Sunteți pe pagina 1din 22

1) What is Information Technology?

• Ans: Information Technologies are systems of hardware and/or software that capture, process, exchange, store
and/or present information using electrical, magnetic and/or electromagnetic energy.

Example 1 : Cellular telephony


Example 2 : Wireless Internet

2) Define difference between data and information?

Ans: Most people believe that the terms "data" and "information" are interchangeable and mean
the same thing. However, there is a distinct difference between the two words. Data can be
any character, text, words, number, pictures, sound, or video and, if not put into context, means
little or nothing to a human. However, information is useful and usually formatted in a manner
that allows it to be understood by a human.
Computers typically read data, but it is not necessarily something that a computer actually
understands. Through the use of formulas, programming scripts, or software applications, a
computer can turn data into information that a human can understand.
Below is an example of the same data and information and how they differ.

Example of Data
Joe,Smith,1234 Circle,SLC,UT,84084,8015553211
Example of Information
Joe Smith
1234 Circle
Salt Lake City, UT 84084
(801)555-3211

As you can see in the above example, if you only looked at the data, you may be able to
understand some of the text on the line, but it isn't really useful. That same information,
when broken out into readable text and even slightly formatted, becomes much more
useful and allows you to identify that it is contact information for Joe Smith.
In this example, the data could be a CSV file that can be parsed into
an Excel spreadsheet or database to make it usable information.

3) Define Computer System in detail with diagram?

Ans: The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral
devices connected to it and its operating system. Computer systems fall into two categories: clients and servers.

Clients are the user's laptop, desktop and tablet computers and smartphones, while servers share their data and
applications with multiple users. Servers range from entry-level rack mounts to mainframes. See rack
mounted and mainframe.

A computer system is sized for the number of users it handles simultaneously, the type of work performed (office,
engineering, etc.) and the volume of data that must be stored.

Platform
Every application is written to run under a specific CPU/operating system environment. The largest client platforms
are x86/Windows, x86/Mac, ARM/Android and ARM/iOS. The largest server platforms are x86/Linux and
x86/Windows. See platform, x86 and ARM.

Number of CPU Cores


The more CPU cores, the more simultaneous processing. Modern desktop computer CPUs have two, four or eight
processing cores, and servers can have from two to 64 or more. In addition, multiple machines can be tied together to
work as one (see clustering). See SMT and multicore.

Clock Speed
The gigahertz (GHz) rate of the CPU determines internal processing speed. See MHz.

Disk and Memory


The disk capacity determines the amount of information immediately available to all users. A computer's memory
capacity determines how many applications can run efficiently at the same time.

Fault Tolerance
The use of redundant processors, peripherals and power supplies provide continued operation in the event of
hardware failure. See fault tolerant.

Multiuser Computer System

This is a mainframe; however, except for the tape drives, every system contains similar components, which can all be
built into a desktop or laptop computer.
4) Define Virus, Antivirus, Primary memory.

Ans: Virus: A computer virus is a malicious software program loaded onto a user's computer
without the user's knowledge and performs malicious actions.

Antivirus: A software designed to detect and destroy computer viruses.

Primary Memory: Primary storage, also known as main storage or memory, is the area in a
computer in which data is stored for quick access by the computer's processor. The terms
random access memory (RAM) and memory are often as synonyms forprimary or main
storage.

5) Define Software and describe the types of Softwares?

Ans: SOFTWARE: Software, in its most general sense, is a set of instructions or programs
instructing a computer to do specific tasks. Software is a generic term used to describe
computer programs. Scripts, applications, programs and a set of instructions are the terms often
used to describe software.

TYPES OF SOFTWARES:

Software is often divided into three categories:

1. System software serves as a base for application software. System software includes device
drivers, operating systems (OSs), compilers, disk formatters, text editors and utilities helping the
computer to operate more efficiently. It is also responsible for managing hardware components and
providing basic non-task specific functions. The system software is usually written in C
programming language.
2. Programming software is a set of tools to aid the developers to write programs. The various tools
available are compilers, linkers, debuggers, interpreters and text editors.
3. Application software is intended to perform certain tasks. Examples of application software include
office suites, gaming applications, database systems and educational software. Application software
can be a single program or a collection of small programs.

