Sunday, September 15, 2013

Top 7 exercises which help you to gain muscles,when starting gym after a duration.


    Top 7 exercises which help you to gain muscles,when starting gym after a duration.
    Many of us do workout,but unable to do it regularly or skip workout because of many excuses.
    Here i am discussing about how to gain muscle fast when you are practicing workout after a long duration.
    First of all you have to stick to your protein diet and repeat these exercises regularly atleast 10 to 15 days after starting your gym again.These all exercises are super muscle gaining & pump up excercises.
  1. Close Grip Chin Ups
  2. Flat Dumbbell Chest Press
  3. Seated Dumbbell Shoulder Press
  4. Incline Bicep Curls
  5. Squat
  6. Deadlifts
  7. Standing Calve Raises
    You can take pre workout meals as oatmeal,egg white,soya beans etc.Post workout meals must be starting with protein shakes & bars.
    You can also add 6 bananas,250 gm of potatoes,500 gm of chicken and 16 to 18 egg in your overall day diet.Minimum of 4 egg yolks are must in the process of gaining muscles.

Some Full form of computer terms essential for Banking exams.


            Some Full form of computer terms essential for Banking exams.
Since computer is a very necessary part of banking,and in competitive exams there is proper a section which deals with abbreviations related to computer glossary, so i am writing some of the most common abbreviated terms asked in many competitions.


* HTTP - Hyper Text Transfer Protocol.
* HTTPS - Hyper Text Transfer Protocol Secure.
* IP - Internet Protocol.
* URL - Uniform Resource Locator....
* USB - Universal Serial Bus.
* VIRUS - Vital Information Resource Under Seized.
* 3G - 3rd Generation.
* GSM - Global System for Mobile Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal Mobile Telecommunication
System.
* SIM - Subscriber Identity Module.
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
* AAC = Advanced Audio Coding
* GIF = Graphic InterchangeableFormat
* JPEG = Joint Photographic ExpertGroup
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (Microsoft Corporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
* CD - Compact Disk.
* DVD - Digital Versatile Disk.
* CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI - Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - UninterruptiblePower Supply.
* HSDPA - High Speed Downlink Packet Access.
* EDGE - Enhanced Data Rate for GSM [Global System for Mobile
Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General Packet Radio Service.
* WAP - Wireless Application Protocol.
* TCP - Transmission Control Protocol .
* ARPANET - Advanced Research Project Agency Network.
* IBM - International Business Machines.
* HP - Hewlett Packard.
* AM/FM - Amplitude/ Frequency Modulation.
* WLAN - Wireless Local Area Network.

Top 10 Bodybuilding Suppliments.


    Top 10 Bodybuilding Suppliments.
    Bodybuilding is not just a matter of interest now,it became a giant business and personality quote for an individual.
    Here i am describing top 10 suppliments which have very less side effects and gives you a lot of strength,stamina and muscle mass.
  1. Creatine monohydrate
  2. Whey/albuemen/soya/casein protein
  3. Mahuang
  4. Vanadyl
  5. Leucine
  6. Beta-Ecdysterone

  7. Alpha-Ketoglutarate

  8. Ketoisocaporate (KIC)

  9. Hydroxicritic acid (HCA)

  10. Ornithine alpha-ketoglutarate (OKG)

Sunday, March 10, 2013

Top 25 Workout Songs


Top 25 Workout Songs

Workout or exercise is very necessary part of every human beings’s life. It fits us healthy and gives motivation to go ahead in life, but some time workout itself needs motivation too. And what better motivator is there than music?  Motivation is the key to keeping you primed to keep pushing heavy weight in the gym.

Here are the top 25 workout songs which is loved by most of the body builders during workout.

1. Eye of the Tiger – Survivor

2. Lose Yourself – Eminem 

3. Work Hustle, Kill – Rob Bailey & The Hustle Standard

4. Can’t Be Touched – Body Head Bangerz 

5. Good Feeling – Flo Rida

6. Hungry – Rob Bailey & The Hustle Standard

7. Back In Black – AC/DC 

8. Till I Collapse – Eminem

9. Gonna Fly Now (Rocky 1 Theme) – Bill Conti 

10. Mama Said Knock You Out – LL Cool J 

11. Killing in the Name – Rage Against The Machine 

12. You Shook Me All Night Long – AC/DC 

13. Hit ‘Em Up – Tupac – 

14. Face the Pain – Stemm 

15. Fade To Black – Metallica 

16. No Matter What – T.I.

17. Back For More – Five Finger Death Punch 

18. Bringing Down The Giant – Saving Abel 

19. Let’s Go – Calvin Harris feat. Ne-Yo

20. It’s A Long Way to the Top – AC/DC 

21. Shut ‘Em Down – LL Cool J

22. Monster - Skillet

23. Break Stuff - Limp Bizkit 

24. Big Things Poppin’ – T.I. 

25. Click Click Boom – Saliva

Did you like these list of music specially for gym lovers? If Yes, then share with us via your comments…

