Networking Refers To The Total Process Of Creating And Using Computer Networks, With Respect To Hardware, Protocols And Software, Including Wired And Wireless Technology.
1.Define Network?
A network is a set of devices connected by physical media links. A network is recursively is a connectionof two or more nodes by a physical link or two or more networks connected by one or more nodes.
2.What is Protocol?
A protocol is a set of rules that govern all aspects of information communication.
3.What is a Link?
At the lowest level, a network can consist of two or more computers directly connected by some physicalmedium such as coaxial cable or optical fiber. Such a physical medium is called as Link.
4.What is a node?
A network can consist of two or more computers directly connected by some physical medium such ascoaxial cable or optical fiber. Such a physical medium is called as Links and the computer it connects iscalled as Nodes.
5.What is a gateway or Router?
A node that is connected to two or more networks is commonly called as router or Gateway. It generallyforwards message from one network to another.
6.Name the factors that affect the performance of the network?
a. Number of Usersb. Type of transmission mediumc. Hardwared. Software
7.What is Round Trip Time?
The duration of time it takes to send a message from one end of a network to the other and back, is calledRTT.
8.List the layers of OSI
a. Physical Layerb. Data Link Layerc. Network Layerd. Transport Layere. Session Layerf. Presentation Layerg. Application Layer.
9.Which layers are network support layers?
a. Physical Layerb. Data link Layer andc. Network Layers
10.Which layers are user support layers?
a. Session Layerb. Presentation Layer andc. Application Layer
11.What is Pipelining ?
In networking and in other areas, a task is often begun before the previous task has ended. This is knownas pipelining.
12.What is Piggy Backing?
A technique called piggybacking is used to improve the efficiency of the bidirectional protocols. When aframe is carrying data from A to B, it can also carry control information about arrived (or lost) framesfrom B; when a frame is carrying data from B to A, it can also carry control information about the arrived(or lost) frames from A.
13.What are the two types of transmission technology available?
(i) Broadcast and (ii) point-to-point
14.What is Bandwidth?
Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited rangeis called the bandwidth.
15.Explain RIP (Routing Information Protocol)
It is a simple protocol used to exchange information between the routers.
16.What is subnet?
A generic term for section of a large networks usually separated by a bridge or router.
17.What is MAC address?
The address for a device as it is identified at the Media Access Control (MAC) layer in the networkarchitecture. MAC address is usually stored in ROM on the network adapter card and is unique.
18.What is multiplexing?
Multiplexing is the process of dividing a link, the physical medium, into logical channels for betterefficiency. Here medium is not changed but it has several channels instead of one.
19.What is simplex?
It is the mode of communication between two devices in which flow of data is unidirectional. i.e. one cantransmit and other can receive.E.g. keyboard and monitor.
20.What is half-duplex?
It is the mode of communication between two devices in which flow of data is bi-directional but not at thesame time. i.e. each station can transmit and receive but not at the same time.E.g. walkie-talkies are half-duplex system.
21.What is full duplex?
It is the mode of communication between two devices in which flow of data is bi-directional and it occurssimultaneously. Here signals going in either direction share the capacity of the link.E.g. telephone
22.What is sampling?
It is the process of obtaining amplitude of a signal at regular intervals.
23.What is Asynchronous mode of data transmission?
It is a serial mode of transmission.In this mode of transmission, each byte is framed with a start bit and a stop bit. There may be a variablelength gap between each byte.
24.What is Synchronous mode of data transmission?
It is a serial mode of transmission. In this mode of transmission, bits are sent in a continuous streamwithout start and stop bit and without gaps between bytes. Regrouping the bits into meaningful bytes is theresponsibility of the receiver.
25.What are the different types of multiplexing?
Multiplexing is of three types. Frequency division multiplexing and wave division multiplexing is foranalog signals and time division multiplexing is for digital signals.
26.What are the different transmission media?
The transmission media is broadly categorized into two typesi)Guided media(wired)i)Unguided media(wireless)
27.What are the duties of data link layer?
Data link layer is responsible for carrying packets from one hop (computer or router) to the next. Theduties of data link layer include packetizing, addressing, error control, flow control, medium accesscontrol.
28.What are the types of errors?
