will you add a user to network? Answered by: egyptianfalcon on: Jan 20th, 2011 This answer is specially for windows 7 and I think it would be usiful in all the kind of windowsfirst go to start menu-controll panel-user accounts-manage another account-creat new account-then w... Answered by: elmagoal on: Jun 10th, 2010 First you need to figure out what role the user is going to have and if there is anyone on that has the correct set of permissions as the user. If this is true, on the server or on your desktop if you... Answer Question Select Best Answer Create an email account for a user already in ad Asked By: saahil4u | Asked On: Sep 10th, 2008 2 answers How would you create an email account for a user already in ad? Answered by: Anele Takane on: Jan 6th, 2011 If the user account has been created with a mailbox (mailbox enabled) you may follow ameetsaha's instructions, but if you need to create an email account (mailbox) you will have to go to your Active d... Answered by: ameetsaha on: Nov 4th, 2008 Open Micosoft Outlook if you are using office 2000, and click on "Tools" tab. Go to "Email Accounts". There you can find two option like Email and Directory. Click on "Add a n... Answer Question Select Best Answer Sms update Asked By: msid82 | Asked On: Nov 6th, 2010 1 answer A pc did not receive an update from sms. What steps would we take to resolve this? Answered by: Prabu2009 on: Dec 17th, 2010 If SMS not updated in client system. 1. Need to check system getting IPaddress or not. 2. Need to check system in domain or not 3.Ensure that windows firewall should be off. Above reason SMS will not update to the client system. Answer Question Select Best Answer Troubleshooting a slow computer Asked By: sanj108 | Asked On: Nov 12th, 2009 8 answers
  • 33. A user calls in and complains that her computer and network is running very slow. How would go about troubleshooting it? Read Best Answer Editorial / Best Answer Answered by: smokedragon View all answers by smokedragon Member Since Nov-2009 | Answered On : Nov 18th, 2009 I would first ask the user whether every application on the computer is slow or is it just one particular application. if it is just one, try and sort that out. If the answer is all applications are running slow, look at common causes like, virus scans scheduled, free disk space on the home drive, RAM, lastly if the deployment team is rolling out any updates (which should not be done during business hours, but i've seen that happen too ;) If you suspect network latency, a simple ping test from the user's computer will tell you how many milli seconds network traffic is taking to reach the server. Answered by: rgawthorne on: Oct 26th, 2010 First question, when did the problem start? Is anyone else in the same work group experience slowness.Does it happen all the time, or is it intermittent, any patterns of timings eg, in the morning ... Answered by: DanielGoad on: Jul 23rd, 2010 'Slow' is a relative question, so first determine what the user is experiencing. Is it slow opening applications or while working in them? is this a networked application or local? ... Improve Answer Windows XP firewall Asked By: navaneethreddy | Asked On: Jul 12th, 2010 4 answers How would you enable or disable the firewall in windows xp? Answered by: rampraveshraju on: Aug 9th, 2010 Press window+r key on keyboard than type firewall.cpl than you can easily On or Off firewall. Answered by: Dhamodharan15 on: Aug 5th, 2010 Goto Command prompt, type Services.msc, in the services windows search for Windows Firewall / Internet Connection Sharing(ICS) and start the service. Creating email account Asked By: Big Al | Asked On: May 12th, 2008 2 answers How would you create an email account for a user already in ad Answered by: tdpanee on: Jul 30th, 2010 If you have installed exchnage server, then select the properties of user account and change the mail enable user check box. Answered by: abujibrael on: Apr 20th, 2010 1- First click the OU that the users resides. 2- Right click the user, with whom you wanna create an email account. 3- Now click Exchange Task 4- Click next to the wizard 5- Choose create mailbox 6- C... Answer Question Select Best Answer Blackberry synchronization Asked By: Rrahul Arora | Asked On: Oct 21st, 2009 3 answers If a customers blackberry stopped syncing their calendar wirelessly, what would you do? Answered by: elmagoal on: Jun 10th, 2010