6) Discuss Conversion of Binary to Decimal with an example?

Ans: Binary-to-decimal conversion follows the same steps as decimal to binary,


except in reverse order. We begin by multiplying 0 x 2 and adding 1. We continue
to multiply the numbers in the "results" column by 2, and adding the digits from left
to right in our binary number.

 Example 1: Convert 11101 from binary to decimal.


Operations Result

0x2+1 1

1x2+1 3

3x2+1 7

7x2+0 14

14 x 2 + 1 29

 Therefore, 11101 in binary is 29 in decimal.

7) Define some functions of word example undo?

Ans:

Shortcut Description

Ctrl+0 Toggles 6pts of spacing before a paragraph.

Ctrl+A Select all contents of the page.

Ctrl+B Bold highlighted selection.

Ctrl+C Copy selected text.

Ctrl+D Open the font preferences window.

Ctrl+E Aligns the line or selected text to the center of the screen.

Ctrl+F Open find box.

Ctrl+I Italic highlighted selection.

Ctrl+J Aligns the selected text or line to justify the screen.


Ctrl+K Insert a hyperlink.

Ctrl+L Aligns the line or selected text to the left of the screen.

Ctrl+M Indent the paragraph.

Ctrl+N Opens new, blank document window.

Ctrl+O Opens the dialog box or page for selecting a file to open.

Ctrl+P Open the print window.

Ctrl+R Aligns the line or selected text to the right of the screen.

Ctrl+S Save the open document. Just like Shift+F12.

Ctrl+T Create a hanging indent.

Ctrl+U Underline the selected text.

Ctrl+V Paste.

Ctrl+W Close the currently open document.

Ctrl+X Cut selected text.

Ctrl+Y Redo the last action performed.

Ctrl+Z Undo last action.

Ctrl+Shift+L Quickly create a bullet point.

Ctrl+Shift+F Change the font.

Ctrl+Shift+> Increase selected font +1pts up to 12pt and then increase font +2pts.

Ctrl+] Increase selected font +1pts.

Ctrl+Shift+< Decrease selected font -1pts if 12pt or lower; if above 12, decreases font by +2pt.

Ctrl+[ Decrease selected font -1pts.


Ctrl+/+c Insert a cent sign (¢).

Ctrl+'+<char> Insert a character with an accent (grave) mark, where <char> is the character you want. For example,
wanted an accented è you would use Ctrl+'+eas your shortcut key. To reverse the accent mark use the
accent mark, often on the tilde key.

Ctrl+Shift+* View or hide non printing characters.

Ctrl+<left arrow> Moves one word to the left.

Ctrl+<right arrow> Moves one word to the right.

Ctrl+<up arrow> Moves to the beginning of the line or paragraph.

Ctrl+<down arrow> Moves to the end of the paragraph.

Ctrl+Del Deletes word to right of cursor.

Ctrl+Backspace Deletes word to left of cursor.

Ctrl+End Moves the cursor to the end of the document.

Ctrl+Home Moves the cursor to the beginning of the document.

Ctrl+Spacebar Reset highlighted text to the default font.

Ctrl+1 Single-space lines.

Ctrl+2 Double-space lines.

Ctrl+5 1.5-line spacing.

Ctrl+Alt+1 Changes text to heading 1.

Ctrl+Alt+2 Changes text to heading 2.

Ctrl+Alt+3 Changes text to heading 3.

Alt+Ctrl+F2 Open new document.

Ctrl+F1 Open the Task Pane.


Ctrl+F2 Display the print preview.

Ctrl+Shift+> Increases the selected text size by one font size.

Ctrl+Shift+< Decreases the selected text size by one font size.