Errors can be categorized as a single-bit error or burst error. A single bit error has one bit error per dataunit. A burst error has two or more bits errors per data unit.
29.What do you mean by redundancy?
Redundancy is the concept of sending extra bits for use in error detection. Three common redundancymethods are parity check, cyclic redundancy check (CRC), and checksum.
30.Define parity check?
In parity check, a parity bit is added to every data unit so that the total number of 1s is even (or odd forodd parity).Simple parity check can detect all single bit errors. It can detect burst errors only if the totalnumber of errors in each data unit is odd. In two dimensional parity checks, a block of bits is divided intorows and a redundant row of bits is added to the whole block.
31.Define cyclic redundancy check (CRC).
C RC appends a sequence of redundant bits derived from binary division to the data unit. The divisor inthe CRC generator is often represented as an algebraic polynomial.
32.What is hamming code?
The hamming code is an error correction method using redundant bits. The number of bits is a function ofthe length of the data bits. In hamming code for a data unit of m bits, we use the formula 2r >= m+r+1 todetermine the number of redundant bits needed. By rearranging the order of bit transmission of the dataunits, the hamming code can correct burst errors.
33.Define stop and wait ARQ.
In stop and wait ARQ, the sender sends a frame and waits for an acknowledgement from the receiverbefore sending the next frame.
34.What do you mean by network control protocol?
Network control protocol is a set of protocols to allow the encapsulation of data coming from networklayer protocol that requires the services of PPP
35.What do you mean by CSMA?
To reduce the possibility of collision CSMA method was developed. In CSMA each station first listen tothe medium (Or check the state of the medium) before sending. It can’t eliminate collision.
36.What do you mean by Bluetooth?
It is a wireless LAN technology designed to connect devices of different functions such as telephones,notebooks, computers, cameras, printers and so on.
37.What is IP address?
The internet address (IP address) is 32bits that uniquely and universally defines a host or router on theinternet. The portion of the IP address that identifies the network is called netid. The portion of the IPaddress that identifies the host or router on the network is called hostid.
38.What do you mean by ALOHA ?
It is the method used to solve the channel allocation problem .It is used for:i)ground based radio broadcastingii)In a network in which uncoordinated users are competing for the use of single channel.It is of two types:1.Pure aloha2.Slotted aloha
39.What is Firewalls?
It is an electronic downbridge which is used to enhance the security of a network. It’s configuration hastwo components.i)Two routersii)Application gateway
the packets traveling through the LAN are inspected here and packets meeting certain criteria are forwarded and others are dropped.
40.What is Repeaters ?
A receiver receives a signal before it becomes too weak or corrupted, regenerates the original bit pattern,and puts the refreshed copy back onto the link. It operates on physical layer of OSI model.
41.What is Bridges?
They divide large network into smaller components. They can relay frames between two originallyseparated LANs. They provide security through partitioning traffic. They operate on physical and data linklayer of OSI model.
42.What is ICMP?
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hostsand gateways to send notification of datagram problems back to the sender. It uses the echo test / reply totest whether a destination is reachable and responding. It also handles both control and error messages.
43.What is FDM?
FDM is an analog technique that can be applied when the bandwidth of a link is greater than the combinedbandwidths of the signals to be transmitted.
44.What is WDM?
WDM is conceptually the same as FDM, except that the multiplexing and demultiplexing involve lightsignals transmitted through fiber optics channel.
45.What is TDM?
TDM is a digital process that can be applied when the data rate capacity of the transmission medium isgreater than the data rate required by the sending and receiving devices.
46.List the steps involved in creating the checksum?
a. Divide the data into sectionsb. Add the sections together using 1's complement arithmeticc. Take the complement of the final sum, this is the checksum.
47.Compare Error Detection and Error Correction?
The correction of errors is more difficult than the detection. In error detection, checks only any error hasoccurred. In error correction, the exact number of bits that are corrupted and location in the message areknown. The number of the errors and the size of the message are important factors.
48.What are the protocols in application layer ?
The protocols defined in application layer are• TELNET• FTP• SMTP• DNS
49.What are the protocols in transport layer ?
The protocols defined in transport layer are• TCP• UDP
50.What do you mean by client server model ?
In client server model ,the client runs a program to request a service and the server runs a program toprovide the service. These two programs communicate with each other. One server program can provideservices to many client programs.