 

 

 

 

Friday, March 8, 2013

How famous Brand Names were created.


How famous Brand Names were created..??

APPLE COMPUTERS:- It was the favorite fruit of founder Steve Jobs. He was three months late in filing a name for the business, and he threatened to call his company Apple Computers if the other colleagues didn't suggest a better name by 5 O'clock that evening.

MERCEDES:- This was actually the financier's daughter's name.

ADOBE:- This came from name of the river Adobe Creek that ran behind the house of founder John Warnock.

CISCO:- It is not an acronym as popularly believed.
It is short name for San Francisco.

COMPAQ:- This name was formed by using COMp, for computer, and PAQ to denote a small integral object.

COREL:- The name was derived from the founder's name Dr. Michael Cowpland. It stands for COwpland Research Laboratory.

GOOGLE:- The name started as a joke boasting about the amount of information the search-engine would be able to search. It was originally named 'Googol', a word for the number represented by 1 followed by 100 zeros. After founders- Stanford graduate students Sergey Brin and Larry Page presented their project to an angel investor, they received a cheque made out to 'Google' ...thus the name.

HOTMAIL:- Founder Jack Smith got the idea of accessing e-mail via the web from a computer anywhere in the world. When Sabeer Bhatia came up with the business plan for the mail service, he tried all kinds of names ending in 'mail' and finally settled for hotmail as it included the letters "html" - the programming language used to write web pages. It was initially referred to as HoTMaiL with selective uppercasing.

HEWLETT PACKARD:- Bill Hewlett and Dave Packard tossed a coin to decide whether the company they founded would be called Hewlett-Packard or Packard-Hewlett.

INTEL:- Bob Noyce and Gordon Moore wanted to name their new company 'Moore Noyce'but that was already trademarked by a hotel chain so they had to settle for an acronym of INTegrated ELectronics.

Did you like these discovery names about these famous companies ? If Yes, then share with us via your comments…

 

 

 

Top 9 amazing health benefit of sleeping.


Top 9 amazing health benefit of sleeping.

Sleeping is one of the most fundamental routine of every living creature on this earth. Sleeping has its own benefits also .For humans , maximum of eight hours and minimum of 6 hours sleeping time is necessary to live a healthy life as said by the physicians. Here I am discussing about these benefits in detail.

1.   Improves your memory- Sleeping have a great effect over mind also it helps us to improve our memory power.

2.   Extends your life span- Life expectancy of human being is decreasing day by day less sleeping time is also a very genuine reason for that.

3.   Boosts your creativity- It also helps us to be more creative about our daily work routine.

4.   Strengthens your immune system- After a good sleep you feel refreshing and your immune has also very much active for all bacterial attacks.

5.   Reduces your risk to depression- Depression is also reduced by sleeping actually said depression occurs because of hyper tension and less sleeping habits.

6.   Improves your physical performance- After a great sleep body is fully ready to work in any environment and this increases your performance exponentially.

7.   Sharpens your attention- You are more attentive towards your goal if  you had a great sleep last night.

8.   Reduces your stress- It also reduces stress to its lower level to cool down body to revive for next day work.

9.   Help your body to heal yourself- All the healing process occurs in sleeping time only.

 

Did you like these useful knowledge about a good sleeping habits ? If Yes, then share with us via your comments…

 

Thursday, March 7, 2013

20 Best muscle building food which you must take after workout.


20 Best muscle building food which you must take after workout.

1. Beef- Beef is very high in protein and it takes rank first in our list because of that.

2.Eggs-Each egg contains protein content of 6 to 8 grams. Eggs are also rich in vitamins, zinc, iron and calcium making them one of the most complete muscle building foods available.

3. Chicken-You get 30 grams of protein from every 100 grams of chicken. They are easily available and can be cooked into many delicious delicacies. Try roasting or baking it for maximum benefits.

