There are many benefits of Child Domain Such As:
☛ Security Boundary
☛ Administrative Overhead Low
☛ Network Traffic Low
path : C:WindowsSystem32driversetc
where C: is a System root drive.
Desktop engineers work in office environments in most cases. Some companies require their engineers to travel between different work sites. There are remote support technologies that are allowing companies to cut down on their desktop engineer travel times, as common problems can be diagnosed and fixed over a remote connection.
A desktop engineer is used to set up the computer infrastructure needed for the business. This duty could be as simple as installing operating systems on a few office machines or as extensive as setting up a network of hundreds of computers. Desktop engineers install needed operating systems, software and hardware. Peripheral support for printers and servers might also fall under a desktop engineer's control.
Desktop engineers provide support and implementation services to business infrastructures. This job has a number of different titles. It could be called desktop systems engineer, desktop support, support technician, helpdesk engineer or desktop deployment engineer. Desktop engineers need to have extensive knowledge of the software used by the business, as well as the operating systems and hardware peripherals that may be in use.
Desktop engineers can specialize in certain technologies or go into a management position over other desktop engineers. Advancement into other types of computer sciences such as programming or software design is also possible.
Parallel port transmit data in parallel form. It is transfer data 8 bit at a time. It is faster then Serial port. Its a 25 pin female Connector .
Serial Port transmit data in a serial form. It transfer data one Bit at a time. It is transfer data one bit after another Bit. Its a Slower then parallel Port. its a 9 Pin or 25 Pin male connector.
Operation Master Role is available on Domain Controller in the Network. There are five types of operation master roles:
☛ Schema master
☛ Domain Naming Master
☛ RID Master
☛ PDC Emulator
☛ Infrastructure Master
A site is a geographical area where all of the domains are available. Site manages the replication traffic between two or more different sites in the network.
A group of tree is called forest and does not sharing a contiguous name space but sharing a common configuration (Schema).
A group of domain is called tree and sharing a contiguous Name Space.
☛ NTFS stands for New Technology File Systems
☛ There are three categories in NTFS file systems
1: NTFS 4.0- NT Operating Systems
2: NTFS 5.0- 2000 Operating Systems
3: NTFS 6.0- 2003 Operating Systems
☛ In NTFS up to File level security is available
☛ Compression option is available
☛ Encryption option is available
☛ Disk Quota Option is available
☛ NTFS supported by only limited Microsoft Based Operating System
☛ FAT Stands for File Allocation Table
☛ There are three categories in FAT file system.
☛ In FAT Not up to folder level security is available
☛ Compression option is not available
☛ Encryption Option is not available
☛ Disk Quota Option is not available
☛ FAT supported by all of the Microsoft Based Operating Systems.
IAS stands for Internet Authentication Services. IAS server is also known as RADIUS Server. IAS Server provides the centralized management of multiple RAS & VPN Server in the Network. On this Server Remote Access Policy and Remote Access logging options are available.
VPN Stands for Virtual Private Network. It is basically use for mobile user in the network. This server provides the remote access connectivity for mobile user. In this way all of the mobile users are connected to server through internet. This server also provides the connectivity between two or more office in the network. VPN is cost effective (No Costly).
Focus on how you achieve results while maintaining good staff relations. Use examples of your successes and how you have learned from mistakes. Emphasize your energy and experience.
There are two basic types of firewall - network layer, which make decisions based on source and destination addresses, and application layer, which are hosts run on proxy servers and allow no direct traffic between networks. Comodo and Zone Alarm are two commonly used firewalls.
Boot.ini is used to decide which operating system options are displayed during the start-up process.
LAN cards and
Tablet PC and
MS Outlook and
Dynamic Host Configuration Protocol - it assigns dynamic IP addresses to network devices allowing them to have a different IP address each time they are connected to the network.
Common ports are: PS/2 ports, for keyboard and mouse. USB ports. Sound ports.LAN or Ethernet ports. VGA ports.
The lights are:
☛ Power light - indicates if the power is on.
☛ Link light - indicates if the modem is receiving broadband or Internet signals from the ISP.
☛ Data light - indicates if the Internet is working.
☛ Connectivity light - indicates if the modem is connected to a computer.
Check the following: Speaker volume, cable connections, power to the speakers and device drivers.
RAM stands for Random Access Memory. It is used for the temporary storage of data that is being worked on. ROM is Read-Only Memory and is used for permanent storage of data that should never be changed, like BIOS for example.
Hard disk partitions divide the hard disk drive into smaller segments to enable better space management. Each partition on the disk can then be considered as a separate disk allowing different file systems to be used on each.
This question is designed to test your familiarity with imaging software. Describe image testing and the attributes of particular software to show your familiarity with imaging.
You will need to have familiarized yourself with the system used by the organisation you are hoping to join. Focus your answer on those systems, but also mention other systems with which you have experience.
Device Drivers are the software required to run hardware components.
NTLDR is known as the Network Loader. It helps in loading the operating system. If any system is showing "NTLDR is missing" then you need to copy the NTLDR file from operating system CD.
It is normally found in a 64-bit OS, for example 64bit Win7. This folder is very similar to the system32 folder of the 32-bit OS.