51.What is TELNET ?
TELNET is a client –server application that allows a user to log on to a remote machine, giving the useraccess to the remote system. TELNET is an abbreviation of terminal Network.
52.What is Hypertext Transfer Protocol(HTTP) ?
It is the main protocol used to access data on the World Wide Web .the protocol transfers data in the formof plain text, hypertext,audio,video,and so on. It is so called because its efficiency allows its use in ahypertext environment where there are rapid jumps from one document to another.
53.What is World Wide Web ?
World Wide Web is a repository of information spread all over the world and linked together. It is a uniquecombination of flexibility,portability,and user-friendly features .The World Wide Web today is adistributed client-server service,in which a client using a browser can access a service using a server. Theservice provided is distributed over many locations called web sites.
54.What is Beaconing?
The process that allows a network to self-repair networks problems. The stations on the network notify theother stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ringand FDDI networks.
55.What is RAID?
A method for providing fault tolerance by using multiple hard disk drives.
56.What is NETBIOS and NETBEUI?
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remotecomputer and it hides the networking hardware from applications.NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM forthe use on small subnets.
57.What is difference between ARP and RARP?
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physicaladdress, used by a host or a router to find the physical address of another host on its network by sending aARP query packet that includes the IP address of the receiver.The reverse address resolution protocol (RARP) allows a host to discover its Internet address when itknows only its physical address.
58.What is the minimum and maximum length of the header in the TCP segment and IP datagram?
The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.
59.What are major types of networks and explain?
Server-based network: provide centralized control of network resources and rely on server computers toprovide security and network administrationPeer-to-peer network: computers can act as both servers sharing resources and as clients using theresources.
60.What are the important topologies for networks?
BUS topology: In this each computer is directly connected to primary network cable in a single line.Advantages: Inexpensive, easy to install, simple to understand, easy to extend.STAR topology: In this all computers are connected using a central hub.Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physicalproblems.RING topology: In this all computers are connected in loop.Advantages: All computers have equal access to network media, installation can be simple, and signal doesnot degrade as much as in other topologies because each computer regenerates it.
61.What is mesh network?
A network in which there are multiple network links between computers to provide multiple paths for datato travel.
62.What is difference between baseband and broadband transmission?
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadbandtransmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.
63.What is packet filter?
Packet filter is a standard router equipped with some extra functionality. The extra functionality allowsevery incoming or outgoing packet to be inspected. Packets meeting some criterion are forwardednormally. Those that fail the test are dropped.
64.What is traffic shaping?
One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at auniform rate, congestion would be less common. Another open loop method to help manage congestion isforcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.
65.What is multicast routing?
Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.
66.What is Kerberos?
It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos usesencryption to prevent intruders from discovering passwords and gaining unauthorized access to files.
67.What is passive topology?
When the computers on the network simply listen and receive the signal, they are referred to as passivebecause they don’t amplify the signal in any way. Example for passive topology - linear bus.
68.What are the advantages of Distributed Processing?
a. Security/Encapsulationb. Distributed databasec. Faster Problem solvingd. Security through redundancye. Collaborative Processing
69.Name the factors that affect the reliability of the network?
a. Frequency of failureb. Recovery time of a network after a failure
70.When a switch is said to be congested?
It is possible that a switch receives packets faster than the shared link can accommodate and stores in itsmemory, for an extended period of time, then the switch will eventually run out of buffer space, and somepackets will have to be dropped and in this state is said to congested state.
71.Explain hidden shares. How do they work?
Hidden or administrative shares are share names with a dollar sign ($) appended to their names.Administrative shares are usually created automatically for the root of each drive letter. They do notdisplay in the network browse list.
72.Name of seven layers in Open System Interconnection model.
They are Application, Presentation, Session, Transport, Network, Data link, and Physical.
73.What is the difference between ARP and RARP?
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physicaladdress, used by a host or a router to find the physical address of another host on its network by sending aARP query packet that includes the IP address of the receiver. The reverse address resolution protocol(RARP) allows a host to discover its Internet address when it knows only its physical address.
74.What is Client/Server?
Clients and Servers are separate logical entities that work together over a network to accomplish a task.Many systems with very different architectures that are connected together are also called Client/Server.