Ctrl+Shift+F6 Switches to another open Microsoft Word document.

Ctrl+Shift+F12 Prints the document.

F1 Open Help.

F4 Repeat the last action performed (Word 2000+)

F5 Open the Find, Replace, and Go To window in Microsoft Word.

F7 Spellcheck and grammar check selected text or document.

F12 Save As.

Shift+F3 Change the text in Microsoft Word from uppercase to lowercase or a capital letter at the beginning of

Shift+F7 Runs a Thesaurus check on the selected word.

Shift+F12 Save the open document. Just like Ctrl+S.

Shift+Enter Create a soft break instead of a new paragraph.

Shift+Insert Paste.

Shift+Alt+D Insert the current date.

Shift+Alt+T Insert the current time.

8) Define some functions of Excel such as sum etc.

Ans: Functions of Excel

Mathematical Functions
SUM - Adds up all the values in a range
SUMIF - Adds all the values in a range that meet specific critera

SUMIFS (2007+) - Adds values in a range based on multiple criteria

SUMPRODUCT - Sum a range of cells that meet multiple criteria

ROUND - Round a number to a specified number of digits

ROUNDUP - Round a number up to a specified number of digits

ROUNDDOWN - Round a number down to a specified number of digits

CEILING - Round a number up to a multiple of significance

FLOOR - Round a number down to a multiple of significance

Statistical Functions
COUNT - Counts all the values in a range

AVERAGE - Calculates the average number from a range of values

MAX - Finds the maximum value in a range

MIN - Finds the minimum value in a range

COUNTA - Counts all non-empty cells in a range

COUNTBLANK - Counts all blank cells in a range

COUNTIF - Counts all the cells in a range that meet specific critera

COUNTIFS (2007+) - Counts all the cells in a range that meet multiple criteria

AVERAGEIF (2007+) - Calculates the average of a range of values that meet specific
criteria

AVERAGEIFS (2007+) - Calculates the average of a range of values that meet multiple
criteria

LARGE - Return a value dependent upon its ranking in a range of values in descending
order

SMALL - Return a value dependent upon its ranking in a range of values in ascending order

RANK - Returns the rank or position of a number within a range of numbers


Text Functions
LEN - Returns the length, in number of characters, of the contents of a cell

REPT - Repeats a character a specified number of times

TRIM - Remove unwanted spaces from cells

LEFT - Extracts a specific number of characters from the start of a cell

RIGHT - Extracts a specific number of characters from the end of a cell

MID - Extracts a specific number of characters from the middle of a cell

UPPER - Converts the contents of a cell to uppercase

LOWER - Converts the contents of a cell to lowercase

PROPER - Converts the contents of a cell to proper case

REPLACE - Replace existing characters in a cell with a different set of characters

SUBSTITUTE - Replace existing characters with a different set of characters

Financial Functions
PMT - Calculates loan repayments based on constant payments and a constant interest
rate

RATE - Returns the interest rate per period of a loan or investment

PV - Returns the present value of an investment based on a constant interest rate and
payments

FV - Returns the future value of an investment based on constant payments and a constant
interest rate

IPMT - Calculates the interest paid during a period of a loan or investment

PPMT - Calculates the principal payment made in a period of an investment

IRR - Returns the internal rate of return on a series of regular investments

XIRR - Returns the internal rate of return on a series of irregular payments on an


investment
NPV - Returns the net present value of an investment based on a series of cash flows and
a discount rate

XNPV - Returns the net present value of an investment based on a series of cash flows, the
dates of the cash flows and a discount rate

Lookup and Reference Functions


VLOOKUP - Looks vertically down a list to find a record and returns information related to
that record

HLOOKUP - Looks horizontally across a list to find a record and returns information related
to that record

MATCH - Returns the position of a value in a list

INDEX - Returns an item from a specific position in a list

INDIRECT - Allows you to use a cell reference entered as a text string

OFFSET - Returns a value from a cell, or range of cells that are a specified number of rows
and columns from another cell

