Documente Academic
Documente Profesional
Documente Cultură
• Ans: Information Technologies are systems of hardware and/or software that capture, process, exchange, store
and/or present information using electrical, magnetic and/or electromagnetic energy.
Ans: Most people believe that the terms "data" and "information" are interchangeable and mean
the same thing. However, there is a distinct difference between the two words. Data can be
any character, text, words, number, pictures, sound, or video and, if not put into context, means
little or nothing to a human. However, information is useful and usually formatted in a manner
that allows it to be understood by a human.
Computers typically read data, but it is not necessarily something that a computer actually
understands. Through the use of formulas, programming scripts, or software applications, a
computer can turn data into information that a human can understand.
Below is an example of the same data and information and how they differ.
Example of Data
Joe,Smith,1234 Circle,SLC,UT,84084,8015553211
Example of Information
Joe Smith
1234 Circle
Salt Lake City, UT 84084
(801)555-3211
As you can see in the above example, if you only looked at the data, you may be able to
understand some of the text on the line, but it isn't really useful. That same information,
when broken out into readable text and even slightly formatted, becomes much more
useful and allows you to identify that it is contact information for Joe Smith.
In this example, the data could be a CSV file that can be parsed into
an Excel spreadsheet or database to make it usable information.
Ans: The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral
devices connected to it and its operating system. Computer systems fall into two categories: clients and servers.
Clients are the user's laptop, desktop and tablet computers and smartphones, while servers share their data and
applications with multiple users. Servers range from entry-level rack mounts to mainframes. See rack
mounted and mainframe.
A computer system is sized for the number of users it handles simultaneously, the type of work performed (office,
engineering, etc.) and the volume of data that must be stored.
Platform
Every application is written to run under a specific CPU/operating system environment. The largest client platforms
are x86/Windows, x86/Mac, ARM/Android and ARM/iOS. The largest server platforms are x86/Linux and
x86/Windows. See platform, x86 and ARM.
Clock Speed
The gigahertz (GHz) rate of the CPU determines internal processing speed. See MHz.
Fault Tolerance
The use of redundant processors, peripherals and power supplies provide continued operation in the event of
hardware failure. See fault tolerant.
This is a mainframe; however, except for the tape drives, every system contains similar components, which can all be
built into a desktop or laptop computer.
4) Define Virus, Antivirus, Primary memory.
Ans: Virus: A computer virus is a malicious software program loaded onto a user's computer
without the user's knowledge and performs malicious actions.
Primary Memory: Primary storage, also known as main storage or memory, is the area in a
computer in which data is stored for quick access by the computer's processor. The terms
random access memory (RAM) and memory are often as synonyms forprimary or main
storage.
Ans: SOFTWARE: Software, in its most general sense, is a set of instructions or programs
instructing a computer to do specific tasks. Software is a generic term used to describe
computer programs. Scripts, applications, programs and a set of instructions are the terms often
used to describe software.
TYPES OF SOFTWARES:
1. System software serves as a base for application software. System software includes device
drivers, operating systems (OSs), compilers, disk formatters, text editors and utilities helping the
computer to operate more efficiently. It is also responsible for managing hardware components and
providing basic non-task specific functions. The system software is usually written in C
programming language.
2. Programming software is a set of tools to aid the developers to write programs. The various tools
available are compilers, linkers, debuggers, interpreters and text editors.
3. Application software is intended to perform certain tasks. Examples of application software include
office suites, gaming applications, database systems and educational software. Application software
can be a single program or a collection of small programs.
0x2+1 1
1x2+1 3
3x2+1 7
7x2+0 14
14 x 2 + 1 29
Ans:
Shortcut Description
Ctrl+E Aligns the line or selected text to the center of the screen.
Ctrl+L Aligns the line or selected text to the left of the screen.
Ctrl+O Opens the dialog box or page for selecting a file to open.
Ctrl+R Aligns the line or selected text to the right of the screen.