4. Water- Muscle building requires hydration. Our body is 70 percent water and muscle tissue is around 75 percent water. Hydration will increase strength, energy levels and help in digestion.

5. Fish oil- The anti-inflammatory benefits of fish oil help your body to recuperate faster from a heavy work. Fish oil also speeds up the metabolism rate so you are not only building muscle but losing fat too.

6. Quinoa - A great source of carbohydrates, a 100 grams serving of Quinoa packs 14 grams of protein along with essential amino acid. Its a superb muscle building food.

7. Oats- It is healthy, filling and provides the perfect blend of carbohydrates, fiber, protein, minerals and vitamins.

8. Pineapple- Pineapples contains a protein-digesting enzyme named bromelein in abundance. It also decreases muscle inflammation and thus is a great post-workout meal.

9. Spinach-Researchers at Rutgers University (2008) proved that the phytoecdysteroids found in spinach may increase muscle growth up to 20 percent. This makes it a great muscle building food.

10. Sweet Potato- Sweet potatoes have a slightly lower carbohydrate content than regular potatoes. One medium potato contains 26 grams of carbohydrates, while one medium sweet potato contains 23 grams of carbohydrates.
Sweet potatoes are an excellent source of vitamin A and a good source of potassium and vitamin C, B6, riboflavin, copper, pantothetic acid and folic acid. A medium sweet potato has 28% more potassium than a banana.They replenish energy stores and fuel the muscle-building process.

11. Wild Salmon- Wild salmon contains a powerful dose of omega-3 fatty acids and this makes wild salmon a super muscle building food. Eating salmon also boosts the metabolism.

12. Broccoli- Add broccoli to your post workout salad along with spinach, baby tomatoes, sweet corn and peppers. This is a great source of vitamins, minerals and fiber. Remember: minimal cooking!

13. Brown rice- Brown rice is a staple ingrediant in many body builder diets. This complex carbohydrate releases energy in a sustained manner and thus, its very healthy. It is a great source of carbohydrates and can be consumed post workout.

14. Cottage Cheese- One cup of cottage cheese can pack 28 grams of protein. The protein breaks down slowly and leaves you feeling fuller for a longer time.

15. Chocolate Milk- Its true! Chocolate milk can help you build more muscle. In a study published in the International Journal of Sports Nutrition and Exercise Metabolism, chocolate milk was just as effective as sports drinks at increasing total exercise output and delaying exhaustion.

16. Banana- Bananas have three types of sugars; Fructose, sucrose and glucose. These sugars are prime pre/post training eating item. Bananas are fat and cholesterol free, extremely portable and nutrient dense.

17. Lentils and Chickpeas- Who says you need to eat meat to fill up on protein? These vegetarian- and vegan-friendly foods offer the protein your muscles need without the high-impact carbohydrate rush that affects your insulin levels.

18. Almonds- Big things can come in small packages. Almonds provide a good source of protein and fat but it’s their vitamin E content that is most beneficial for your muscles. The powerful antioxidant fights free radicals and helps you recover quicker from your workouts.

19. Papaya- Papaya contains papain which breaks dietary protein into easily absorbable compounds.

20. Brown bread- It is also very useful when u are doing a very tiring workout.

Did you like these useful knowledge about these useful food items specially for body builders ? If Yes, then share with us via your comments…

 

 

Wednesday, March 6, 2013

List of some interpersonal Questionaires for all purposes.


List of some interpersonal Questionaires for all purposes.

Q. What is your biggest weakness.?

Ans-There are many answers for this question ,some of them are :-

Intelligent answer -
sir. My weakness is that whenever a task is given to me, i can not relax even a bit before completing it.

Straight answer -
i'll tell you sir, when i find one.

Simple answer -
i am not perfect. Thats the only weakness.

Quick answer - my weakness is sweets or chocolates.

Brilliant answer - sir, i sure have some weaknesses. But i am working on them sincerely and will soon turn them into strengths.

You can choose any of them.
The interviewer here wants to know that how well do you know yourself and whats your approach towards it.




Q. why should we hire you?

Ans- i have all the qualities this job needs, plus with my positive attitude and innovative mind, i assure you to give positive results in favor of the organization and will prove myself an asset for your bank.
Rest depends on you sir.



