Packaging is the process of connecting a microprocessor with a computers motherboard. Reduced instruction Set Computer RisC. RisC became a popular technology buzzword in the s, and many processors used in the enterprise business segment were RisC-based.
Pentium III processors had for the most part. Pentium 4 processors, on the other hand, start at KB. What are the differences between intel Celeron and Pentium family of Processors?
Celeron According to Build Gaming Computers, Celeron processors are the low-end processor intended for standard home computer use. Scinet reports the best Celeron processor has an L2 Cache of kb, a clock speed limit of about 2. Pentium the top Pentium processor is the Pentium 4 Prescott.
Hyper-threading is a technology developed to help make better use of spare processing cycles. Hyper-threaded processors have a duplicate set of registers, small spaces of high-speed memory storage used to hold the data that is currently needed to execute a thread. When a CPU core is delayed, waiting for data to be retrieved from another place in memory, it can use these duplicate registers to spend the spare computation cycles executing a different thread.
While small and light on energy use, Atom processors can handle the most common tasks, such as email and instant messaging. Which is the processor suitable from intel family of processors for Server and Workstation? What are the latest Processor of intel and AMD? Socket is developed by AMD. It supports a maximum of how many bits of computing? What are the the different processors of AMD is suitable for this socket?
Which type of socket is needed to connect a dual core processor of intel? Socket LGA What is Heat Sink? What is its use? If it is not in the system what will happen? A heat sink is a component used to lower the temperature of a device. It is most commonly there on the microprocessor.
If it is not properly fixed the system, the system will shutdown automatically to prevent further damage to the processor. A CPU fan should be placed in system. To make the system cool and more functioning. Upgrading a microprocessor is just physically replacing a processor with a new one.
We also have to make sure that the motherboard has the internal logic to support the processor. What is the use of Conventional memory in the system? It is also called doS memory or Base memory. It is also known as RAM. This is the part of the computer that stores operating system software, software applications and other information for the central processing unit CPU. What is Cache memory? What is the advantage if a processor with more cache memory you are using? Cache memory is the memory area between RAM and Processor.
If cache memory increases the speed of the system will also improved. What are the different types of RAM? What are the different DRAM types? DDR 2 incorporates several technological upgrades to computer system memory, as well as an enhanced data rate. It operates at a lower voltage than DDR-I as well: 1. Video adapter or video system uses VRAM. VRAM is dual ported.
It is costly. It is a less expensive approach to graphics functions. Most commonly all low cost graphics cards are using it. It is a smaller version of a dual in-line memory module DIMM.
It is the type of the memory module can be used in laptop. Which is the memory packaging suitable for a sub-note book system? Micro DIMM.
EPP is for non-printer peripherals. ECP is for printers and scanners. What is over clocking? Over clocking is the process of forcing a computer component to run at a higher clock rate. What is memory bank?
Sets of physical memory modules is referred to as memory banks. A memory bank serves as a repository for data, allowing data to be easily entered and retrieved. What is Upgrading the memory? Adding a memory module to the existing bank on the available slot or replacing the previous one with the increased memory size is also called upgrading memory.
This will surely increase the performance of the computer. The root label is a null string empty string. In this tree, all the labels have a different name, which guarantee the uniqueness of the domain names. A full domain name is a sequence of labels separated by dots. The domain names are always read from the node up to the root. If a label is terminated by a null string or empty string, it is called a fully qualified domain name FQDN. If a label is not terminated by a null string, it is called a partially qualified domain name PQDN.
A PQDN starts from a node, but it does not end with the root. Formula: Where PI and P2 are the variable and the powers of a signal at points 1 and 2, respectively.
This noise may corrupt the signal. Thermal noise is produced due to the random motion of electrons in a wire which creates an extra signal not originally sent by the transmitter. Induced noise comes from sources such as motors and other electronic appliances.
These devices act as a sending antenna, and the transmission medium acts as the receiving antenna. Crosstalk is the effect of one wire on the other. Impulse noise comes from power lines, lightning etc. An Internet Protocol address IP address is a numerical label assigned to each device e. Desktop Support Interview Questions. Hub is a layer 1 device. It is unable to detect the collision.
It works on single collision and a single broadcast domain. Switch is layer 2 device. CAM table is used to make the forwarding decision. It works on per port collision and single broadcast domain. Layer is a completely logical partition of PDU protocol data unit process.
That define how the information travels from one computer to another over the network. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list. Network Administrator Interview Questions. The address resolution protocol ARP is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP uery packet that includes the IP address of the receiver.
The reverse address resolution protocol RARP allows a host to discover its Internet address when it knows only its physical address. Clients and Servers are separate logical entities that work together over a network to accomplish a task. It is the 48 bit hardware address of LAN card. Hardware design Interview Questions. Most large businesses, organizations, and universities these days use a proxy server.
This is a server that all computers on the local network have to go through before accessing information on the Internet. By using a proxy server, an organization can improve the network performance and filter what users connected to the network can access.
Telephone Etiquette Interview Questions. It Linux has its own file system known as ext2, and ext3. A transport protocol designed by Microsoft and IBM for the use on small subnets. An anti-virus program must be installed on all servers and workstations to ensure protection.