CHOOSE - Returns a value from a list of values based on a specified position

ADDRESS - Returns a text representation of a cell address from specified row and column
numbers

Logical Functions
IF - Tests a condition and takes an alternative action depending on the result

AND - Test up to 30 conditions using logical And

OR - Test up to 30 conditions using logical Or

IFERROR - Performs a specified action if a formula evaluates to an error, and displays the
formula result if not

Date & Time Functions


TODAY - Returns the current date

NOW - Returns the current date and time


DATE - Returns the sequential serial number for the specified date and formats the result
as a date

DAY - Returns the day corresponding to a date represented by a number between 1 and 31

MONTH - Returns the month corresponding to a date represented by a number between 1


and 12

YEAR - Returns the year corresponding to a date represented by a number in the range
1900 to 9999

WORKDAY - Returns the date a specified number of workings days before or after a date

WEEKDAY - Returns the day of the week corresponding to a specified date

NETWORKDAYS - Returns the number of workdays between two dates

EOMONTH - Calculates the last day of the month a specified number of months before or
after a date

9) What is OSI model (Computer Network)?

Ans: The OSI model defines networking in terms of a vertical stack of seven layers. The upper layers
of the OSI model represent software that implements network services like encryption and connection
management. The lower layers of the OSI model implement hardware-oriented functions such as
routing, addressing and flow control. All data that goes over a network connection passes through each
of the seven layers.

The OSI model was introduced in 1984. Designed to be an abstract model and teaching tool, the OSI
model remains a useful tool for learning about today's network technologies such as Ethernet and
protocols like IP. The OSI is maintained as a standard by the International Standards Organization.

The Flow of the OSI Model

Data communication in the OSI model starts with the top layer of the stack at the sending side, travels
down the stack to the sender's lowest (bottom) layer, then traverses the physical network connection to
the bottom layer on the receiving side, and up its OSI model stack.

For example, Internet Protocol (IP) corresponds to the Network layer of the OSI model, layer 3
(counting from the bottom). TCP and UDP correspond to OSI model layer 4, the Transport layer. Lower
layers of the OSI model are represented by technologies such as Ethernet. Higher layers of the OSI
model are represented by application protocols like TCP and UDP.
The Seven Layers of the OSI Model

The bottom three layers of the OSI Model are referred to as the Media Layers, while the top four layers
are the Host layers. The layers are numbered from 1 through 7 beginning at the bottom. The layers are:

 Application layer (layer 7) - Network Process to Application. This end-user layer packages the data
received from the Presentation Layer in the format needed by the application or end-user process that
receives it. Examples include browsers, SMTP, HTTP, and FTP. This layer also creates what is to be
sent back to the Presentation Layer.

 The presentation layer (layer 6) - Data Representation and Encryption, including format conversions.
Think of this layer as the translator. Examples include ASCII, TIFF, JPEG, MIDI, and MPEG.
 Session layer (layer 5) - Interhost Communication. This layer manages multiple types of
communications and sends data to logical ports, including those using NFS and SQL.
 Transport layer (layer 4) - End-to-End Connections and Reliability. As the name implies, this layer
moves data across network connections, usually using TCP. It also handles error recovery and re-
transmissions.
 Network layer (layer 3) - Path Determination, IP, and Routing. Layer 3 formats data as packets. Directs
the data to the correct physical path.
 Data Link layer (layer 2) - This is the most complex layer in the OSI model, and it is sometimes divided
into two parts: one for media access control and one for logical link control.
 The physical layer (layer 1) - Media, Signal and Binary Transmission. Examples include hubs,
repeaters, and Ethernet cables. Data is transmitted by an electric voltage, radio frequencies, infrared or
ordinary light.

10) What is Protocol (Computer Network).

Ans. In information technology, a protocol is the special set of rules that end points in a
telecommunication connection use when they communicate. Protocols specify
interactions between the communicating entities.