Q. Where do you see yourself after five years from now?

Ans. Here The interviewer wants to know your knowledge about career path in the job and what is your level of commitment to the job they are offering.

It should be answered realistically. Example of a horrible answer is "I will be in your seat after five years". Rather you should answer in such a way that ensures them that you are interested in making a long-term commitment towards the job and will have a long term and mutually beneficial association with them. For example "I am definitely interested in making a long-term commitment to my next position. This is exactly what I’m looking for and what I am very well qualified to do. I will do my job to the best of my ability and i am prepared to learn new things
and contribute to the overall success of the organization in a number of ways. I am confident that here i will have opportunities to advance my skills and provide best of my services to the organization. "

Did you like these useful knowledge about these interpersonal questions ? If Yes, then share with us via your comments…

 

 

Tuesday, March 5, 2013

How Long does things take to Decompose.


 

How Long does things take to Decompose.

Decomposition- It is a act and process of resolving parts of any body or substance into it’s basic aur elementary parts.it is also sometime called as decay.here is a list of some common household things which are hard to decay.

 

1.    Paper Towel - 2-4 weeks

2.    Banana Peel - 3-4 weeks

3.    Paper Bag - 1 month

4.    Newspaper - 1.5 months

5.    Apple Core - 2 months

6.    Cardboard - 2 months

7.    Cotton Glove - 3 months

8.    Orange peels - 6 months

9.    Plywood - 1-3 years

10.                       Wool Sock - 1-5 years

11.                       Milk Cartons - 5 years

12.                       Cigarette Butts - 10-12 years

13.                       Leather shoes - 25-40 years

14.                       Tinned Steel Can - 50 years

15.                       Foamed Plastic Cups - 50 years

16.                       Rubber-Boot Sole - 50-80 years

17.                       Plastic containers - 50-80 years

18.                       Aluminum Can - 200-500 years

19.                       Plastic Bottles - 450 years

20.                       Disposable Diapers - 550 years

21.                       Monofilament Fishing Line - 600 years

22.                       Plastic Bags - 200-1000 years

 

I know it is a very small piece of knowledge but this helps us a lot to identify the enemies of our environment.

This will create awareness among people and these are also one of the reasons related to Global Green House Effect.

Did you like these useful knowledge about these environmental hampering things ? If Yes, then share with us via your comments…

 

 

Monday, March 4, 2013

Some Desktop Engineer - IT Interview Questions.


Desktop Engineer - IT Interview Questions

1) What is Active Directory?
A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory.

2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records?
DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.

Forward lookup: Converting names to IP address is called forward lookup.

Reverse lookup: Resolving IP address to names is called reverse lookup.

'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.

'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.

3) What id DHCP? Why it is used? What are scopes and super scopes?

DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.

Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.

Superscope: When we combine two or more scopes together its called super scope.

4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.

Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different
in cross cable and normal LAN cable.
The theoretical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.

6) What would you use to connect two computers without using switches?
Cross cable.

7) What is IPCONFIG command? Why it is used?
IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.

8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?
When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.

9) What is a DOMAIN? What is the difference between a domain and a workgroup? 
Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administrator computers and we can govern them using common policies called group policies.
We can't do the same with workgroup.

10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003. 
http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp 

11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express used odb file.

12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "Last known good configuration".
If this doesn't work than boot the computer in safe mode. If it boots up than the problems with one of the devices or drivers.

13) What is RIS? What is Imaging/ghosting?
RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or imaging/ghosting because installing OS every time using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.

14) What is VPN and how to configure it?
VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the steps mentioned in the KB: http://support.microsoft.com/kb/305550

15) Your computer slowly drops out of network. A reboot of the computer
fixes the problem. What to do to resolve this issue?
Update the network card driver.

16) Your system is infected with Virus? How to recover the data?
Install another system. Install the OS with the lates patches, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.

17) How to join a system to the domain? What type of user can add a system to the domain?
Please visit the article below and read "Adding the Workstation to the Domain" http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologi /directory/

18) What is the difference between a switch and a hub?
Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.

19) What is a router? Why we use it?
Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.

20) What are manageable and non manageable switches?
Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable switches we can't do so.

Labels: Question Answer

 

ardware  networking interview questions  answers:

This is the best and updated collections of hardware  networking interview questions and answers:

What is the difference between Firewall and Proxy Server?

