PC Hardware and Networking

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 93

PC HARDWARE AND NETWORKING

NETWORKING

What is networking?

A network is simply a collection of computers or other hardware devices that are connected together, either physically or logically, using special hardware and software, to allow them to exchange information and cooperate. Networking is the term that describes the processes involved in designing, implementing, upgrading, managing and otherwise working with networks and network technologies.

Key Concept: A network is a set of hardware devices connected together, either physically or logically to allow them to exchange information.

Advantages and Disadvantages of a Network


Advantages

1. Peripherals such as printers can be shared amongst many different users. 2. Terminals are cheaper than standalone PCs. 3. Software can be shared amongst different users. 4. Communication across the network is cheap and fast. Disadvantages
1. Cabling can be expensive to install and replace. 2. A fault with the server will prevent the whole network from working. 3. Security mesures are needed to restrict access to the network. 4. WANs are vulnerable to hackers and viruses.

Types of Network
One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common examples of area network types are:

LAN - Local Area Network WLAN - Wireless Local Area Network WAN - Wide Area Network MAN - Metropolitan Area Network Other types
SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network PAN - Personal Area Network DAN - Desk Area Network

Types of Network 2/2


LAN - Local Area Network A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet. In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring. WAN - Wide Area Network As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances. Wireless Local Area Network - a LAN based on WiFi wireless network technology Metropolitan Area Network - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned and operated by a single entity such as a government body or large corporation.

Physical Components of a Network


Personal Computer

Physical Components of a Network


Interconnections
they consist of components that provide means for data to travel from one point to another point in the network, this category includes components such as the following:

a.NICs: (Network Interface Cards), translates the data produced by the computer into a format that can be transmitted over the local network (digital to analog).
b. Network media: such as cables or wireless media, that provide the means by which the signals are transmitted from one network device to another. c. Connectors: provide the connection points for the media, i.e RJ-45

Physical Components of a Network


Switches / Hubs
devices that provide network attachments to the end systems and intelligent switching of the data within the local network.

Physical Components of a Network


Routers
interconnects networks and chooses the best path between networks for data to go through.

Network Architectures

Agenda
LAN Topologies OSI Model Cabling Standards (UTP Implementation) Testing the Connectivity

LAN Topologies OSI Model

LAN Topologies
The term topology defines the geographic arrangement of networking devices. It describes the actual layout of the network hardware. Given the location of workstations and peripherals, the goal of topology is to find the most economical and efficient way to connect all the users to the network resources while providing adequate capacity to handle user demands, maintain system reliability and minimize delay.

The selection of a topology for a network can not be done in isolation as it affects the choice of media and the access method used. Because it determines the strategy used in wiring a building for a network and deserves some careful study.

What are the two network connection types?


The two different network connection types are (a) point-to-point connection and (b) multipoint connection. Point-to-Point Connection A point-to-point connection is a direct link between two devices such as a computer and a printer. Most of today's point-to-point connections are associated with modems and PSTN (Public Switched Telephone Network) communications. Multipoint Connection A multipoint connection is a link between three or more devices. Historically, multipoint connections were used to attach central CPs to distributed dumb terminals. In today's LAN environments, multipoint connections link many network devices in various configurations. *** The three simple LAN topologies that are combined to form any practical topology are known as basic LAN topologies. They are, Bus Topology, Ring Topology and Star Topology.

Bus Topology
The physical Bus topology is the simplest and most widely used of the network designs. It consists of one continuous length of cable (trunk)and a terminating resistor (terminator) at each end. Data communication message travels along the bus in both directions until it is picked up by a workstation or server NIC. If the message is missed or not recognized, it reaches the end of the cabling and dissipates at the terminator.

What are the advantages and disadvantages of bus topology?


The advantages of physical bus topology are: a. It uses established standards and it is relatively easy to install. b. It requires less media than other topologies.

The disadvantages of bus topology are: a. The bus networks are difficult to reconfigure, especially when the acceptable number of connections or maximum distances have been reached. b. They are also difficult to troubleshoot because everything happens on a single media segment. This can have dangerous consequences because any break in the cabling brings the network to its knee

Ring Topology
The physical ring topology is a circular loop of point-to-point links. Each device connects directly to the ring or indirectly through and interface device or drop cable. Message travel around the ring from node to node in a very organized manner. Each workstation checks the message for a matching destination address. If the address doesn't match the node simply regenerates the message and sends it on its way. If the address matches, the node accepts the message and sends a reply to the originating sender.