75.What is MAC address?
It is the 48 bit hardware address of LAN card. MAC address is usually stored in ROM on the network adaptercard and it is unique.
76.What are the perquisites to configure server?
LAN card should be connected:
Root (partition on which window is installed) should in NTFS
Server should be configured with a static IP address.
77.How we will configure ADS?
Start ==> RUN ==> DCPROMO.
78.How will you test LAN card?
Ping 127.0.0.1
If getting reply its fine.
79.What are the difference between DOMAIN and WORKGROUP?
Workgroup:
(I)Every PC is responsible for its security own.
(ii)No centralize administration
(iii)Main aim to save hardware recourse
(iv)Best suite in school, training institute, cyber café
Domain:
(I)Server is responsible for data safety.
(ii)Centralize administration
(iii)Main aim is to secure data
(iv)Best suite in company environments
80.Which command is used to check the IP address of your system?
ipconfig.
81.Which command is used to check the physical connectivity between two computers?
Ping.
82.What is map drive?
A special feature that will map network resource to my computer.
83.What is Proxy Server?
Most large businesses, organizations, and universities these days use a proxy server. This is a server thatall computers on the local network have to go through before accessing information on the Internet. Byusing a proxy server, an organization can improve the network performance and filter what usersconnected to the network can access.
84.Which folder contains ADS installed on server?
NTDS.
85.What is the full form of Internet?
International Networking.
86.In which partition Linux is installed ?
Linux doesn’t support windows file system that contain partition scheme. It (Linux) has its own filesystem known as ext2, and ext3. it will install only on it. In Linux file system it will install on / (root)partition.
87.What is size of SWAP ?
It’s the hard disk space that is used as RAM for fast processing. In window it’s known as virtual memoryand could be set as per retirement via this path .
My Computer ==> properties ==> advance
88.What is full form of C.M.O.S ?
Complementary metal oxide semiconductor
89.How will you check ip address without using network place ?
Start ==> Run ==> Command ==>ipconfig.
90.What is IP?
Internet Protocol (IP) is an unreliable, best effort delivery, connectionless protocol used for transmittingand receiving data between hosts in a TCP/IP network.
91.What are the difference between hub and switch?
Hub is a layer 1 device. It will out the signal from all of its port except the one from where its insert. It isunable to detect the collision. It works on single collision and single broadcast domain. Switch is layer 2device. It maintains a CAM table that store the MAC address of devices attached on its port. CAM table isused to make the forwarding decision. It works on per port collision and single broadcast domain.
92.What is layer?
Layer is a completely logical partition of PDU (protocol data unit) process. That define how theinformation is travel form one computer to other over the network.
93.What is TCP/IP?
It is combination of two protocols TCP and IP. It is used for reliable data transfer.
94.What is operating system?
An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded intothe computer by a boot program, manages all the other programs in a computer. It provides a platform toapplication software.
95.What is package software?
The collection of mostly used software released in package Form Company. For Example MsOffice thatcontain word, power point, Excel, etc.
96.Full form of .co. in, .com
COM ".com" stands for "commercial".
NET ".NET" stands for "network"
ORG ".org" stands for "organization"
INFO ".info" stands for "information"
BIZ ".biz" stands for "business".
IN 'IN' stands for India. The 'IN' is a 2letter country code for India.
97.What is ring topology?
In a ring topology, device one connects to device two, device two connects to device three, and so on tothe last device, which connects back to device one.
98.Which cable is used in LAN?
Generally coaxial and TP media is used in LAN networking.
99.What are Difference between STP and UTP?
STP cable is mostly used by IBM? it has an extra cover over each pair.
UTP cable is used in star topology. It has a single cover over all pair.
100.Full form of ping.
PING stand for Packet Internet Grouper.
101.What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
10Base2— An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that usesbaseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments.10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that usesbaseband signaling, with 5 continuous segments not exceeding 100 meters per segment.10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that usesbaseband signaling and twisted pair cabling.
102.What is the difference between an unspecified passive open and a fully specified passive open?
An unspecified passive open has the server waiting for a connection request from a client. A fullyspecified passive open has the server waiting for a connection from a specific client.
103.Explain the function of Transmission Control Block?