Ctrl+V Paste.
Ctrl+Shift+> Increase selected font +1pts up to 12pt and then increase font +2pts.
Ctrl+Shift+< Decrease selected font -1pts if 12pt or lower; if above 12, decreases font by +2pt.
Ctrl+'+<char> Insert a character with an accent (grave) mark, where <char> is the character you want. For example,
wanted an accented è you would use Ctrl+'+eas your shortcut key. To reverse the accent mark use the
accent mark, often on the tilde key.
F1 Open Help.
Shift+F3 Change the text in Microsoft Word from uppercase to lowercase or a capital letter at the beginning of
Shift+Insert Paste.
Mathematical Functions
SUM - Adds up all the values in a range
SUMIF - Adds all the values in a range that meet specific critera
Statistical Functions
COUNT - Counts all the values in a range
COUNTIF - Counts all the cells in a range that meet specific critera
COUNTIFS (2007+) - Counts all the cells in a range that meet multiple criteria
AVERAGEIF (2007+) - Calculates the average of a range of values that meet specific
criteria
AVERAGEIFS (2007+) - Calculates the average of a range of values that meet multiple
criteria
LARGE - Return a value dependent upon its ranking in a range of values in descending
order
SMALL - Return a value dependent upon its ranking in a range of values in ascending order
Financial Functions
PMT - Calculates loan repayments based on constant payments and a constant interest
rate
PV - Returns the present value of an investment based on a constant interest rate and
payments
FV - Returns the future value of an investment based on constant payments and a constant
interest rate
XNPV - Returns the net present value of an investment based on a series of cash flows, the
dates of the cash flows and a discount rate
HLOOKUP - Looks horizontally across a list to find a record and returns information related
to that record
OFFSET - Returns a value from a cell, or range of cells that are a specified number of rows
and columns from another cell
ADDRESS - Returns a text representation of a cell address from specified row and column
numbers
Logical Functions
IF - Tests a condition and takes an alternative action depending on the result
IFERROR - Performs a specified action if a formula evaluates to an error, and displays the
formula result if not
DAY - Returns the day corresponding to a date represented by a number between 1 and 31
YEAR - Returns the year corresponding to a date represented by a number in the range
1900 to 9999
WORKDAY - Returns the date a specified number of workings days before or after a date
EOMONTH - Calculates the last day of the month a specified number of months before or
after a date
Ans: The OSI model defines networking in terms of a vertical stack of seven layers. The upper layers
of the OSI model represent software that implements network services like encryption and connection
management. The lower layers of the OSI model implement hardware-oriented functions such as
routing, addressing and flow control. All data that goes over a network connection passes through each
of the seven layers.
The OSI model was introduced in 1984. Designed to be an abstract model and teaching tool, the OSI
model remains a useful tool for learning about today's network technologies such as Ethernet and
protocols like IP. The OSI is maintained as a standard by the International Standards Organization.
Data communication in the OSI model starts with the top layer of the stack at the sending side, travels
down the stack to the sender's lowest (bottom) layer, then traverses the physical network connection to
the bottom layer on the receiving side, and up its OSI model stack.
For example, Internet Protocol (IP) corresponds to the Network layer of the OSI model, layer 3
(counting from the bottom). TCP and UDP correspond to OSI model layer 4, the Transport layer. Lower
layers of the OSI model are represented by technologies such as Ethernet. Higher layers of the OSI
model are represented by application protocols like TCP and UDP.
The Seven Layers of the OSI Model
The bottom three layers of the OSI Model are referred to as the Media Layers, while the top four layers
are the Host layers. The layers are numbered from 1 through 7 beginning at the bottom. The layers are:
Application layer (layer 7) - Network Process to Application. This end-user layer packages the data
received from the Presentation Layer in the format needed by the application or end-user process that
receives it. Examples include browsers, SMTP, HTTP, and FTP. This layer also creates what is to be
sent back to the Presentation Layer.