Dual FDDI (Fiber Distributed Data Interface)

Star Topology
The physical star topology uses a central controlling hub with dedicated legs pointing in all directions like points of a star. Each network device has a dedicated point-to-point link to the central hub. This strategy prevents troublesome collisions and keeps the lines of communications open and free of traffic.

This topology, obviously, require a great deal of cabling. This design provides an excellent platform for reconfiguration and trouble-shooting. Changes to the network are as simple as plugging another segment into the hub and a break in the LAN is easy to isolate and doesn't affect the rest of the network.

What are the advantages and disadvantages of star topology?


The benefits of star topology are: a. Relatively easy to configure. b. Easy to troubleshoot c. Media faults are automatically isolated to the failed segment. The disadvantages are considered as follows: a. Requires more cable than most topologies. b. Moderately difficult to install.

What are the popular topologies other than basic Topologies?


Apart from basic topologies some other topologies worth considering are: mesh topology (every device connected to all other devices),Cellular Topology (wireless point to pint and multipoint design), Tree Topology (Hierarchical connections of devices), Hybrid topology (combination of two or more basic topologies).

What are the advantages and disadvantages of ring topology?


The advantages of ring topologies are: a. They are very easy to troubleshoot because each device incorporates a repeater. b. A special internal feature called beaconing allows troubled workstations to identify themselves quickly. The disadvantages of ring topologies are: a. It is considerably difficult to install and reconfigure ring topology b. Media failure on unidirectional or single loop causes complete network failure.

Cabling Standards (UTP Implementation)

Basic Network Cables

Fiber Optics

What type of UTP?


What speed does each type support?
Cable Type Category 5 Category 5e Category 6 Category 6 Max Speed Max Distance 100Mbs 1000Mbs 1000Mbs 100m 100m 100m Cost Factor 1x 1x 1.3x 1.3x

10,000Mbs 57m

Category 6a

10,000Mbs 100m

2x

Strongly recommend category 5e cabling.

Basic Network Connectors

Registered Jack 45 (RJ-45)

Registered Jack 11 (RJ-11)

Cable Configuration

Testing the Connectivity

The Use of Ping Command


Pinging is a command which tells you if the connection between your computer and a particular domain is working correctly. Enter the word ping, followed by a space, then the domain name. If the results show a series of replies, the connection is working. The time shows you how fast the connection is. If you see a "timed out" error instead of a reply, there is a breakdown somewhere between your computer and the domain. In this case the next step is to perform a traceroute.

Using Tracert (Trace Route) Utility


The TRACERT diagnostic utility determines the route to a destination by sending Internet Control Message Protocol (ICMP) echo packets to the destination. In these packets, TRACERT uses varying IP Time-To-Live (TTL) values. Because each router along the path is required to decrement the packet's TTL by at least 1 before forwarding the packet, the TTL is effectively a hop counter. When the TTL on a packet reaches zero (0), the router sends an ICMP "Time Exceeded" message back to the source computer. TRACERT sends the first echo packet with a TTL of 1 and increments the TTL by 1 on each subsequent transmission, until the destination responds or until the maximum TTL is reached. The ICMP "Time Exceeded" messages that intermediate routers send back show the route. Note however that some routers silently drop packets that have expired TTLs, and these packets are invisible to TRACERT. TRACERT prints out an ordered list of the intermediate routers that return ICMP "Time Exceeded" messages. Using the -d option with the tracert command instructs TRACERT not to perform a DNS lookup on each IP address, so that TRACERT reports the IP address of the near-side interface of the routers. In the following example of the tracert command and its output, the packet travels through two routers (157.54.48.1 and 11.1.0.67) to get to host 11.1.0.1. In this example, the default gateway is 157.54.48.1 and the IP address of the router on the 11.1.0.0 network is at 11.1.0.67.

THE OSI REFERENCE MODEL

OVERVIEW

THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION

THE OSI REFERENCE MODEL


A LAYERED NETWORK MODEL THE SEVEN OSI REFERENCE MODEL LAYERS SUMMARY

THE NEED FOR STANDARDS


Over the past couple of decades many of the networks that were built used different hardware and software implementations, as a result they were incompatible and it became difficult for networks using different specifications to communicate with each other. To address the problem of networks being incompatible and unable to communicate with each other, the International Organisation for Standardisation (ISO) researched various network schemes. The ISO recognised there was a need to create a NETWORK MODEL that would help vendors create interoperable network

implementations.