  • 34. The first step before wiping the Blackberry is to remove the battery for 20 sec. put it back and check the sync again. While all other steps are correct, most BB issues will be resolve by a hard reset. Answered by: mdabid on: Dec 10th, 2009 Take Complete Backberry backup using desktop Manager and wipe your handheld, then syncronize by doing enterprise activation, and restore backup. Regards, Mohammed Abid Razvi Answer Question Select Best Answer Install pre-existing printer Asked By: saahil4u | Asked On: Sep 10th, 2008 2 answers How do you install a pre existing printer on a users desktop? Answered by: komodosp on: May 25th, 2010 You may have to install printer hooked to the network. If it has an IP address:1. Control Panel / Printers & Faxes2. Next past Welcome message3. Local Printer attached to this computer, Next4. Cre... Answered by: rrsain on: Sep 12th, 2008 Go to control panel and then go to add hardware wizard After that read all the options carefully. When system requires software for that, insert the software CD otherwise system will install automa... Answer Question Select Best Answer What is the difference between windows XP and windows 2000 Asked By: cnchandrashekar | Asked On: Jun 3rd, 2008 7 answers Read Best Answer Editorial / Best Answer Answered by: bspkumar View all answers by bspkumar Member Since Sep-2007 | Answered On : Jul 20th, 2008 Windows XP Vs windows 2000 . OS XP 2000 Feature Release 2001 2000 NT 5.1 5.0 32/64 bit 32/64 bit 32 bit
  • 35. built-in CD writer support y n Remote Desktop Connection, Internet Connection Firewall, Fast UserSwitching y n Windows Media Player and Windows Messenge File sys support FAT16,32,NTFS,HPFS (High- FAT16,32,NTFS Performance File System) Answered by: syed_nrp on: Apr 30th, 2009 Windows XP has 4 Versions, Windows 2000 has 3 ver. (Win 2000 Pro, Server & AD. Server).Windows XP has last known good configuration [last used desktop] which is not present in Windows 2000. Remo... Answered by: hezysasson on: Nov 10th, 2008 Win. XP has drivers that "recognize" hardware easier and faster with system set up. Improve Answer Larger desktop icons Asked By: ghada | Asked On: Feb 22nd, 2009 1 answer How to make desktop icons appear larger? Answered by: Ravi9 on: Feb 23rd, 2009 Right click on desktop. Go to properties and then click on appearance tab. Then further click on effects tab. A window will open. Select the use large option. Then click on apply OK. Thats it. Answer Question Select Best Answer Steps to secure windows Asked By: ravila23 | Asked On: Feb 21st, 2008 2 answers Describe steps you would take to secure windows 2000 server resources and files. Read Best Answer Editorial / Best Answer Answered by: shashi jadhav View all answers by shashi jadhav Member Since Sep-2008 | Answered On : Sep 26th, 2008 There are lot of secure option for Windows, You can secure by - Set a difficult password for administrator Disable gust account Give minimum & limit permissions to administrator's members
  • 36. Make minimum share folder on your Windows's Give minimum share permission on that folder & full control to trust users Always change the administrator password Install third part firewall & set minimum port. Access & deny those user's & IP which you don't want to access to your computer. Don't share your password. Answered by: shashi jadhav on: Sep 26th, 2008 There are lot of secure option for Windows, You can secure by - Set a difficult password for administrator Disable gust account Give minimum & limit permissions to administrator's members ... Answered by: amjad1233 on: Apr 26th, 2008 To Secure the windows following steps should be considered : 1. Making admistration account and giving only requried rights to child accounts 2. Putting some external Anti-Virus to protect from the threats 3. Making some registray changes to be help full and other Improve Answer What is ldap sserver? Asked By: kaps200 | Asked On: Jul 8th, 2008 2 answers Read Best Answer Editorial / Best Answer Answered by: aravind kalyan View all answers by aravind kalyan Member Since Jul-2008 | Answered On : Jul 15th, 2008 LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server. Answered by: Karthikumaran on: Aug 25th, 2008 LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server. Answered by: aravind kalyan on: Jul 15th, 2008 LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server. Improve Answer Desktop support & help desk Asked By: Brianseawood | Asked On: Jun 17th, 2008 1 answer What is the technical difference between desktop support & help desk ? Read Best Answer Editorial / Best Answer Answered by: radelapena View all answers by radelapena Member Since Aug-2008 | Answered On : Aug 24th, 2008