The presentation layer (layer 6) - Data Representation and Encryption, including format conversions.
Think of this layer as the translator. Examples include ASCII, TIFF, JPEG, MIDI, and MPEG.
Session layer (layer 5) - Interhost Communication. This layer manages multiple types of
communications and sends data to logical ports, including those using NFS and SQL.
Transport layer (layer 4) - End-to-End Connections and Reliability. As the name implies, this layer
moves data across network connections, usually using TCP. It also handles error recovery and re-
transmissions.
Network layer (layer 3) - Path Determination, IP, and Routing. Layer 3 formats data as packets. Directs
the data to the correct physical path.
Data Link layer (layer 2) - This is the most complex layer in the OSI model, and it is sometimes divided
into two parts: one for media access control and one for logical link control.
The physical layer (layer 1) - Media, Signal and Binary Transmission. Examples include hubs,
repeaters, and Ethernet cables. Data is transmitted by an electric voltage, radio frequencies, infrared or
ordinary light.
Ans. In information technology, a protocol is the special set of rules that end points in a
telecommunication connection use when they communicate. Protocols specify
interactions between the communicating entities.
Protocols exist at several levels in a telecommunication connection. For example, there are
protocols for the data interchange at the hardware device level and protocols for data
interchange at the application program level. In the standard model known as Open
Systems Interconnection (OSI), there are one or more protocols at each layer in the
telecommunication exchange that both ends of the exchange must recognize and observe.
Protocols are often described in an industry or international standard.
Transmission Control Protocol (TCP), which uses a set of rules to exchange messages
with other Internet points at the information packet level
Internet Protocol (IP), which uses a set of rules to send and receive messages at the
Internet address level
Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File
Transfer Protocol (FTP), each with defined sets of rules to use with corresponding
programs elsewhere on the Internet
There are many other Internet protocols, such as the Border Gateway Protocol (BGP)
and the Dynamic Host Configuration Protocol (DHCP).
The word protocol comes from the Greek protocollon, meaning a leaf of paper glued
to a manuscript volume that describes the contents.
Ans. Modem: A modem is a hardware device that allows a computer to send and receive
data over a telephone line or a cable or satellite connection. In the case of transmission over
an analog telephone line, which was once the most popular way to access the internet, the
modem converts data between analog and digital formats in real time for two-way network
communication. In the case of the high-speed digital modems popular today, the signal is
much simpler and doesn't require the analog-to-digital conversion.
A router connects networks. Based on its current understanding of the state of the network
it is connected to, a router acts as a dispatcher as it decides which way to send each
information packet. A router is located at any gateway (where one network meets another),
including each point-of-presence on the internet. A router is often included as part of a
network switch.
HUB: When referring to a network, a hub is the most basic networking device that
connects multiple computers or other network devices together. Unlike a
network switch or router, a network hub has no routing tables or intelligence on where to
send information and broadcasts all network data across each connection. Most hubs can
detect basic network errors such as collisions, but having all information broadcast to
multiple ports can be a security risk and cause bottlenecks. In the past, network hubs
were popular because they were cheaper than a switch or router. Today, switches do not
cost much more than a hub and are a much better solution for any network.
One way to categorize the different types of computer network designs is by their scope or scale. For historical
reasons, the networking industry refers to nearly every type of design as some kind of area network. Common
types of area networks are:
CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network
PAN - Personal Area Network
LAN and WAN are the two primary and best-known categories of area networks, while the others have emerged
with technology advances
Note that network types differ from network topologies (such as bus, ring and star). (See also - Introduction to
Network Topologies.)
A LAN connects network devices over a relatively short distance. A networked office building, school, or home
usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per
room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but
not always implemented as a single IP subnet.
In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single
person or organization.
They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.
As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth.
A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a
WAN.
In IP networking, the router maintains both a LAN address and a WAN address.