Protocols exist at several levels in a telecommunication connection. For example, there are
protocols for the data interchange at the hardware device level and protocols for data
interchange at the application program level. In the standard model known as Open
Systems Interconnection (OSI), there are one or more protocols at each layer in the
telecommunication exchange that both ends of the exchange must recognize and observe.
Protocols are often described in an industry or international standard.

The TCP/IP Internet protocols, a common example, consist of:

 Transmission Control Protocol (TCP), which uses a set of rules to exchange messages
with other Internet points at the information packet level

 Internet Protocol (IP), which uses a set of rules to send and receive messages at the
Internet address level
 Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File
Transfer Protocol (FTP), each with defined sets of rules to use with corresponding
programs elsewhere on the Internet

 There are many other Internet protocols, such as the Border Gateway Protocol (BGP)
and the Dynamic Host Configuration Protocol (DHCP).

 The word protocol comes from the Greek protocollon, meaning a leaf of paper glued
to a manuscript volume that describes the contents.

11) Define Modem, Firewall, Router and Hub?

Ans. Modem: A modem is a hardware device that allows a computer to send and receive
data over a telephone line or a cable or satellite connection. In the case of transmission over
an analog telephone line, which was once the most popular way to access the internet, the
modem converts data between analog and digital formats in real time for two-way network
communication. In the case of the high-speed digital modems popular today, the signal is
much simpler and doesn't require the analog-to-digital conversion.

Firewall: A firewall is a system designed to prevent unauthorized access to or from a


private network. You can implement a firewall in either hardware or software form, or a
combination of both. Firewalls prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets.

Router: In packet-switched networks such as the internet, a router is a device or,


in some cases, software on a computer, that determines the best way for
a packet to be forwarded to its destination.

A router connects networks. Based on its current understanding of the state of the network
it is connected to, a router acts as a dispatcher as it decides which way to send each
information packet. A router is located at any gateway (where one network meets another),
including each point-of-presence on the internet. A router is often included as part of a
network switch.

HUB: When referring to a network, a hub is the most basic networking device that
connects multiple computers or other network devices together. Unlike a
network switch or router, a network hub has no routing tables or intelligence on where to
send information and broadcasts all network data across each connection. Most hubs can
detect basic network errors such as collisions, but having all information broadcast to
multiple ports can be a security risk and cause bottlenecks. In the past, network hubs
were popular because they were cheaper than a switch or router. Today, switches do not
cost much more than a hub and are a much better solution for any network.

12) What is Networking and how many types of networking?

Ans: A computer network, or data network, is a digital telecommunications network which


allows nodes to share resources. In computer networks, networked computing devices
exchange data with each other using a data link. The connections between nodes are
established using either cable media or wireless media.

One way to categorize the different types of computer network designs is by their scope or scale. For historical
reasons, the networking industry refers to nearly every type of design as some kind of area network. Common
types of area networks are:

 LAN - Local Area Network


 WAN - Wide Area Network
 WLAN - Wireless Local Area Network
 MAN - Metropolitan Area Network
 SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network

 CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network
 PAN - Personal Area Network

LAN and WAN are the two primary and best-known categories of area networks, while the others have emerged
with technology advances

Note that network types differ from network topologies (such as bus, ring and star). (See also - Introduction to
Network Topologies.)

LAN: Local Area Network

A LAN connects network devices over a relatively short distance. A networked office building, school, or home
usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per
room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but
not always implemented as a single IP subnet.
In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single
person or organization.

They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.

WAN: Wide Area Network

As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth.

A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a
WAN.

In IP networking, the router maintains both a LAN address and a WAN address.

A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one
organization but rather exist under collective or distributed ownership and management. WANs tend to use
technology like ATM, Frame Relay and X.25 for connectivity over the longer distances.

