Documente Academic
Documente Profesional
Documente Cultură
MANAGEMENT
ALI RAZA
BCS (2012-2014)
DEPARTMENT OF COMPUTER SCINCE
GC UNIVERSITY FAISALABAD
Q1. What is network and what is a networking?
Sol: - Network: - A group of two more computer system linked together is called network or network is a collection of
computer to connect with each other.
Networking: - Networking means two or more than two computer are connected by using transmission media and
sharing the resources (like printer, scanner etc.) transfer data and message.
• Lower in cost
• Computers are connected to a wide- area network are often connected through public networks such as telephone
system. They can be connected through leased lines or satellites e.g. internet.
Note: - leased line is a dedicated telephone connection between service provider and consumer.
Sol: - In this type of networking we can authenticate to the user from the centralized location or domain controller and
we can provide services to the user from centralized location.
Sol: - Stand for “Network interface card” pronounced “Nick” this card makes physically connection between the
computer and network.
Sol: - Media access control address a hardware address that uniquely identifies each node or computer of a
network.
• 48 bit address
Sol: - An identifies for a computer or devices on a TCP/IP network. Networks using the TCP/IP protocol route message
based on IP address of destination. The format of IP address is a 32-bit numeric address written in four numbers
separated by periods each numbers can be zero to 225.
Q12. What is the difference between base band and broad band?
Sol: - It is usually used to connect same devices. A cross cable can be used to
• Connect two switch’s\ hub’s\ by using normal port in both switches\ hubs
Sol: - It is usually used to connect different types of devices. A straight cable can be used to
568 B - 568 A
568 B - 568 B
1. Bus topology
2. Linear topology
3. Star topology
4. Tree topology
5. Ring topology
7. Mesh topology
8. Hybrid topology
- Virtual private network (VPN) Connection: - PPTP, L2TP to corporate network or internet
Q19. Which tool is used for making cross and straight cable?
Sol: - The open system interconnection basic preference model (OSI reference model or OSI model) is an abstract
description for layered communication and computer network design. In other word it is developed by ISO in 1984 and
it provide the communication in between different types of hardware.
• Layer 3 switch
Sol: - Ethernet is the most widely installed local area network (LAN) technology specified in a standard IEEE802.3. Ethernet
was originally developed by XEROX from an earlier specified called Alohanet and developed further by XEROX Dec and Intel.
Ethernet used with co-axial cable, TP cable.
Q26. What is Protocol?
Sol: - A protocol is the special setup rules that end point in a telecommunication connection used when they
communicate.
Sol:- Process by which a message is sent from a single host on the network without regard to the kind of data being sent
or the destination of the data – one into all.
Sol: - Unicasting is communication between a single sender and single receiver over a network. It mean one to one.
Sol: - Router is network device used to provide the communication in between two or more than two different network.
Sol: - Bridge id network device used to connect the two or more than two LAN segment as well as provide the
communication.
Sol: - Routing is the process of moving packets through an internetwork such as internet. Routing actually consists of
two separate but related tasks: -
Class A 1 - 127
Sol: - IP address that you make known to others on the internet is called your public IP address. A unique internet
protocol IP address known as a public IP address is assigned to every computer that connects to the internet. It is
reverse for internet.
Sol: - It is reserve got private network. The IP address that you use internally within your office, home or enterprise
network, which is not made known on the internet.
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
Sol: - This is an IP address that change each time you connect to the internet. Dynamic IP address assign to the
computer automatically.
Sol: - Static IP address assign to the computer manually. An IP address that does not change each time the user logon to
the internet.
Sol: - A subnet mask allows you to identify which part of an IP address is received for the network and which part is
available for HOST use.
Sol: - Host IP: - It represents number of host in per network. An identifier for host. A host Id uniquely identifies a host
within an address family on a network but doesn’t identify the network.
Network IP: - It represents the number of network in per class. Its IP address that identifies which network a particular
system is ON.
Sol: - -RID
• PDC
• Infrastructure
• Domain naming
• Schema
Sol: - DHCP server is used to provide automatically IP address to the client computer.
Sol: - lease line is a dedicated telephone connection between service provider and consumer.
Sol: - A default gateway is the node on the computer network that is chosen when the IP address does not belong to any
other entries in the routing table.
Sol: - Active directory also allows administrator to assign polices, deploy software’s and apply critical updates to an
organization.
Sol: - Domain controller is a server that responds to security authentication request in checking permission etc.
Sol: - Addition domain controller provides fault tolerance balance that load of existing domain controller.
Sol: - Domain name is a name given to a collection of network devices that belong to a domain, which an
administrative space managed according to some common characteristics of the member with the window domain
server.
Sol: - A collection of one or more domain trees with a common schema and implicit trust relationship between them.
This arrangement would be used if you have multiple root DNS address.
Q54. What are ports? What is the port number of FTP, HTTP, DHCP, DNS, DNS and IP?
Sol: - A port number is a way to identify a specific process to which an internet or other network message is to be
forwarding when it arrives at a server.
FTP - 21
HTTP - 80
DHCP - 67, 68
DNS - 53
IP - 0
Sol: - Automatic private IP address is a feature of window based operating system that enable itself an IP address when
there is no DHCP services available to perform that function.
Sol: - A server that is dedicated to handling users that are not on a LAN but need remote access to it. The remote access
server allows users to gain access to files and print server on the lab from a remote location.
Sol: - RAID stand for redundant array of independent disk and basically involves combining two or more drives
together to improve the performance and fault tolerance.
Q60. What is dynamic disk? What is difference between dynamic disk and basic disk?