Firewall is used to protect internal IT infrastructure from being attacked from the internet. Cisco Pix or software solutions like Checkpoint and Microsoft ISA are firewall products and widely used today to protect internal IT infrastructure from Hackers.

Proxy Servers are used today for sharing the internet connections and protecting internal user information like IP address from the internet. Internal users in the company can access the internet with the same connection using the proxy server.

Typically cyber café owners and similar sized setups use proxies. Proxy servers work under application layer and firewall works under networking layer.

How to determine whether Exchange Server 2003 is running Standard or Enterprise Edition?

We can know this by event viewer. The following event id will generate when exchange server is installed.

Standard Edition: event 1216

EnterpriseEdition: event id 1217

What is the function of Nat?

The objective of NAT is used to enable the two way communication with internet of a machine which is not internet facing. This can be used to access home computer via broadband internet connection.

What are different editions of Windows 2003 Sever?

Standard Edition

Web Edition

EnterpriseEdition

Data center Edition

What is the active directory database name and where it is located?

The active directory database name is NTDS.Dit and located in c:\windows\ntds

What is the expansion if .Dit?

Dit-Directory Information Tree and scalable up to 70 TB.

What is active directory?

A central component of windows, used to manage, and administrator users, computers and printers in the network from active directory.

What is DNS? What is “forward lookup zone” and “reverse lookup zone”?

DNS is domain naming service and used to resolve host names to IP addresses and IP addresses to host names. The computer understands only numbers to communicate with each other. Its also easier way to make access websites by assigning names to websites.

When we use web address e.g. http://ittechjobs.net in browser, computer uses DNS for IP address to redirect the website.

Forward lookup: Converting names to IP address is called forward lookup.

Reverse lookup: Resolving IP address to names is called reverse lookup.

‘A’ record: It is called host record and it is used to map name to IP address. This is the record in DNS with the help of which DNS finds the host name.

‘MX’ Record: it is called mail exchanger record. It is the record needed to locate the mail servers in the network. This record is also found in DNS.

What is DHCP? What are scopes and super scopes?

DHCP: Dynamic host configuration protocol. It is used to allocate IP addresses to large number of PCs in a network environment.

Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.

Super scope: When we combine two or more scopes together it is called super scope.

What are the types of LAN cables?

LAN cables are classified into CAT 5 and CAT 6.CAT 5 Supports 100 MBPS of speed while CAT 6 supports 1 GBPS of speed.

What is the difference between LAN cable and Cross cable?

RJ45 connector connections are different in LAN cable as compared to cross cable.

E.g.:

Straight Cable

Pin 1 White\Orange Pin 1 White\Orange

Pin 2 Orange Pin 2Orange

Pin3 White\Green Pin3 White\Green

Pin4 Blue Pin4 Blue

Pin5 White\Blue Pin5 White\Blue

Pin 6 Green Pin 6 Green

Pin 7 Brown Pin 7 Brown

Pin 8 White\Brown Pin 8 White\Brown

Cross Cable:

Wire Becomes

1———————-3

2———————-6

3———————-1

6———————-2

By default the LAN Cable is 100 Meters but you may observe drop of signals after 80 Meters.

Cross cable is used to connect two computers without using switch.

Describe in brief about IPCONFIG Command?

This command displays the information about IP assigned to a computer. From the output we can know the information of IP address, DNS IP address and Gateway address assigned to that computer.

What is APIPA Range?

When DHCP server is unavailable, windows client computer assigns an IP address itself to communicate with other computers in the network.

APIPA stands for automatic private IP addressing. It is in the range of 169.254.X.X.

What are manageable and non manageable switches?
Manageable switches are those switches which can be administered so we can create VLAN etc while non manageable switches can not be managed.

Global Address List(GAL)

A list containing all Exchange users, contacts, Groups, Conferencing resources, and public folders in an organisation.
The list is retrieved from the global catalog servers in the active directory and is used by Outlook clients to address messages or find information about recipients within the organisation.

What is Lightweight Directory Access Protocol?

LDAP a Network protocol designed to work on TCP/IP stacks to exact information from a hierarchical directory such as x.500 and useful for searching through data to find a particular piece of information.

What is mail enabled?

An active directory object that has at least one email address is assigned.

What is message transfer agent?
(MTA) An exchange component that routes messages to other Exchange MTAs,information stores,connectors, and third-party gateways.Also referred to as X.400 protocol in Exchange 2000 System Manager.

