Friday, July 12, 2019 admin Comments(0)

Hardware and Networking Interview Questions & Answers 4 avg. rating (80% COMPUTER HARDWARE Questions and Answers pdf free. Download as RTF, PDF, TXT or read online from Scribd. Flag for Top Computer Hardware Questions and Answers PDF Computer Hardware Questions PDF. Uploaded by Top Networking Interview Questions & Get advance computer hardware interview questions and answers PDF file for free from our online library. ADVANCE COMPUTER HARDWARE INTERVIEW.

Language:English, Spanish, Arabic
Published (Last):02.06.2015
ePub File Size:22.85 MB
PDF File Size:12.25 MB
Distribution:Free* [*Sign up for free]
Uploaded by: HALINA

+ Computer Hardware Interview Questions and Answers, Question1: What is a computer? Question2: What are the different functions of a computer?. INTERVIEW QUESTIONS AND ANSWERS COMPUTER HARDWARE Questions and pdf free download,objective troubleshooting questions,multiple choice. discover the statement computer hardware engineer interview questions answers that COMPUTER HARDWARE Questions and Answers pdf free download.

Hardware and Networking Interview Questions with Answers How do they work? Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list. Name of seven layers in Open System Interconnection model. The address resolution protocol ARP is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP uery packet that includes the IP address of the receiver. The reverse address resolution protocol RARP allows a host to discover its Internet address when it knows only its physical address.

What do you mean by Network Topology? Answer: A network topology is a physical structure of the network which defines how the computers or node will be connected to each other.

What is Routers? Answer: A router is a device which is responsible for sending data from source to destination over the computer network. Let us move to the next Computer Network Interview Questions.

Top 23 Computer Network Interview Questions {Updated For }

What is the OSI model? Explain the Different layers of the OSI model. Datalink Layer Data packet will be encoded and decoded into bits. Network Layer Transfer of datagrams from one to another. Transport Layer Responsible for Data transfer from one to another. Session Layer Manage and control signals between computers. Presentation Layer Transform data into application layer format.

Application Layer An end user will interact with the Application layer. What is MAC address? It is the 48 bit hardware address of LAN card. What are the perquisites to configure server? Ping Workgroup:- i Every PC is responsible for its security own. Small home and office setup wizard Which command is used to check the physical connectivity between two computers? Ping A special feature that will map network resource to my computer.

What is Proxy Server? Most large businesses, organizations, and universities these days use a proxy server. This is a server that all computers on the local network have to go through before accessing information on the Internet.

By using a proxy server, an organization can improve the network performance and filter what users connected to the network can access. Which folder contains ADS installed on server? International Networking Which are the bootable files of 98 and XP?

In windows98 it is command.

100 Top Computer Hardware Questions and Answers PDF Computer Hardware Questions PDF

It Linux has its own file system known as ext2, and ext3. What is size of SWAP? What is full form of C.

Hardware pdf computer interview question

Complementary metal oxide semiconductor How will you check ip address without using network place? Hub is a layer 1 device. It will out the signal from all of its port except the one from where its insert. It is unable to detect the collision. It works on single collision and single broadcast domain.

Switch is layer 2 device. CAM table is used to make the forwarding decision. It works on per port collision and single broadcast domain. What is layer?

Pdf computer question hardware interview

Layer is a completely logical partition of PDU protocol data unit process. That define how the information is travel form one computer to other over the network. It is used for reliable data transfer.

What is operating system? An operating system sometimes abbreviated as "OS" is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer.

It provides a platform to application software. What is package software? The collection of mostly used software released in package Form Company.

For Example Ms-Office that contain word, power point, Excel, etc. Full form of. NET - ".

Computer Science - Computer Hardware

IN - 'IN' stands for India. The 'IN' is a 2-letter country code for India. What is ring topology? In a ring topology, device one connects to device two, device two connects to device three, and so on to the last device, which connects back to device one. Which cable is used in LAN? UTP cable is used in star topology. It has a single cover over all pair. What is the difference between an unspecified passive open and a fully specified passive open?

An unspecified passive open has the server waiting for a connection request from a client. A fully specified passive open has the server waiting for a connection from a specific client. Explain the function of Transmission Control Block A TCB is a complex data structure that contains a considerable amount of information about each connection.

Each SNMP agent has the MIB database that contains information about the device's status, its performance, connections, and configuration.

What is anonymous FTP and why would you use it? Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all.

Anonymous FTP systems usually have strict controls over the areas an anonymous user can access. What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place.