LAN, WAN and Home Networking

Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider
(ISP) using a broadband modem. The ISP provides a WAN IP address to the modem, and all of the computers on
the home network use LAN (so-called private) IP addresses. All computers on the home LAN can communicate
directly with each other but must go through a central network gateway, typically a broadband router, to reach the
ISP.

Other Types of Area Networks

While LAN and WAN are by far the most popular network types mentioned, you may also commonly see
references to these others:

 Wireless Local Area Network - A LAN based on Wi-Fi wireless network technology
 Metropolitan Area Network - A network spanning a physical area larger than a LAN but smaller than a WAN, such
as a city. A MAN is typically owned and operated by a single entity such as a government body or large
corporation.

 Campus Area Network - A network spanning multiple LANs but smaller than a MAN, such as on a university or
local business campus.
 Storage Area Network - Connects servers to data storage devices through a technology like Fibre Channel.
 System Area Network (also known as Cluster Area Network) - Links high-performance computers with high-speed
connections in a cluster configuration.
13) Define LAN

Ans: LAN: Local Area Network

A LAN connects network devices over a relatively short distance. A networked office building, school,
or home usually contains a single LAN, though sometimes one building will contain a few small LANs
(perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP
networking, a LAN is often but not always implemented as a single IP subnet.

In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by
a single person or organization.

They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.

14) Define Desktop and Server operating system with an example.

Ans: DESKTOP: A desktop may refer to any of the following:


1. A desktop is a term commonly used to describe a desktop computer or system unit.
2. When referring to an operating system or GUI, the Desktop is a system of
organization of icons on a screen. The Microsoft Windows Desktop was first
introduced with MicrosoftWindows 95 and has been included with every version of
Windows since then.

SERVER OPERATING SYSTEM: A server operating system, also called a server OS, is an operating
system specifically designed to run on servers, which are specialized computers that operate within
a client/server architecture to serve the requests of client computers on the network.
The server operating system, or server OS, is the software layer on top of which other software programs,
or applications, can run on the server hardware. Server operating systems help enable and facilitate
typical serverroles such as Web server, mail server, file server, database server, application server and
print server.

Most Popular Server Operating Systems


Popular server operating systems include Windows Server, Mac OS X Server, and variants of Linux such as Red
Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise Server.
According to SpiceWorks, this list is the most deployed on-premises server operating systems (August 2016):
 Windows Server 2003
 Windows Server 2008
 Windows Server 2012
 Linux (excluding RHEL)
 Windows Server 2000
 Red Hat Enterprise Linus (RHEL)

15) Explain a) Active Directory b) DNS c) Dead Lock d) Process and thread

Ans. ACTIVE DIRECTORY:


Active Directory Domain Services is Microsoft's Directory Server. It provides
authentication and authorization mechanisms as well as a framework within which other related
services can be deployed (AD Certificate Services, AD Federated Services, etc). It is an LDAP
compliant database that contains objects.
Active Directory Users and Computers is an MMC snap-in that is a standard feature of Microsoft
Windows Server operating systems. However, when you install Exchange 2003, the setup wizard
automatically extends the functionality of Active Directory Users and Computers to include
Exchange-specific tasks.
A server running Active Directory Domain Services (AD DS) is called a domain controller. It
authenticates and authorizes all users and computers in a Windows domain type network—
assigning and enforcing security policies for all computers and installing or updating software.
The following are categories of functions in Active Directory Domain Services:
1. Display Functions in Active Directory Domain Services.
2. MMC Property Page Functions in Active Directory Domain Services.
3. Domain Controller and Replication Management Functions.
4. Directory Service Functions.
5. Directory Backup Functions.