What is namespace?
A set of names associated with a domain or forest that identifies objects that belong to the domain or forest.

Operation Master Types:

The following table lists the operation masters at the domain and forest levels. Only one domain controller in the domain or forest performs each role.

RID Master: RID master ensures domain wide unique relative IDs.One domain controller in each domain performs the role.The RID master allocates pools of IDs to each domain controller. When a DC has used all the IDs,it gets a new pools of IDs.

PDC Emulator: Emulates a Windows NT 4.0 primary domain controller (PDC).Replicates password changes within a domain.Ensures synchronized time within the domain (and between domains in the forest).

One domain controller in each domain performs this role.

Infrastructure Master: Tracks moves and renames of objects. Updates group membership changes.

Domain Naming Master: Ensures that domain names are unique. Must be accessible to add or remove a domain from the forest. One domain controller in the domain performs this role.

Schema Master: Maintains the active directory schema for the forest. One domain controller in the forest performs the role.

Operation Master roles are also called flexible single master operation FSMO server. These are domain controllers that perform operations on the network.

By default, the first domain controller in the forest holds all information masters. When you create a domain controller holds the three domain operation masters(RID master, PDC Emulator,Infrastructure Master).

Use Active Directory User and Computers to transfer RID Master,PDC Emulator, and Infrastructure master.

Use Active Directory Domains and Trusts to transfer the domain naming master.

Use Active directory Schema Snap-in to transfer the Schema Master.

Brief about Routing.

Routers can forward packets through an internet work by maintaining routing information in a database called a routing table. The routing table typically contains the address of all known networks and routing information about that network such as:

* Interface
* Routing Path
* Next Hop
* Route Metric (Cost)
* Route Timeout

Routers build and maintain their routing database by periodically sharing information with other routers. The exact format of these exchanges is based on the routing protocol. The routing protocol determines:

* The information contained in the routing table
* How messages are routed from one network to another
* How topology changes (i.e. updates to the routing table) are communicated between routers
*

Changes in routing information take some time to be propagated to all routers on the network. The term convergence is used to describe the condition when all routers have the same (or correct) routing information.

The following points illustrates about how a packet is addressed as it travels through an internet work.

* On an Ethernet network, the Data Link layer address is the MAC address. On an IP network, the IP address is the Network layer address.
* Both Data Link physical addresses and Network logical addresses are used.
* The Network address contains both a logical network address and a logical device address. IP (Network) addresses are contained in the IP header; MAC (Data Link) addresses are contained in the Ethernet frame header.
* Both the source and destination Network and Data Link addresses are typically contained in the packet.
* The Data Link destination address indicates the physical address of the next hop on the route.
* Data Link addresses in the packet change as the packet is delivered from hop to hop.
* The Network destination addresses indicate the address of the final destination device.
* Network addresses remain constant as the packet is delivered from hop to hop.
* A router uses the logical network address specified at the Network layer to forward messages to the appropriate LAN segment.

 

General Questions

Q. What desktop operating systems are you familiar with?
A. Before you answer this question, you should have some background information on what operating systems are used within the organization you are interviewing with. Undoubtedly, you will be asked to elaborate on your skill set with each of these operating systems so it’s best to tailor your elaboration to the operating systems that are relevant to the hiring manager. This being said, don’t leave out mentioning experience in other operating systems. You never know whether the company may be evaluating the migration to a different OS.

Q. Have you used imaging software before? How do you find these tools useful?
A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that you’ve used. Hiring managers want to assess your in-depth knowledge and experience with using these tools. This means talking about how you use their various feature sets. (If you have an opinion, you probably know the product pretty well.)

Q. What are the pitfalls of using imaging software?
A. This question is meant to assess how well you know these products. For example, discussing the importance of testing the image demonstrates that you use these tools on a regular basis.

Q. Have you used any software distribution tools? If so, which ones and how were they used?
A. Like imaging software, software distribution tools are an important part of your job. Hiring managers are looking for knowledge that these tools exist and how they can be used to support your organization.

Q. What do you like most about desktop support?
A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the job: being busy, working with different people, and the challenges of learning new operating systems and configurations.

Q. What do you like least about desktop support?
A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here would be not being able to resolve a problem in a timely manner for reasons outside your control, such as hardware failure. Stick to things outside of your control for the best response.