Sol: - Dynamic disk is a physical disk that provide features that basic disk don’t such as support for volumes, spanning
multi disks
• Dynamic disk doesn’t convert - Basic disk convert into into basic in in to basic disk. dynamic disk
Sol: - Local users - A user account on a specific computer. A local user account is available only on the computer
where the local account id defined.
Domain user – A domain user account enables the services to take full advantage of the services security features of
Microsoft windows and Microsoft active directory domain.
Sol: - File system is the way in which files are named and where they are placed logically for storage and retrieved.
• Security Yes No
• Encryption Yes No
• Compression Yes No
Sol: - Sharing is a method or way to share the folder drive and other network resources.
Sol: - Compression
• Encryption
• Security
• Disk quota
Sol: - Disk quota is a limit set by a system administrator that restrict certain aspect of file system usage on mode in
operating system.
Sol: - Identical data is repeated many times compression technique use to enable more data to be squeezed into a finite
space.
Sol: - A user profile is a record of user specific data that define the user working environment. The record can display
setting, application setting and application connections.
Sol: - A roaming user profile is a concept in the Microsoft windows NT family of operating system that allow the user
with a computer joined to a windows server domain to logon to any computer on the same network and access their
local files and setting.
Sol: - A mandatory user profile is a pre-configured user profile the user can still modify the desktop but the change are
not saved when the user logoff.
Sol: - A safe of a file, a set of file or whole desktop safe keeping in case the original is lost or damaged. Backup utility
is used to protect your data if your hard disk is fail or files are accidently.
Sol: -
1. Normal backup
2. Copy backup
3. Differential backup
4. Incremental backup
5. Daily backup
Sol: - Differential backup clear the archive bits only after a full backup.
Incremental backup clear the archive bits each time data is backup.
Sol: - A system monitor is hardware or software based system used to monitor resource and performance in a computer
system.
Sol: - Print spooler program may allow a user to delete a print job being processed or other with manage the print job
currently waiting to be printed.
Sol: - NetBIOS name is a identifier used by NetBIOS services running on computer. It is combination of 15 characters
(bytes) name and a 6th character denoting the service for identifying resources on the NetBIOS network.
Sol: - Forward DNS lookup zones are using on internet to domain name to find IP address .
Sol: - Reverse DNS lookup zones are using on internet to IP address to find a domain name.
Sol: - The DHCP relay agent component is a boot strap protocol (boot TP) relay agent that relays dynamic host
configuration protocol messages between DHCP.
Sol: - A range of IP address that the DHCP server can assigned to client data that are on subnet.
Sol: -
Sol: -
• Allows a company to combine multiple ISDN connecting into single internet connection
Sol: - ICS stand for Internet Connection Sharing of software package content within the windows O/S. ICS allows you
to share network resources on a home computer network quickly and cheaply.
Sol: - Group policy is a feature of Microsoft window NT family of O/S that provides centralized management and
configuration of computers.
Sol: - The process of managing and automating the package, testing distribution and installation of software file and
applications to system across an enterprise network.
Sol: - The TRACERT command is used to visually see a network packet being sent and received and the amount of
hops required for that packet to get to its destination.
Q92. Why PING command is used for?
Sol: - The program is intended for use in networking measurement and management. This program contains facilities
send various kinds of program packets including ICMP Echo message process the replay and record elapsed time.
Sol: - IPConfig
Sol: - There are four domain levels that window server 2003 can operate
1. Windows Server 2003: - all Win2003, no other domain controller however even in this level the whole range of clients
and member server can join domain.
2. Window server 2003 interim: - NT 4.0 server and window server 2003 (no window 2000). This level arises when you
upgrade an NT 4.0 PDC to server 2003. Interim mode is important where you have NT4.0 groups with more than 5000
member. WIN 2000 doesn’t allow you to create more than group with more than 5000 user.
3. Window 2000 native: - (Yes WIN2000 native) allow 2000 and WIN 2003 (No NT4.0).
4. WIN 2000 mixed : - (Yes WIN2000 mixed) allow NT BDC and WIN 2000, naturally Win200 mixed is the default
function level because it support all types of domain controller.
Sol: - Trust are authentication pipelines that must be present in order for user in domain to access resources in another
domain.
Sol: - A transitive trust an automatic trust association between parent and child domain and between root domains in an
active directory.
Sol: - A non-transitive trust in bounded by the two domains in trust relationship and doesn’t flow to any other domain
in the forest.
Sol: - Routable protocol: - A communication protocol that contains a network address as well as a devices address. It
allow packet to be forward from one network to another network. Examples of routable protocol are TCP\IP, IPX, and
AppleTalk.
Non-routable protocol: - It contains only a device address and not a network address. It doesn’t interoperate an
addressing scheme for ending data from one network to another. Examples are NetBIOS and DEC’S LAT
Sol: -
3. Transitive trust
IP – Internet Protocol
Sol: -This file contains port numbers for well-known services defined by IANA
Echo 7/tcp
Echo 7/udp
daytime 13/tcp
daytime 13/udp
qotd 17/tcp quote Quote of the day
telnet 23/tcp
gopher 70/tcp
finger 79/tcp
uucp-path 117/tcp
sql-net 150/tcp
sqlsrv 156/tcp
rtsps 322/tcp
rtsps 322/udp
mftp 349/tcp
mftp 349/udp
microsoft-ds 445/tcp
microsoft-ds 445/udp
syslog 514/udp
talk 517/udp
ntalk 518/udp
ulp 522/udp
irc-serv 529/tcp
irc-serv 529/udp
monitor 561/udp
nntps 563/tcp snntp NNTP over TLS/SSL
whoami 565/tcp
whoami 565/udp