Creating the Active Directory

After you have installed Windows Server 2003 on a stand-alone server, run the Active Directory Wizard to
create the new Active Directory forest or domain, and then convert the Windows Server 2003 computer into
the first domain controller in the forest. To convert a Windows Server 2003 computer into the first domain
controller in the forest, follow these steps:

1. Insert the Windows Server 2003 CD-ROM into your computer's CD-ROM or DVD-ROM drive.

2. Click Start, click Run, and then type dcpromo.


3. Click OK to start the Active Directory Installation Wizard, and then click Next.
4. Click Domain controller for a new domain, and then click Next.
5. Click Domain in a new forest, and then click Next.
6. Specify the full DNS name for the new domain. Note that because this procedure is for a laboratory
environment and you are not integrating this environment into your existing DNS infrastructure, you can
use something generic, such as mycompany.local, for this setting. Click Next.
7. Accept the default domain NetBIOS name (this is "mycompany" if you used the suggestion in step 6).
Click Next.
8. Set the database and log file location to the default setting of the c:\winnt\ntds folder, and then click Next.
9. Set the Sysvol folder location to the default setting of the c:\winnt\sysvol folder, and then click Next.
10. Click Install and configure the DNS server on this computer, and then click Next.
11. Click Permissions compatible only with Windows 2000 or Windows Server 2003 servers or operating
systems, and then click Next.
12. Because this is a laboratory environment, leave the password for the Directory Services Restore Mode
Administrator blank. Note that in a full production environment, this password is set by using a secure
password format. Click Next.
13. Review and confirm the options that you selected, and then click Next.
14. The installation of Active Directory proceeds. Note that this operation may take several minutes.

15. When you are prompted, restart the computer. After the computer restarts, confirm that the Domain Name
System (DNS) service location records for the new domain controller have been created. To confirm that the
DNS service location records have been created, follow these steps:

1. Click Start, point to Administrative Tools, and then click DNS to start the DNS Administrator Console.
2. Expand the server name, expand Forward Lookup Zones, and then expand the domain.
3. Verify that the _msdcs, _sites, _tcp, and _udp folders are present. These folders and the service location
records they contain are critical to Active Directory and Windows Server 2003 operations.

Adding Users and Computers to the Active Directory Domain

After the new Active Directory domain is established, create a user account in that domain to use as an
administrative account. When that user is added to the appropriate security groups, use that account to add
computers to the domain.

1. To create a new user, follow these steps:

1. Click Start, point to Administrative Tools, and then click Active Directory Users and Computers to start
the Active Directory Users and Computers console.
2. Click the domain name that you created, and then expand the contents.

3. Right-click Users, point to New, and then click User.


4. Type the first name, last name, and user logon name of the new user, and then click Next.
5. Type a new password, confirm the password, and then click to select one of the following check boxes:

 Users must change password at next logon (recommended for most users)

 User cannot change password

 Password never expires


 Account is disabled

Click Next.

6. Review the information that you provided, and if everything is correct, click Finish.
2. After you create the new user, give this user account membership in a group that permits that user to
perform administrative tasks. Because this is a laboratory environment that you are in control of, you can
give this user account full administrative access by making it a member of the Schema, Enterprise, and
Domain administrators groups. To add the account to the Schema, Enterprise, and Domain administrators
groups, follow these steps:

1. On the Active Directory Users and Computers console, right-click the new account that you created, and
then click Properties.
2. Click the Member Of tab, and then click Add.
3. In the Select Groups dialog box, specify a group, and then click OK to add the groups that you want to the
list.
4. Repeat the selection process for each group in which the user needs account membership.

5. Click OK to finish.
3. The final step in this process is to add a member server to the domain. This process also applies to
workstations. To add a computer to the domain, follow these steps:

1. Log on to the computer that you want to add to the domain.

2. Right-click My Computer, and then click Properties.


3. Click the Computer Name tab, and then click Change.
4. In the Computer Name Changes dialog box, click Domain under Member Of, and then type the domain
name. Click OK.
5. When you are prompted, type the user name and password of the account that you previously created, and
then click OK.

A message that welcomes you to the domain is generated.


6. Click OK to return to the Computer Name tab, and then click OK to finish.
7. Restart the computer if you are prompted to do so.

DNS:

S-ar putea să vă placă și