Q. When solving a desktop problem, do you prefer to work with the end-user, your peers, or on your own?
A. This is another question to determine your fit within the organization. Hiring managers understand that to be successful as a support technician you will have to work in a team environment. This means working with other employees, vendors, and end-users on a constant basis.

Q. Can you describe a situation where you have had to deal with a difficult person? How did you handle it? Would you do anything differently?
A. Desktop support can be very demanding some days. End-users only see their own priority needs and often are not interested in other demands on your time. This question explores how you deal with a difficult end-user by understanding their problem, assessing priorities, and communicating a timeframe for resolution. Often good communication can help both sides come to an agreement. Make sure you have an example with a successful outcome.

Q. How would you say you are able to handle stress?
A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress. Sometimes from the answer, they can also determine whether you are prone to stress. When responding, some techniques for handling stress that you may want to talk about include continually evaluating what’s on your plate and prioritizing, communicating with your manager on what your priorities are, and making sure that you take a break to reenergize, particularly at lunch time.

Q. What do you see yourself doing two or three years from now?
A. Hiring managers want you to stick around. They realize that you will not be in this position forever, and they want to make sure there’s a desire to move up within the organization as well as the right fit. They ask this question to see whether there’s a growth path for you possible within the organization. As a desktop technician, natural growth paths are team leads, quality assurance, engineering positions, and entry-level development. Be honest about where you want to be in two to three years, and ask the interviewer whether they see your career path as a possibility.

Q. How do you learn new technologies?
A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning technology on their own and who has the foresight to look for training opportunities. Besides the traditional books and manuals, don’t forget to include user groups, eLearning subscriptions, and IT professional sites such as CramSession.

Q. How do you prioritize tasks and manage your time?
A. What hiring managers want to know is whether you have time-management skills. Everyone manages their time differently, but think about how you handle e-mail, when you check voice mail, how you respond to pages, when you research and document, and how you pick up new trouble tickets.

Q. Imagine the following situation: you receive three simultaneous calls from three vicepresidents who need assistance immediately. How do you manage these conflictingpriorities?
A. Obviously this is a trick question. What the hiring manager is trying to assess is how you set expectations with each of the individuals, knowing very well that you won’t be able to assist all of them at the same time. They are also looking for how you will prioritize each of these incidents, including seeking assistance from peers and supervisors in order to meet user expectations. Don’t allow the “tyranny of the urgent” to divert you from managementestablished support priorities.

Q. How would you handle a user who continually misdiagnoses their PC issues?
A. By asking this question, the hiring manager is assessing your customer service skills. In this situation, you may want to discuss that the key is to not offend the user and turn them off to your support services. In handling this situation, you would pay particular attention to ways you can build trust with the user and lead them to the right resolution to their problem.
These components may include:

·         Acknowledging the user’s diagnosis

·         Asking the user to reproduce the problem

·         Finding a solution that works

Q. How do you handle setting up new employees?
A. This question is used by the hiring manager to assess your knowledge of common practices within the IT department, such as setting up new users. Obviously, the IT department plays a critical role in the productivity of the new employee. The role of the desktop technician is to help ease the new employee into the resources available to them and get them up to speed quickly. In responding to this question, you may want to talk about some of the tools you’ve used in
the past to help users acquaint themselves with their new environment. Some tools that help are:

·         A new-user welcome letter that is customized to the specific user with all their relevant information including telephone extension, how to access voice mail, and how to log in. It might also include a FAQ on getting help.

·         A “Getting to Know Your Helpdesk” document that provides an orientation to helpdesk service, such as how to contact the helpdesk, its hours of operation, what is and what is not supported by the helpdesk, and answers to common new-user questions.

Technical Questions

Q. What questions would you ask to help isolate a user’s problem?
A. This question is used by the hiring manger to assess your problem-solving abilities. The following represent some of the common questions that you would ask the end-user to help diagnose a situation:

·         When did the problem first start?

·         Has the system ever worked properly?

·         What was the last thing done to the system prior to the failure?

·         Is the issue intermittent or ongoing/constant?

·         Are there any error messages? If so, what are the specific error messages?

·         Has any new hardware been added to the system?

·         Has any new software been added to the system, including downloads from the Internet?

·         Has anything changed with the system (for example, has it been moved) since the issue presented itself?

·         Has anyone else had access to the system?

·         Are there any environmental factors that could be causing the issue?

·         Have you done any troubleshooting on the system on your own?

·         Have you checked all the cables/connections for a tight fit?