ISO - ORGANISATION FOR STANDARDISATION


The International Organisation for Standardisation (ISO) is an International standards organisation responsible for a wide range of standards, including many that are relevant to networking. In 1984 in order to aid network interconnection without necessarily requiring complete redesign, the Open Systems Interconnection (OSI) reference model was approved as an international standard for communications architecture.

THE OSI REFERENCE MODEL

The model was developed by the International Organisation for Standardisation (ISO) in 1984. It is now considered the primary Architectural model for inter-computer communications. The Open Systems Interconnection (OSI) reference model is a descriptive network scheme. It ensures greater compatibility and interoperability between various types of network technologies. The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems . This separation into smaller more manageable functions is known as layering.

A LAYERED NETWORK MODEL


The OSI Reference Model is composed of seven layers, each specifying particular network functions. The process of breaking up the functions or tasks of networking into layers reduces complexity. Each layer provides a service to the layer above it in the protocol specification. Each layer communicates with the same layers software or hardware on other computers. The lower 4 layers (transport, network, data link and physical Layers 4, 3, 2, and 1) are concerned with the flow of data from end to end through the network. The upper four layers of the OSI model (application, presentation and sessionLayers 7, 6 and 5) are orientated more toward services to the applications. Data is Encapsulated with the necessary protocol information as it moves down the layers before network transit.

THE SEVEN OSI REFERENCE MODEL LAYERS

LAYER 7: APPLICATION
The application layer is the OSI layer that is closest to the user. It provides network services to the users applications. It differs from the other layers in that it does not provide services to any other OSI layer, but rather, only to applications outside the OSI model. Examples of such applications are spreadsheet programs, word processing programs, and bank terminal programs.

The application layer establishes the availability of intended communication partners, synchronizes and establishes agreement on procedures for error recovery and control of data integrity.

LAYER 6: PRESENTATION
The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system. If necessary, the presentation layer translates between multiple data formats by using a common format. Provides encryption and compression of data. Examples :- JPEG, MPEG, ASCII, EBCDIC, HTML.

LAYER 5: SESSION
The session layer defines how to start, control and end conversations (called sessions) between applications. This includes the control and management of multiple bi-directional messages using dialogue control. It also synchronizes dialogue between two hosts' presentation layers and manages their data exchange. The session layer offers provisions for efficient data transfer.

Examples :- SQL, ASP(AppleTalk Session Protocol).

LAYER 4: TRANSPORT

The transport layer regulates information flow to ensure end-toend connectivity between host applications reliably and accurately. The transport layer segments data from the sending host's system and reassembles the data into a data stream on the receiving host's system. The boundary between the transport layer and the session layer can be thought of as the boundary between application protocols and data-flow protocols. Whereas the application, presentation, and session layers are concerned with application issues, the lower four layers are concerned with data transport issues. Layer 4 protocols include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).

LAYER 3: NETWORK

Defines end-to-end delivery of packets. Defines logical addressing so that any endpoint can be identified.

Defines how routing works and how routes are learned so that the packets can be delivered.
The network layer also defines how to fragment a packet into smaller packets to accommodate different media. Routers operate at Layer 3. Examples :- IP, IPX, AppleTalk.

LAYER 2: DATA LINK

The data link layer provides access to the networking media and physical transmission across the media and this enables the data to locate its intended destination on a network. The data link layer provides reliable transit of data across a physical link by using the Media Access Control (MAC) addresses. The data link layer uses the MAC address to define a hardware or data link address in order for multiple stations to share the same medium and still uniquely identify each other. Concerned with network topology, network access, error notification, ordered delivery of frames, and flow control. Examples :- Ethernet, Frame Relay, FDDI.

LAYER 1: PHYSICAL

The physical layer deals with the physical characteristics of the transmission medium. It defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications. Examples :- EIA/TIA-232, RJ45, NRZ.

SUMMARY
There was no standard for networks in the early days and as a result it was difficult for networks to communicate with each other. The International Organisation for Standardisation (ISO) recognised this. and researched various network schemes, and in 1984 introduced the Open Systems Interconnection (OSI) reference model. The OSI reference model has standards which ensure vendors greater compatibility and interoperability between various types of network technologies. The OSI reference model organizes network functions into seven numbered layers.