You can plug in their removable hard drives or flash drives. Ethernet is one of the popular networking technologies used these days. It was developed during the early s and is based on specifications, as stated in the IEEE. Ethernet is used in local area networks. In case one workstation on the network suffers a malfunction, it can bring down the entire network.
Another drawback is that when there are adjustments and reconfigurations needed to be performed on a particular network, the entire network must be temporarily brought down. Multicast routing is a targeted form of broadcasting that sends a message to a selected group of the user instead of sending it to all users on a subnet. Encryption is the process of translating information into a code that is unreadable by the user.
It is then translated back or decrypted back to its normal readable format using a secret key or password. Encryption ensures that information that is intercepted halfway would remain unreadable because the user must have the correct password or key for it. IP addresses are displayed as a series of four decimal numbers that are separated by period or dots. Another term for this arrangement is the dotted-decimal format. An example is It is normally performed using a username and password. This provides a secure means of limiting access from unwanted intruders on the network.
This is a mode of data exchange wherein two communicating computers do not use IPsec themselves. Instead, the gateway that is connecting their LANs to the transit network creates a virtual tunnel. So, it uses the IPsec protocol to secure all communication that passes through it.
The mesh topology has a unique network design in which each computer on the network connects to every other. It is developing a P2P point-to-point connection between all the devices of the network.
It offers a high level of redundancy, so even if one network cable fails, data still has an alternative path to reach its destination.
Partial Mesh Topology: In this type of topology, most of the devices are connected almost similarly as full topology. The only difference is that few devices are connected with just two or three devices. Full Mesh Topology: In this topology, every node or device are directly connected with each other.
A large percentage of a network is made up of hardware. Problems in these areas can range from malfunctioning hard drives, broken NICs, and even hardware startups. Incorrect hardware configuration is also one of those culprits to look into. A common way of dealing with such a problem is to use repeaters and hubs because it will help regenerate the signal and therefore prevent signal loss. Checking if cables are properly terminated is also a must.
Instead of having to visit each client computer to configure a static IP address, the network administrator can apply dynamic host configuration protocol to create a pool of IP addresses known as scopes that can be dynamically assigned to clients.
Profiles are the configuration settings made for each user. A profile may be created that puts a user in a group, for example. Sneakernet is believed to be the earliest form of networking wherein data is physically transported using removable media, such as disk, tapes. IEEE, or the Institute of Electrical and Electronics Engineers, is an organization composed of engineers that issues and manages standards for electrical and electronic devices.
This includes networking devices, network interfaces, cablings, and connectors. Rights refer to the authorized permission to perform specific actions on the network. Each user on the network can be assigned individual rights, depending on what must be allowed for that user. A VLAN is required because at the switch level. There is only one broadcast domain. It means whenever a new user is connected to switch.
This information is spread throughout the network. VLAN on switch helps to create a separate broadcast domain at the switch level. It is used for security purposes. At present, IPv4 is being used to control internet traffic but is expected to get saturated in the near future. IPv6 was designed to overcome this limitation.
It is the most commonly used public-key encryption algorithm in use today. Mesh topology is a setup wherein each device is connected directly to every other device on the network. Consequently, it requires that each device has at least two network connections. The maximum allowable length for a network segment using Base-FX is meters. The maximum length for the entire network is 5 kilometers. The rule is used in 10Base2 and 10Base5 Ethernet architectures. In this rule, there can be a maximum of five segments in a network connected with four repeaters.
Out of these five segments, only three segments can be populated with nodes. The decoder is a type of circuit that converts the encoded data to its original format. It also converts the digital signal into an analog signal. Brouter is also known as Bridge Router. It is a device that acts as both a bridge and a router.
As a bridge can forwards data between the networks. It also routes the data to specified systems within a network. Another useful tool is a Virtual Private Network VPN that enhances internet security by making your network available only to devices in your system.
When I was hired at my previous company, I noticed that the corporate Ethernet network was not protected by a firewall. I immediately downloaded a firewall software I knew from a reputable website, and I made sure to install it on all the computers of the network. Also, I instructed my colleagues on how to keep the software updated at all times.
This question is likely meant to assess your general knowledge of computer networking. Explain what the acronym stands for, but define the term in a specific way. However, HTTP protocol is designed in plain text, so any other person in the network could potentially see the data that your browser communicates to the server and vice versa. I wanted to upgrade it to the HTTPS protocol, to make sure that our client could browse it safely at all times. So I decided, together with my boss, to install an SSL certificate.
Related: Linux Administrator Resume Samples. Your interviewer may ask this question to test your knowledge of the technical language in the field. To impress them, you can use an accurate definition that includes how bandwidth is measured and the other factors that may affect the speed of an Internet connection. You can also add examples of situations where you improved or optimized bandwidth.
The more bandwidth a device has, the faster it will send and receive information. Bandwidth is a key factor in determining the speed of your internet connection, together with latency.
At my previous job, my coworkers always complained about the slowness of the internet connection. I also changed the position of the router to an area with a better signal. We immediately noticed improvements in the internet speed.
0コメント