Q. What are the main differences between the following operating systems?
A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you know more than just the current version because there will always be a user who has a problem with an older version. By asking this question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The following provides a concise summary of some of the major differences.

Windows 2000 and XP

Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the hands of consumers. The major changes include the following:

·         Device driver rollback

·         Remote control (single-user terminal services)

·         New Start menu, control panel, and user interface elements

·         Fast user switching

·         Encrypted file system support for redirected folders

·         Better support for roaming wireless networking

·         Enhanced policies

·         Credential Manager

·         Personal firewall

Q. What are typical virus sources and how do you prevent virus attacks?
A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections:

·         Use anti-virus software.

·         Perform regular updates to the virus software definition files and scan engines. Verify updates have succeeded.

·         Perform regularly scheduled virus checks.

·         Configure software to check all files, not just program files.

·         Educate users on virus attacks, their consequences, and how to prevent them.

·         Know where all software came from.

·         Do regular backups.

·         Develop reporting mechanisms to inform server administrators of observed desktop infections and how these could impact the server environment (such as deletions or corruption of files on public shares, hidden payload files that might have been uploaded to servers, and so on).

Q. What are some of the guidelines you would recommend for implementing security at the user level?

A. Security is a major part of the desktop technician’s day-to-day responsibilities. As the closest point of contact to the end-users, technicians need to be savvy on the different methods for enforcing security. Some of the top techniques are included below.

Anti-virus software:

·         Ensure that all users install and regularly use anti-virus software on their PCs.

·         Instruct users to immediately notify the helpdesk when they suspect they’ve contracted a virus.

Password security:

·         Instruct users not to give out their passwords.

·         Instruct users not to write down their passwords.

·         Instruct users to make sure their password cannot be easily guessed by using a combination of alphanumeric characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { } / ? <> , ; : \ | ` ’ ” .).

·         Instruct users to change their password if they think there is even a slight chance someone knows it.

·         Instruct users to ensure their password is at least eight characters long.

·         Instruct users not to use a variation of their user ID.

·         Regularly change passwords on Administrator accounts on PCs (NT, Windows 2000 and XP)

Desktop security:

·         Instruct users not to leave their workstation logged in overnight.

·         Instruct users to enable screen savers that automatically lock their PC when there is no activity on it for more than five minutes.

A) Tell me something about yourself.
Tell about your eductaion, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds.


B) Technical Questions:




1) What is Active Directory? 

A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administor users, computers and printers in the network from active directory.


2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records? 

DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.
'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.
'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.

For in depth learning of DNS, please download, extract and watch the videos 
available here. 



3) What is DHCP? Why it is used? What are scopes and super scopes?


DHCP:
 Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.
Superscope: When we combine two or more scopes together its called super scope.



4) What are the types of LAN cables used? What is a cross cable? 


Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.

Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.


5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable? 


The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable.

The theoritical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.


6) What would you use to connect two computers without using switches? Cross cable. 7) What is IPCONFIG command? Why it is used?

IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.


8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?

When DHCP server is not available the Windows client computer assignes an automatic IP address to itself so that it can communicate with the network cmputers. This ip address is called APIPA. ITs in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.


9) What is a DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administor computers and we can govern them using common policies called group policies.

We can't do the same with workgroup.


10) Do you know how to configure outlook 2000 and outlook 2003 for a user?

Please visit the link below to find out how to configure outlook 2000 and outlook 2003.http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp


11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?

PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express usedsodb file.


12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?

BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problemis with one of the devices or drivers.


13) What is RIS? What is Imaging/ghosting?

RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS everytime using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.


14) What is VPN and how to configure it?

VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the stepsmentioned in the KB: http://support.microsoft.com/kb/305550

15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue?

Update the network card driver.


16) Your system is infected with Virus? How to recover the data?

Install another system. Insall the OS with the latespathces, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.


17) How to join a system to the domain? What type of user can add a system to the domain?

Please visit the article below and read "Adding the Workstation to the Domain"
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirectory/stepbystep/domxppro.mspx


18) What is the difference between a switch and a hub?

Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.


19) What is a router? Why we use it?

Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.


20) What are manageable and non manageable switches?

Switches which can be administered are calledmanageable switches. For example we can create VLAN for on such switch. On no manageable swiches we can't do so.
Did you like these useful knowledge about these questions & answers ? If Yes, then share with us via your comments…