☛ Contact Microsoft: http://support.microsoft.com/mats/windows_update/
☛ Please follow the steps below:
a. Go to Run, type "services.msc" without quotes and press Enter.
b. Locate Windows Update.
c. Right click on Service and select Properties.
d. In Start-up type, select Enable.
e. Click Start under Service status.
f. Click OK.
There could be two possible reasons:
☛ Missing/corrupted files
☛ Update services down
There are mainly two types:
Cat 5 (Category 5 where 5 indicates twists per inch) & Cat 5e (5e indicates 5 twists per inch per pair which leads to reduced cross talk). Both Cat 5 & 5e are UTP cables that can support up to 100 Mbps.
Cat 6 & 6e are UTP cables that can support up to 1 Gbps.
After about 80 meters (260 feet), you will usually see a reduction in speed.
Some common sources are Internet downloads, email attachments, and infected CDs/DVDs. You can use trusted anti-virus software and update it regularly. Make sure it checks every file on the computer. Backup your system periodically in case a major infection occurs, and be aware of all software and programs that run on your computer. Never click a suspicious link or download a suspicious file.
Go to Run then type diskmgmt.msc. After that, right click on hard disk to convert a basic disk to dynamic disk.
Note: You should be logged in with an administrator account.
A Blue Screen error is mainly due to hardware or software incompatibility within the system. The most common reasons for a Blue Screen of Death (BSD) are unwanted software installation, high CPU usage and faulty RAM. Try the following options.
1. Pull out the RAM card, rub it with rubber on the chip side, and re-insert.
2. If a BSD still occurs, try using that RAM on another system.
3. Every BSD has a unique code; try searching it on Google to find a solution.
You can use ipconfig /all to display all of the current TCP/IP configuration values, including the IP address, subnet mask, default gateway, and Windows Internet Naming Service (WINS) and DNS configurations.
Open Run, type "msconfig" and press Enter to open System Configuration Utility. Select the tab labelled BOOT.INI. Click the button labelled Check All Boot Paths. A dialog box will open detailing the location of any invalid operating system locations.
Boot.ini files are required in booting Windows operating systems, starting with Windows NT. The boot.ini file also provides flexibility for dual booting multiple operating systems on the same computer.
☛ Open Run, type "msconfig" and press Enter. A system configuration window will pop up; now go to the Boot tab, check the "Safe boot" box and select "Minimal" for a typical safe boot. Click Apply and your computer will boot into Safe Mode the next time it restarts.
☛ Reboot the computer. Start pressing the F8 key as soon as your system starts to boot. This will open multiple boot options including Safe Mode.
Often, we have to start Windows in Safe Mode in order to remove spyware or for troubleshooting driver problems and other diagnostic purposes. Only specific programs and files with limited driver support are needed to run the operating system. This will allow you to attempt to remove viruses, change bad drivers and perform other diagnostic tasks that cannot be done in Normal Mode.
Using "tracert" command lets you see the path traveled by a packet to its destination.
A default gateway is a routing device used to forward all traffic that is not addressed to a destination within the local network or local sub-net. If you don't have a default gateway, it is not possible to communicate with the network device/host of different networks. Dial-up internet connections do not require a default gateway though because it is present in the ISP itself.
The Domain Name System (DNS) is used to resolve human-readable host names like www.globalguideline.com into machine-readable IP addresses like 22.214.171.124. The DNS address is configured on workstations. Windows redirects all domain names to resolve into IP addresses.
Dynamic Host Configuration Protocol (DHCP) is used to assign dynamic IP addresses to network devices, allowing them to have a different IP address each time they are connected to the network.
This is a very basic question and you can prepare your answer by researching which OS version is used by the company you're applying in. Be sure to do a little reading on the systems you are familiar with, so you can showcase your skills.
Communicate your ability to handle different tasks and challenges. Show how you are well versed with special systems and communicate with professionals in your area of expertise. Include coordinating with Information Technology professionals to enhance system communication, peripherals and network operation. You may also relate your experience in installing computer performance monitoring equipment.
If yes, explain how you've worked with vendors (suppliers) and with the procurement department. Explain methods used to assess future computer needs in the organization.
As a desktop engineer you must have the ability to work with others and alone. Describe how you have worked with your staff members to determine solutions to major issues. Impart as well your own individual assessments to identify minor failures and how you've used your communication skills to consult others for solutions to problems beyond your specialty.
If yes, report on the training programs you've designed and implemented for staff. Detail the manner in which you directed them regarding operation of computer hardware/software systems.
Describe a major upgrade in which you were heavily involved. A success story. Something you're proud about. Explain the step taken to ensure smooth upgrade. Rehearse, don't memorize; be clear and succinct.
Relate your experience in installing and testing computer systems and ensuring their proper function.
In your answer, describe the process you took to identify and solve problems that affect computer systems. Provide examples if necessary. Tell how you test/trouble-shoot computers to ensure they function properly.
Are you Microsoft/Cisco certified? If you are, give details. Speak about the procedures you follow to test/maintain equipment and software operation. Discuss any courses you have taken or manuals and processes you have studied, and more so, applied practically.
Relate examples of support to employees on their desktop systems, including network servers, desktop computers, printers, laptops etc.