Each layer provides a service to the layer above it in the protocol specification and communicates with the same layers software or hardware on other computers. Layers 1-4 are concerned with the flow of data from end to end through the network and Layers 5-7 are concerned with services to the applications.

SUMMARY

TCP/IP

Overview
Transmission Control Protocol (TCP) provides a communication service at an intermediate level between an application program and the Internet Protocol (IP). That is, when an application program desires to send a large chunk of data across the Internet using IP, instead of breaking the data into IP-sized pieces and issuing a series of IP requests, the software can issue a single request to TCP and let TCP handle the IP details.

The Internet Protocol (IP) is responsible for addressing hosts and routing datagrams (packets) from a source host to the destination host across one or more IP networks. For this purpose the Internet Protocol defines an addressing system that has two functions. Addresses identify hosts and provide a logical location service. Each packet is tagged with a header that contains the meta-data for the purpose of delivery. This process of tagging is also called encapsulation.
The TCP/IP model describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network. TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. Protocols exist for a variety of different types of communication services between computers.

TCP/IP Configuration 1/3


Open [My Nework Places] and Open [Properties] of Local Area Connection

TCP/IP Configuration 2/3


Select [Internet Protocol TCP/IP] and click [Properties]

TCP/IP Configuration 3/3


To assign IP Address automatically Click obtain an IP address automatically This is called Dynamic IP Addressing

To assign IP Address manually


Click use the following IP address This is called Static IP Addressing

IP Address (IPV4/IPV6)

IPv4
Internet Protocol version 4 (IPv4) is the fourth revision in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232) possible unique addresses. IPv4 reserves some addresses for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses). IPv4 addresses are canonically represented in dot-decimal notation, which consists of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be presented in various hexadecimal, octal, or binary representations.

IPv4

IPv6
An Internet Protocol Version 6 address (IPv6 address) is a numerical label that is used to identify a network interface of a computer or other network node participating in an IPv6-enabled computer network. IPv6 is the successor to the Internet's first addressing infrastructure, Internet Protocol version 4 (IPv4). In contrast to IPv4, which defined an IP address as a 32-bit number, IPv6 addresses have a size of 128 bits. Therefore, IPv6 has a vastly enlarged address space compared to IPv4. The rapid exhaustion of IPv4 address space, despite conservation techniques, prompted the Internet Engineering Task Force (IETF) to explore new technologies to expand the Internet's addressing capability. The permanent solution was deemed to be a redesign of the Internet Protocol itself. This next generation of the Internet Protocol, intended to replace IPv4 on the Internet, was eventually named Internet Protocol Version 6 (IPv6) in 1995[3][4] The address size was increased from 32 to 128 bits or 16 octets. This, even with a generous assignment of network blocks, is deemed sufficient for the foreseeable future. Mathematically, the new address space provides the potential for a maximum of 2128, or about 3.4031038 unique addresses.

IPv6

IP Address Classes

Network ID
A network ID refers to a part of a TCP/IP address that is used to identify the subnet that a host may be on. The subnet that the computer is on is determined by the netmask and IP address of the computer. This subnet address is the same as the network ID and is the beginning part of the computers IP address. When the netmask is setup, it is a number where some of the most significant bits have a 1's value and the rest have values of 0. The most significant part of the netmask with bits set to 1's specifies the network address, and the lower part of the address will specify the host address. The part of the IP address that matches the part of the netmask where the bits are set to ones determines the network ID.

Host ID
The host address, or the host ID portion of an IP address, is the portion of the address used to identify hosts (any device requiring a Network Interface Card, such as a PC or networked printer) on the network. The network ID, by contrast, is the portion of the address that refers to the network itself.

IP Address Classes
There were five IP address classes in use before the majority of industry switched to classless routing. There were A, B, C, D, and E. Class A addresses were used for networks with a very large number of total hosts. Class B was designed for use on medium to large networks, and C for small local area networks (LANs). Class D and E were set aside for multicast and experimental purposes. In the following table, the four octets that make up an IP address (a, b, c, and d respectfully) are displayed in how they were distributed in classes A, B, and C.

Class A IP addresses

Class A IP addresses were used for networks that had a large number of hosts on the network. The class permitted up to 126 networks by using the first octet of the address for the network identification. The first bit in this octet was always fixed or set to be zero. The following seven bits in the octet were then set to one which would complete the network identification. The remaining octets (24 bits) represented the hosts ID and would allow up to 126 networks with 17 million hosts per network. In a Class A address, the network number values start at the number 1 and end at 127.

Class B IP addresses

Class B IP address were assigned to medium to large networks. They allow 16,384 networks by using the first two octets in the address for the network identification. The first two bits of the first octet are fixed to 1 0. The next 6 bits along with the following octet then complete the network identification. The third and fourth octet (16 bits) then represents the host ID. This allows approximately 65,000 hosts per network. Class B network number values start at 128 and finish at 191.

Class C IP addresses

Class C IP addresses were used in small LAN configurations. They allow for approximately 2 million networks by using the first three octets of the address for the network identification. In a Class C address, the first three bits are fixed to 1 1 0. In the following three octets, 21 bits make up the network identification. The last octet then represents the host identification. This allows for 254 hosts per network. A Class C network number value starts at 192 and ends at 223.

Class C IP addresses

Class C IP addresses were used in small LAN configurations. They allow for approximately 2 million networks by using the first three octets of the address for the network identification. In a Class C address, the first three bits are fixed to 1 1 0. In the following three octets, 21 bits make up the network identification. The last octet then represents the host identification. This allows for 254 hosts per network. A Class C network number value starts at 192 and ends at 223.

Class D IP addresses

Class D IP addresses were reserved for multicasting purposes. These addresses begin with an octet in the 224-239 range. They would have leading bits of 1 1 1 0 and includes addresses from 224.0.0.0 to 239.255.255.255.

Class E IP addresses

Class E IP addresses are reserved for experimental use. The first octet of these addresses ranges between 240 and 255. This range is reserved by the IETF and similar to Class D networks, should not be assigned to a host device.

Identifying IP Address

Understanding IP Address

Analyzing IP Address

IP Address to Avoid
IP Address Network 0.0.0.0 Network 127.0.0.0 Function Refers to the default route. This route is to simplify routing tables used by IP. Reserved for Loopback. The Address 127.0.0.1 is often used to refer to the local host. Using this Address, applications can address a local host as if it were a remote host.

IP Address with all host Refers to the actual network itself. For example, network 192.168.0.0 (Class C) can be bits set to "0" (Network used to identify network 192.168.0. This type of notation is often used within routing Address) e.g 192.168.0.0 tables. IP Address with all node bits set to "1" (Subnet / Network Broadcast) e.g 192.168.255.255 IP Address with all bits set to "1" (Network Broadcast) e.g 255.255.255.255 IP Addresses with all node bits set to "1" are local network broadcast addresses and must NOT be used. Some examples: 125.255.255.255 (Class A) , 190.30.255.255 (Class B), 203.31.218.255 (Class C). See "Multicasts" & "Broadcasts" for more info. The IP Address with all bits set to "1" is a broadcast address and must NOT be used. These are destined for all nodes on a network, no matter what IP Address they might have.

Oral Question and Acceptable Answer

Set A

You have just installed Windows 98. During testing ,

it fails to start after the starting Windows 98 message appear. What should you do to troubleshoot this problem? Name at least two ways. a. Type Win/D:M add the command prompt to start windows. b. Press F8 when Windows restarting and select safe mode

You have configured a dual boot system consisting

Windows 98 in FAT 32 partition and Windows 2000 using NTFS partition. You check your Windows 2000 installation and it looked good. However, when you boot to Windows 98 you can not see the files in the NTFS partition. What might be the source of the problem? Windows 98 is not compatible with NTFS

You successfully install Windows 2000 Professional

and you want to check your drives for errors. Name one way of checking for errors. Disk Defragmenter. Open control panel, click administrative tool, click computer management and within the storage tab click disk defragmenter

You want to setup a dual boot scenario between

Windows 98 and Windows 2000. How would you do this? Partition your hard drive. Install Windows 98 first. And install Windows 2000 to the second partition.

A customer complains that his hard disk is making

lots of noise. After examining the computer and hearing the noise for your self, you notice that high pitch noise seems to be coming from the fan in the power supply. Which component should be replaced? Power Supply
What part of HP Laser printer is malfunction if you

receive a 50 service error? FUSER

A customer complains that he cant get his computer

to work. When she turn it on, she gets no video and hears a series of beeps. The beeps are in the sequence of one long beep, then two short beeps. You tell the customer to bring the machine in. Upon further examination you are able to identify the problem. What should be your next step? What is the error? Replace the video card be sure that it is tighten

What is indicated by a 201 error at system start

up? Bad memory. Most of the error begins with 2 indicate memory error of some sort.
What two command files are used by DOS to

configure the computer? Autoexec.bat and Config.sys

You install a newly purchase sound card into your

computer, but upon rebooting you find that the new device is not recognized by the system. Moreover, your modem, which has always worked perfectly, has stopped functioning. What is probably the problem? The sound card is using the same IRQ as the modem
What is the correct way to use the protocol utility

IPCONFIG in a Windows 2000 environment? Choose start, click run and type cmd then press enter key. At the command prompt type IPCONFIG

Transmission Control Protocol/Internet Protocol

(TCP/IP) is a collection of protocols that help manage the internet communication. Each computer running TCP/IP must have a unique IP address assigned to it. What is an IP address? Describe the format? An IP address is set of four numbers, each of which must be from 0 to 255.
What is the correct sequence to start Windows 2000

backup program? Choose start-Programs-then Accessories- then System Toolsthen Backup.

Youve setup a network whereby each computer act

as a client and a server and in which each user shares each others resources, including printers. What is the correct term for such arrangement? Peer to peer networking
Sending and receiving electronic mail (e-mail) is a

common benefit of the internet. Assuming a user has access to the internet on a properly configure PC. What is before a user can begin using e-mail? E-mail account and e-mail client

What is the name of the executable file for Microsoft

Backup for DOS? For Windows 3.x? MSBACKUP.EXE


What would you type at a DOS command line to

start the Microsoft Anti-Virus? Type MSAV at the command prompt.


What program in the control panel can be used to

create a startup disk.? Add/Remove Programs

What is the final option in the Configure Screen

menu? Compatibility test


The MSBACKUP Program in DOS receives its

settings from what file? SET file

Set B

Which Windows NT 4.0 utility should you use after

installing a new hard drive to make usable? Disk Administrator

Which is the proper command to install Windows 2000

recovery console as a startup option in the CD Rom in drive E? E:\i386\winnt32.exe /cmdcons.

During the Windows 2000 setup, you are ask to choose

between NTFS file system and the FAT filesystem. Can you site disadvantage on NTFS? NTFS is more sophisticated file system however it is not compatible with DOS.

After the successful upgrading to Windows 2000, what

should you do with the temporary files generated during the setup process? Nothing. Because all generated temporary files are automatically remove during the process.
You are preparing the computer for dual booting

between Windows 98 and 2000. Your drive is partitioned, and Windows 98 is already installed. What should be your next step? You must choose FAT for Windows 2000 partition

Which of the following is not the Windows 2000 key

Boot file? Why? Autoexec.bat This is the key boot for Windows 3.1 and 9X are not necessary for Windows 2000
What is the most likely cause of a paper jam on a dot

matrix printer? Obstructed paper path

HP printer laser jet III printer is not printing at all. The

computer indicates that the device on LPT1 is not ready You perform a service self test o the printer and it prints on the page of vertical lines with no problem. The front panel self test does not work, however which component do you suspect is giving you the problem The Formatter
A computer is experiencing random reboots and

phantom problems that disappear after reboot . What should you do? Open the cover and reset all cards and chips

Using either a Windows 9X or Windows 2000 workstation,

what components do you need to connect to a Microsoft network server? Protocol, client and adapter

You are enable file and printer sharing on your Windows 9X

system. You must now specify how security will be handled. What could be the options? Share level Access Control and User level control A Windows 9x workstation includes default support for what network OS/client types? MS Windows Networking and Novells Netware within a Windows 9x workstation, clients are provided for Microsoft and Novell Network

What is the third element required to configure a

Windows 2000 system as a network client? A client, an adapter, and ______? Protocol What would you need to do to create a new dial-up networking (DUN) connection within a Windows 9x system? Choose: Start-Programs-Accessories: choose and click Dial up networking then double click Make new connection. Or double click My computer icon on the desktop then click dial up networking.

What would you use to map a network drive in both

Windows 9x and Windows 2000? Map network Drive

What type of back up involves selecting the files you

want to back up as well as when you want them to backup? Custom backup currently available. Of the following, which is not valid backup hardware? Stationary hard disk

There are several pieces of backup hardware that are

Which type of backup that backup files on a disk that

has changed since the last full backup? Differential backup

You might also like