A TCB is a complex data structure that contains a considerable amount of information about eachconnection.
104.What is a Management Information Base (MIB)?
A Management Information Base is part of every SNMPmanaged device. Each SNMP agent has the MIBdatabase that contains information about the device's status, its performance, connections, andconfiguration. The MIB is queried by SNMP.
105.What is anonymous FTP and why would you use it
Anonymous FTP enables users to connect to a host without using a valid login and password. Usually,anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user'sID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files onthe host without having to go to the trouble of setting up logins for them all. Anonymous FTP systemsusually have strict controls over the areas an anonymous user can access.
106.What is a pseudo tty?
A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without apseudo tty, no connection can take place.
107.What does the Mount protocol do?
The Mount protocol returns a file handle and the name of the file system in which a requested file resides.The message is sent to the client from the server after reception of a client's request.
108.What is External Data Representation?
External Data Representation is a method of encoding data within an RPC message, used to ensure that thedata is not system dependent.
109.When were OSI model developed and why its standard called 802.XX and so on?
OSI model was developed in February1980 that why these also known as 802.XX Standard (Notice 80means ==> 1980, 2means ==> February)
110.What is Full form of ADS?
Active Directory Structure
111.Where do we use cross and standard cable?
Computer to computer ==> cross
Switch/hub to switch/hub ==>cross
Computer to switch/hub ==>standard
112.How many pins do serial ports have?
In computer it's known as com port and could be available in 9pin or 25 pin. On router it have 60 pins.
113.What is IP?
It's a unique 32 bits software address of a node in a network.
114.What is private IP?
Three ranges of IP addresses have been reserved for private address and they are not valid for use on theInternet. If you want to access internet with these address you must have to use proxy server or NATserver (on normal cases the role of proxy server is played by your ISP.).If you do decide to implement aprivate IP address range, you can use IP addresses from any of the following classes:
Class A 10.0.0.0 10.255.255.255
Class B 172.16.0.0 172.31.255.255
Class C 192.168.0.0 192.168.255.255.
115.What is public IP address?
A public IP address is an address leased from an ISP that allows or enables direct Internet communication.
116.What's the benefit of subnetting?
Reduce the size of the routing tables.
Reduce network traffic. Broadcast traffic can be isolated within a single logical network.
Provide a way to secure network traffic by isolating it from the rest of the network.
117.What are the differences between static ip addressing and dynamic ip addressing?
With static IP addressing, a computer (or other device) is configured to always use the same IP address.With dynamic addressing, the IP address can change periodically and is managed by a centralized networkservice
118.What is APIPA?
Automatic private IP addressing (APIPA) is a feature mainly found in Microsoft operating systems.APIPA enables clients to still communicate with other computers on the same network segment until an IPaddress can be obtained from a DHCP server, allowing the machine to fully participate on the network.The range of these IP address are the 169.254.0.1 to 169.254.255.254 with a default Class B subnet maskof 255.255.0.0.
119.What are the LMHOSTS files?
The LMHOSTS file is a static method of resolving NetBIOS names to IP addresses in the same way thatthe HOSTS file is a static method of resolving domain names into IP addresses. An LMHOSTS file is atext file that maps NetBIOS names to IP addresses? it must be manually configured and updated.
120.What is DHCP scope?
A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given subnet.
121.What is FQDN?
An FQDN contains (fully qualified domain name) both the hostname and a domain name. It uniquelyidentifies a host within a DNS hierarchy.
122.What is the DNS forwarder?
DNS servers often must communicate with DNS servers outside of the local network. A forwarder is anentry that is used when a DNS server receives DNS queries that it cannot resolve locally. It then forwardsthose requests to external DNS servers for resolution.
123.Which command will you use to find out the name of the pc in networks?
NSLOOKUP [192.168.0.1]
[Ip of target computer].
124.What do you need to do that your browser will point URL www.example.com to the internal IP address 127.99.11.01?
Make changes in the hosts file in C:\WINDOWS\system32\drivers\etc The Hosts file is looked at firstbefore going out to the DNS (Domain Name Service) servers. you have to put the following on new linesat the end of hosts file:
127.99.11.01 example.com
127.99.11.01 www.example.com
125.What can you suggest to enhance testing process on windows OS?
Put shortcut to notepad.exe in Send To folder. It is speed up work with different files like hosts,configuration
files. Location of this folder is
C:\Documents and Settings\Default User\send to.
Open it and create shortcut of notpad.exe
126.What is FTP?
FTP is short for File Transfer Protocol. This is the protocol used for file transfer over the Internet.
127.Where do you take back up from?
Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Backup.Bedside's it?
If OS support then Select Drive ==> properties ==> back up now
128.What is router?
Router is a device that is used to connect two different networks.
129.How will you configure ADS?
Start ==> Run ==> DCPROMO
Or
Start==> Configure your server ==> add/Remove a Role
130.What is ADS?
A central component of the Windows platform, Active Directory service provides the means to manage theidentities and relationships that make up network environments.
131.What if this wizard (ADS) is not running?
Check the network cable it should be plugged
Check root partition it should be in NTFS
Check IP of server it should be configured statically.
132.What are the client configurations?
On Server Configure ADS (for example it’s configured with xyz.com)
On Client
Log in form local administrator account
My Computer ==> Properties ==> Computer Name ==> Change
==>Domain ==>xyz.com ==> username Administrator (of xyz.com)
Password xxxxxxxxxxx (of admin of xyz.com)
Welcome to xyz.com ==> Restart the computer.
133.Does it necessary to use administrator account to configure the client?
Not every time but you are required a properly configured user account in domain controller security policy.
134.ISO stands for?
International standard organization.
135.OSI stand for?
Open System Interconnection.
136.What is full form DHCP and how will l you configure it?
Dynamic host configuration protocol. To configure it on Server
Configure your server ==>Add/Remove a role ==>DHCP server ==>complete the wizard
Start ==> Administrative tools ==> DHCP ==>New scope ==> Wizard
Now authorized this server and do activate it On client
Local area network ==> tcp/ip ==> obtain ip automatically
Obtain DNS automatically.
137.What is difference between physical and logical topology?
A physical topology describes how devices are physically cabled together. A logical topology describeshow devices communicate across the physical topology
138.How many types of topology are available?
A point to point topology has a single connection between two devices.
In a star topology, a central device has many point to point connections to other devices.
A bus topology uses a single connection or wire to connect all devices.
In a ring topology, device one connects to device two, device two connects to device three, and so on to thelast device, which connects back to device one.
139.Why do we do networking?
For data sharing
To accumulate hardware resource.
140.What are the benefits of networking?
There are lots of advantages from build up a network, but the three big facts are
File Sharing
From sharing files you can view, modify, and copy files stored on a different computer on the network justas easily as if they were stored on your computer.
Resource Sharing
Resources such as printers, fax machines, Storage Devices (HDD, FDD and CD Drives), Webcam,Scanners, Modem and many more devices can be shared.
Program Sharing
Just as you can share files on a network, you can often also share program on a network. For example, ifyou have the right type of software license, you can have a shared copy of Microsoft Office, or some otherprogram, and keep it on the network server, from where it is also run.
141.What is network?
A network is basically all of the components (hardware and software) involved in connecting computersacross small and large distances.
142.What is networking?
A process that is describes how the network will connect.
143.What is topology?
A topology defines how the devices are connected. Further it is divided in physical and logical topology.
144.What is a subnet mask?
Subnet mask is a 4 byte (32 bit) number used to identify the sub network ID and the host ID from an IPaddress. All the hosts in a sub network will have the same subnet mask. E.g. 255.255.255.0,255.255.127.0, 255.255.0.0
145.How can group policy be refreshed?
1. Restart the server
2. Leave the server ideal for 90 minute
3. Run ==> gpupdate (server 2003 only)
146.What is LILO?
LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory, and tell thesystem which partition and hard drive to boot from.
147.What's the difference between local, global and universal groups?
Domain local groups assign access permissions to domain groups for local domain resources. Globalgroups provide access to resources in entire domains.
148.What's the major difference between FAT and NTFS on a local machine?
FAT and FAT32 provide no security over locally loggedon users. Only native NTFS provides extensivepermission control on both remote and local files.
149.What is presentation layer and how it is responsible for in the OSI model?
The presentation layer establishes the data format prior to passing it along to the network application'sinterface. TCP/IP networks perform this task at the application layer.