A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one
organization but rather exist under collective or distributed ownership and management. WANs tend to use
technology like ATM, Frame Relay and X.25 for connectivity over the longer distances.
Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider
(ISP) using a broadband modem. The ISP provides a WAN IP address to the modem, and all of the computers on
the home network use LAN (so-called private) IP addresses. All computers on the home LAN can communicate
directly with each other but must go through a central network gateway, typically a broadband router, to reach the
ISP.
While LAN and WAN are by far the most popular network types mentioned, you may also commonly see
references to these others:
Wireless Local Area Network - A LAN based on Wi-Fi wireless network technology
Metropolitan Area Network - A network spanning a physical area larger than a LAN but smaller than a WAN, such
as a city. A MAN is typically owned and operated by a single entity such as a government body or large
corporation.
Campus Area Network - A network spanning multiple LANs but smaller than a MAN, such as on a university or
local business campus.
Storage Area Network - Connects servers to data storage devices through a technology like Fibre Channel.
System Area Network (also known as Cluster Area Network) - Links high-performance computers with high-speed
connections in a cluster configuration.
13) Define LAN
A LAN connects network devices over a relatively short distance. A networked office building, school,
or home usually contains a single LAN, though sometimes one building will contain a few small LANs
(perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP
networking, a LAN is often but not always implemented as a single IP subnet.
In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by
a single person or organization.
They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.
SERVER OPERATING SYSTEM: A server operating system, also called a server OS, is an operating
system specifically designed to run on servers, which are specialized computers that operate within
a client/server architecture to serve the requests of client computers on the network.
The server operating system, or server OS, is the software layer on top of which other software programs,
or applications, can run on the server hardware. Server operating systems help enable and facilitate
typical serverroles such as Web server, mail server, file server, database server, application server and
print server.
After you have installed Windows Server 2003 on a stand-alone server, run the Active Directory Wizard to
create the new Active Directory forest or domain, and then convert the Windows Server 2003 computer into
the first domain controller in the forest. To convert a Windows Server 2003 computer into the first domain
controller in the forest, follow these steps:
1. Insert the Windows Server 2003 CD-ROM into your computer's CD-ROM or DVD-ROM drive.
15. When you are prompted, restart the computer. After the computer restarts, confirm that the Domain Name
System (DNS) service location records for the new domain controller have been created. To confirm that the
DNS service location records have been created, follow these steps:
1. Click Start, point to Administrative Tools, and then click DNS to start the DNS Administrator Console.
2. Expand the server name, expand Forward Lookup Zones, and then expand the domain.
3. Verify that the _msdcs, _sites, _tcp, and _udp folders are present. These folders and the service location
records they contain are critical to Active Directory and Windows Server 2003 operations.
After the new Active Directory domain is established, create a user account in that domain to use as an
administrative account. When that user is added to the appropriate security groups, use that account to add
computers to the domain.
1. Click Start, point to Administrative Tools, and then click Active Directory Users and Computers to start
the Active Directory Users and Computers console.
2. Click the domain name that you created, and then expand the contents.
Users must change password at next logon (recommended for most users)
Click Next.
6. Review the information that you provided, and if everything is correct, click Finish.
2. After you create the new user, give this user account membership in a group that permits that user to
perform administrative tasks. Because this is a laboratory environment that you are in control of, you can
give this user account full administrative access by making it a member of the Schema, Enterprise, and
Domain administrators groups. To add the account to the Schema, Enterprise, and Domain administrators
groups, follow these steps:
1. On the Active Directory Users and Computers console, right-click the new account that you created, and
then click Properties.
2. Click the Member Of tab, and then click Add.
3. In the Select Groups dialog box, specify a group, and then click OK to add the groups that you want to the
list.
4. Repeat the selection process for each group in which the user needs account membership.
5. Click OK to finish.
3. The final step in this process is to add a member server to the domain. This process also applies to
workstations. To add a computer to the domain, follow these steps:
DNS: