dell tech notes

Upload: akhil-ahmed

Post on 04-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 Dell Tech Notes

    1/22

    Tech notes

    Common Scenarios:

    Incase a Customer tells u that there is no sound from the computer

    speakers!!

    1. First check if the speakers are turned on2. Then check if they are properly connected to the CPU3. Check if the volume button on the speakers is turned on.4. Check if the volume on the Task bar is also turned on and also the

    volume on the respective softwares are also turned on.5. Incase the speakers or the softwares are muted un mute them.6. Still if there is no sound then connect the headphones to the CPU and

    check if there is sound. Incase it is audible from the headphone then thespeakers are faulty.

    7. If there is no sound from the headphone then there is something wrongwith the sound card

    8. Go to the Device manager and see if the driver is installed or no.9. If not then install the driver and if yes then there is something wrong

    with the sound card.

    Incase a Customer tells u that there is no Display on the computer monitor!!

    1. First check if the monitor is turned on.2. If there is no display then unplug the monitor cable from the CPU and

    then a screen with red, blue and green color with the letters RBG (RedBlue and Green Colors) or a message SELF TEST will pop up and keepmoving all over the screen.

    3. In this case the monitor is absolutely fine and the problem is with thevideo card.

    4. In case the video card is an external one the it has to be replaced and ifit is integrated on the motherboard then the motherboard has to bereplaced

    Whats a Broadband? -

    It is a High Speed Internet Connection which requires a modem or a router andit is an Optical Fiber Connection (RJ 45, (Registered Jack-45)) Speed of 64KBPSto 1GBPS. This cable is used only for Ethernet card, LAN WAN

    1

  • 7/29/2019 Dell Tech Notes

    2/22

    Whats a narrowband/ Dialup? -

    Its an Internet Connection which has to be Manually Dialed through telephonelines (RJ11, (Registered Jack-11)) with the help of a modem. Speed of 56KBPS.

    This card is only for MODEM 2 Phone

    Whats Winzip?

    WinZip is a popular data compression format. WinZip files save time and space,and make downloading software faster. To open the Zip file you will need tohave WinZip software on your PC. Once you have unzipped the file you willhave an executable file.

    To extract a Winzip file right click on the zipped file and click on Extract All. Itwill direct u to a Destination Folder. Click on the desired folder and the file is

    extracted to that folder.

    Define an operating system

    This is a computer's primary software program, and it controls all basicoperations of the computer.

    Ex Windows, Linux, UNIX & Dos.

    What are the different types of internet browsers?

    Netscape navigator, Netscape communicator, Internet Explorer 6, InternetExplorer 7, Mozilla Firefox and Opera

    How is a desktop Measured? - It is measured diagonally

    What is System restore?

    Its a process when the entire system is restored back to its previous days ortimes setting. This is done only when the system does not work properlymaybe due to software or hardware which is not installed properly.

    Hows a System restore done?

    System Restore can be done only on a Windows XP in the following ways.

    1-Go to Safe Mode then go to Start on the taskbar menu

    2- Go to Programs and then go to Accessories.

    2

  • 7/29/2019 Dell Tech Notes

    3/22

    3-Go to System tools and then to System restore.

    4-Automatically 2 options pop up on the Screen which is A-Restore System to aprevious point and B- Create a new restore point.

    5-When u click on option A, a calendar automatically pops up with few dateshighlighted.

    6- Click on the highlighted dates and click on next. Then the computer restartsand it either says A- System successfully restored or B- System not Restored orSystem Restore unsuccessful

    What the Components inside a CPU?

    1

    Processor

    2Mother Board

    3

    RAM

    4

    Hard Disk

    5

    CD Drive,

    CD Writer

    6

    Floppy Drive7

    Sound Card

    8

    Video Card

    9

    Graphics Card

    10

    LAN/Ethernet card (Used forNetworking)

    11

    SMPS (Switch mode Power Supply)

    What is a Combo Drive?

    Its a drive that plays both CD and DVD but can write only CDS

    3

  • 7/29/2019 Dell Tech Notes

    4/22

    What are Optical Drives?

    The Hard Disk, CD drive and Floppy Drive Put together are called as opticaldrives.

    Basic configuration of a PC

    1- Pentium 4 2.8 GHz Processor.

    2- Intel 915 Mother Board.

    3- 512 MB RAM

    4-80 GB Hard Disk.

    What is a RAM?

    Random Access Memory is the best form of a Computer Memory. RAM isconsidered as Random Access because you can access any memory celldirectly if you know the row and column that intersect at that cell.

    What is ROM?

    Read Only Memory whose contents can be accessed and read but cannot bechanged. You can read from it, but you cannot write to it without using specialprocedures. ROM is where your BIOS is stored. BIOS stand for Basic Input /Output System.

    What are Input and Output Devices?

    Input Devices- Keyboard, Mouse, Floppy drive, CD Drive, Scanner etc.

    Output Devices- monitor, Speakers, Printer etc.

    What are the Different types of RAM?

    1SDRAM

    SDRAM means Synchronous Dynamic Random AccessMemory

    2DDR1

    Double Data Rate

    4

  • 7/29/2019 Dell Tech Notes

    5/22

    3DDR2

    What are the different types of Slots?

    1PCI-(Peripheral

    Component Interconnect)

    Sound card, Video Card, LAN Card,

    Internal Modem, Graphics/VGA

    card.2RAM

    3IDE

    (Integrated Drive

    Electronics)

    Optical Drives

    Windows XP Vs Windows Vista

    Windows XP Windows Vista1.

    2.

    3.

    4.

    Not secure

    Compatible with 32 bit Processors and 64 BitProcessors

    Minimum of 64 MB of RAM

    More secured compared to XP

    Compatible with 64 bitProcessor

    Minimum of 1 GB RAM

    Advanced Graphics option

    5

  • 7/29/2019 Dell Tech Notes

    6/22

    How many types of Ports are there?

    There are 3 types of ports,

    1

    Serial port

    2

    ParallelPort

    3

    USB Port

    Audio file formats or sound file formats WAV, AIFF, MP3 and AU.

    Image file formats available mpeg, jpeg, gif, bitmap

    Dual Core Vs Core 2 Duo

    The Simple facts are:

    All Core 2 Duo Processors are Dual Core ProcessorsAll Pentium D Processors are Dual Core ProcessorsAll Intel Dual Core Processors are Dual Core Processors

    Intel Core 2 Duo processors are next gen processors from Intel on 65 nmplatform developed from Ground up with new Architecture called Core

    What are the seven layers in the OSI Reference Model?

    1- Applications Layer

    2- Presentation Layer

    3- Sessions Layer

    4- Transport Layer

    6

    http://en.wikipedia.org/wiki/WAVhttp://en.wikipedia.org/wiki/AIFFhttp://en.wikipedia.org/wiki/Au_file_formathttp://www.intel.com/products/processor_number/chart/core2duo.htmhttp://www.intel.com/products/processor_number/chart/pentium_d.htmhttp://www.intel.com/products/processor_number/chart/core2duo.htmhttp://en.wikipedia.org/wiki/WAVhttp://en.wikipedia.org/wiki/AIFFhttp://en.wikipedia.org/wiki/Au_file_formathttp://www.intel.com/products/processor_number/chart/core2duo.htmhttp://www.intel.com/products/processor_number/chart/pentium_d.htmhttp://www.intel.com/products/processor_number/chart/core2duo.htm
  • 7/29/2019 Dell Tech Notes

    7/22

    5- Network Layer

    6- Data Link Layer

    7 Physical Layer

    What is a MODEM?

    Modem is a device used to connect to the internet. The signals coming fromthe phone are converted from analogue and sent to the computer as digital andvice versa

    What is a ROUTER?

    Router is a device used for networking. Incase of more than one computer thena modem and a router is required for the internet connection as well as for

    networking purpose. Its basically used to connect two LANS or LAN WANETC

    Router

    Abbreviations

    HTTP

    HTML

    TCP/IP

    SMTP

    POP

    DSL

    WIFI

    URL

    FTP

    BIOS

    Hyper Text Transfer Protocol

    Hyper Text Markup Language

    Transmission Control Protocol/ InternetProtocol

    Simple Mail Transfer Protocol

    Post Office Protocol

    Digital Subscriber Line

    Wireless Fidelity

    Uniform Resource Locator

    File Transfer Protocol

    Basic Input Output Setup

    7

  • 7/29/2019 Dell Tech Notes

    8/22

    What is BIOS?

    BIOS is an acronym that stands either for the Basic Input/Output System or forBuilt In Operating System. BIOS refers, in part, to the firmware code (a type ofboot loader) run by a PC when first powered on. The BIOSes ofIBM PC class

    machines are coded programs embedded on a chip that recognize and controlvarious devices that make up x86 personal computers, and provide a smalllibrary of basic Input/Output functions that can be called to operate andcontrol the peripherals such as the keyboard, primitive (800 x 600) displayfunctions and so forth.

    The primary functions of BIOS is as follows:

    1. to identify and initialize system component hardware (such as the videodisplay card, hard disk, and floppy disk) and some other hardwaredevices

    2. to prepare the machine into a known low capability state, so othersoftware programs stored on various media can be loaded, executed,and given control of the PC. This process is known as booting, or bootingup, which is short for bootstrapping

    What is a File System?

    A file system is a method for storing and organizing computer files and thedata they contain to make it easy to find and access them. File systems mayuse a data storage device such as a hard disk or CD-ROM and involvemaintaining the physical location of the files.

    TYPES OF FILE SYSTEM

    1. Disk file systems

    A disk file system is a file system designed for the storage offiles on adata storage device, most commonly a disk drive, which might bedirectly or indirectly connected to the computer

    Ex: FAT (FAT12, FAT16, FAT32), NTFS, HFS and HFS+, ext2, ext3, ISO9660, ODS-5, and UDF

    2. Flat file systems

    In a flat file system, there are no subdirectorieseverything is stored atthe same (root) level on the media, be it a hard disk, floppy disk, etc.While simple, this system rapidly becomes inefficient as the number offiles grows, and makes it difficult for users to organize data into relatedgroups.

    8

    http://en.wikipedia.org/wiki/Acronymhttp://en.wikipedia.org/wiki/Firmwarehttp://en.wikipedia.org/wiki/Boot_loaderhttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/IBM_PChttp://en.wikipedia.org/wiki/X86http://en.wikipedia.org/wiki/Hard_diskhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Computer_softwarehttp://en.wikipedia.org/wiki/Bootstrapping_(computing)http://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Data_storage_devicehttp://en.wikipedia.org/wiki/Hard_diskhttp://en.wikipedia.org/wiki/CD-ROMhttp://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Data_storage_devicehttp://en.wikipedia.org/wiki/Disk_drivehttp://en.wikipedia.org/wiki/File_Allocation_Tablehttp://en.wikipedia.org/wiki/NTFShttp://en.wikipedia.org/wiki/Hierarchical_File_Systemhttp://en.wikipedia.org/wiki/HFS_Plushttp://en.wikipedia.org/wiki/Ext2http://en.wikipedia.org/wiki/Ext3http://en.wikipedia.org/wiki/ISO_9660http://en.wikipedia.org/wiki/ISO_9660http://en.wikipedia.org/wiki/Files-11http://en.wikipedia.org/wiki/Universal_Disk_Formathttp://en.wikipedia.org/wiki/Directory_(file_systems)http://en.wikipedia.org/wiki/Root_directoryhttp://en.wikipedia.org/wiki/Hard_diskhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Acronymhttp://en.wikipedia.org/wiki/Firmwarehttp://en.wikipedia.org/wiki/Boot_loaderhttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/IBM_PChttp://en.wikipedia.org/wiki/X86http://en.wikipedia.org/wiki/Hard_diskhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Computer_softwarehttp://en.wikipedia.org/wiki/Bootstrapping_(computing)http://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Data_storage_devicehttp://en.wikipedia.org/wiki/Hard_diskhttp://en.wikipedia.org/wiki/CD-ROMhttp://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Data_storage_devicehttp://en.wikipedia.org/wiki/Disk_drivehttp://en.wikipedia.org/wiki/File_Allocation_Tablehttp://en.wikipedia.org/wiki/NTFShttp://en.wikipedia.org/wiki/Hierarchical_File_Systemhttp://en.wikipedia.org/wiki/HFS_Plushttp://en.wikipedia.org/wiki/Ext2http://en.wikipedia.org/wiki/Ext3http://en.wikipedia.org/wiki/ISO_9660http://en.wikipedia.org/wiki/ISO_9660http://en.wikipedia.org/wiki/Files-11http://en.wikipedia.org/wiki/Universal_Disk_Formathttp://en.wikipedia.org/wiki/Directory_(file_systems)http://en.wikipedia.org/wiki/Root_directoryhttp://en.wikipedia.org/wiki/Hard_diskhttp://en.wikipedia.org/wiki/Floppy_disk
  • 7/29/2019 Dell Tech Notes

    9/22

    3. Flash file systems

    Aflash file system is a file system designed for storing files on flashmemory devices.

    Ex: mobile devices, flash memory devices in Digital cameras.

    4. Database file systems

    A database is a collection of interrelated datas stored in a databaseserver; these datas will be stored in the form of tables. The primaryaim of database is to provide a way to store and retrieve databaseinformation in fast and efficient manner. In addition to, hierarchicalstructured management, files are identified by their characteristics, liketype of file, topic, author.

    5. Transactional file systems

    Each disk operation may involve changes to a number of different filesand disk structures. In many cases, these changes are related, meaningthat it is important that they all be executed at the same time.Transaction processing introduces the guarantee that at any point whileit is running, a transaction can either be finished completely or revertedcompletely (though not necessarily both at any given point). This meansthat if there is a crash or power failure, after recovery, the stored statewill be consistent. This type of file system is designed to be faulttolerant, but may incur additional overhead to do so.

    6. Network file systems

    A network file system is a file system that acts as a client for a remotefile access protocol, providing access to files on a server

    Examples of network file systems include clients for the NFS, AFS, SMBprotocols, and file-system-like clients for FTP and WebDAV.

    7. Special purpose file systems

    A special purpose file system is basically any file system that is not adisk file system or network file system. This includes systems where thefiles are arranged dynamically by software, intended for such purposesas communication between computer processes or temporary file space.

    What is a Protocol?

    9

    http://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Flash_memoryhttp://en.wikipedia.org/wiki/Flash_memoryhttp://en.wikipedia.org/wiki/Transaction_processinghttp://en.wikipedia.org/wiki/Network_File_System_(protocol)http://en.wikipedia.org/wiki/Andrew_File_Systemhttp://en.wikipedia.org/wiki/Server_Message_Blockhttp://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://en.wikipedia.org/wiki/WebDAVhttp://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Computer_processhttp://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Flash_memoryhttp://en.wikipedia.org/wiki/Flash_memoryhttp://en.wikipedia.org/wiki/Transaction_processinghttp://en.wikipedia.org/wiki/Network_File_System_(protocol)http://en.wikipedia.org/wiki/Andrew_File_Systemhttp://en.wikipedia.org/wiki/Server_Message_Blockhttp://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://en.wikipedia.org/wiki/WebDAVhttp://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Computer_process
  • 7/29/2019 Dell Tech Notes

    10/22

    A protocol is a convention or standard that controls or enables the connection,communication, and data transfer between two computing endpoints. In itssimplest form, a protocol can be defined as the rules governing the syntax,semantics, and synchronization of communication. Protocols may beimplemented by hardware, software, or a combination of the two. At the

    lowest level, a protocol defines the behavior of a hardware connection.

    Common protocols

    IP (Internet Protocol) UDP (User Datagram Protocol) TCP (Transmission Control Protocol)

    DHCP (Dynamic Host Configuration Protocol) HTTP (Hypertext Transfer Protocol) FTP (File Transfer Protocol) Telnet (Telnet Remote Protocol)

    SSH (Secure Shell Remote Protocol) POP3 (Post Office Protocol 3) SMTP (Simple Mail Transfer Protocol) IMAP (Internet Message Access Protocol)

    TYPES OF NETWORKS:

    1. LAN - Local Area Network -A LANconnects network devices over arelatively short distance. A networked office building, school, or homeusually contains a single LAN, though sometimes one building willcontain a few small LANs (perhaps one per room), and occasionally a LAN

    will span a group of nearby buildings.2. WLAN - Wireless Local Area Network -a LAN based on WiFi wireless

    network technology3. WAN - Wide Area Network -As the term implies, a WANspans a large

    physical distance. The Internet is the largest WAN, spanning the Earth. AWAN is a geographically-dispersed collection of LANs. A network devicecalled a router connects LANs to a WAN. In IP networking, the routermaintains both a LAN address and a WAN address.

    4. MAN - Metropolitan Area Network - a network spanning a physical arealarger than a LAN but smaller than a WAN, such as a city. A MAN istypically owned an operated by a single entity such as a government

    body or large corporation.5. SAN - Storage Area Network, System Area Network, Server Area

    Network, or sometimes Small Area Network - connects servers to datastorage devices through a technology like Fibre Channel.

    6. CAN - Campus Area Network, Controller Area Network, or sometimesCluster Area Network - a network spanning multiple LANs but smallerthan a MAN, such as on a university or local business campus.

    10

    http://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Syntaxhttp://en.wikipedia.org/wiki/Semanticshttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/User_Datagram_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocolhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://en.wikipedia.org/wiki/TELNEThttp://en.wikipedia.org/wiki/Secure_shellhttp://en.wikipedia.org/wiki/Post_Office_Protocolhttp://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocolhttp://en.wikipedia.org/wiki/Internet_Message_Access_Protocolhttp://compnetworking.about.com/cs/wireless80211/g/bldef_wifi.htmhttp://compnetworking.about.com/od/basicnetworkingconcepts/a/cs/routers/g/bldef_router.htmhttp://compnetworking.about.com/cs/fibrechannel/g/bldef_fibrechan.htmhttp://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Syntaxhttp://en.wikipedia.org/wiki/Semanticshttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/User_Datagram_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocolhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://en.wikipedia.org/wiki/TELNEThttp://en.wikipedia.org/wiki/Secure_shellhttp://en.wikipedia.org/wiki/Post_Office_Protocolhttp://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocolhttp://en.wikipedia.org/wiki/Internet_Message_Access_Protocolhttp://compnetworking.about.com/cs/wireless80211/g/bldef_wifi.htmhttp://compnetworking.about.com/od/basicnetworkingconcepts/a/cs/routers/g/bldef_router.htmhttp://compnetworking.about.com/cs/fibrechannel/g/bldef_fibrechan.htm
  • 7/29/2019 Dell Tech Notes

    11/22

    7. PAN - Personal Area Network - is a computer network organized aroundan individual person. Personal area networks typically involve a mobilecomputer, a cell phone and/or a handheld computing device such as aPDA. You can use these networks to transfer files including email andcalendar appointments, digital photos and music.

    What is ISP?

    An Internet service provider (ISP, also called Internet access provider or IAP)is a company that offers their customers access to the Internet. The ISPconnects to its customers using a data transmission technology appropriate fordelivering Internet Protocoldatagrams, such as dial-up, DSL, cable modem ordedicated high-speed interconnects.

    ISPs may provide Internet e-mail accounts to users which allow them tocommunicate with one another by sending and receiving electronic messages

    through their ISPs' servers. ISPs may provide other services such as remotelystoring data files on behalf of their customers, as well as other services uniqueto each particular ISP.

    The number of valid host addresses available is always 2N - 2 (where N is thenumber of bits used, and the subtraction of 2 adjusts for the invalidity of thefirst and last addresses). Thus, for a class C address with 8 bits available forhosts, the number of hosts is 254.

    The larger network numberfield allowed a larger number of networks, therebyaccommodating the continued growth of the Internet.

    The IP address netmask, which is commonly associated with an IP addresstoday, was not required because the mask was implicitly derived from the IPaddress itself. Any network device would inspect the first few bits of the IPaddress to determine the class of the address.

    The method of comparing two IP addresses' physical networks did not change,however (see subnet). For each address, the network numberfield size and itssubsequent value were determined (the rest field was ignored). The networknumbers were then compared. If they matched, then the two addresses wereon the same network.

    What is DHCP?

    Dynamic Host Configuration Protocol (DHCP) is a protocol used by networkeddevices (clients) to obtain the parameters necessary for operation in anInternet Protocol network. This protocol reduces system administrationworkload, allowing devices to be added to the network with little or no manualconfiguration.

    11

    http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Datagramshttp://en.wikipedia.org/wiki/Dial-uphttp://en.wikipedia.org/wiki/DSLhttp://en.wikipedia.org/wiki/Cable_modemhttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/Servershttp://en.wikipedia.org/wiki/Data_filehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Netmaskhttp://en.wikipedia.org/wiki/Subnetworkhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Datagramshttp://en.wikipedia.org/wiki/Dial-uphttp://en.wikipedia.org/wiki/DSLhttp://en.wikipedia.org/wiki/Cable_modemhttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/Servershttp://en.wikipedia.org/wiki/Data_filehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Netmaskhttp://en.wikipedia.org/wiki/Subnetworkhttp://en.wikipedia.org/wiki/Internet_Protocol
  • 7/29/2019 Dell Tech Notes

    12/22

    What is telnet?

    Telnet (Telecommunication network) is a network protocol used on theInternet or local area network (LAN) connections. It was developed in 1969beginning with RFC 15 and standardized as IETFSTD 8, one of the first Internet

    standards. Typically, telnet provides access to a command-line interface on aremote machine.

    What is DNS?

    The Domain Name System (DNS) is a hierarchical naming system forcomputers, services, or any resource participating in the Internet. It associatesvarious information with domain names assigned to such participants. Mostimportantly, it translates human meaningful domain names to the numerical(binary) identifiers associated with networking equipment for the purpose oflocating and addressing these devices world-wide. An often used analogy to

    explain the Domain Name System is that it serves as the "phone book" for theInternet by translating human-friendly computer hostnames into IP addresses.For example, www.example.com translates to 208.77.188.166.

    What is ping?

    Ping is a computer network tool used to test whether a particular host isreachable across an IP network; it is also used to self test the networkinterface card of the computer, or as a speed test. It works by sending ICMPecho request packets to the target host and listening for ICMP echoresponse replies.

    Few Anti Virus Vendors available

    Symantec Norton Antivirus, McAfee, Avast,

    Computer Association CA, AVG, ESET, Kaspersky,

    Bit Defender, Quick Heal, Vipre, Trend Micro.

    What is a Fire Wall?

    A firewall is a dedicated appliance, or software running on another computer,which inspects network traffic passing through it, and denies or permitspassage based on a set of rules.

    A firewall's basic task is to regulate some of the flow of traffic betweencomputer networks of different trust levels. Typical examples are the Internetwhich is a zone with no trust and an internal network which is a zone of highertrust.

    12

    http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Local_Area_Networkhttp://tools.ietf.org/html/rfc15http://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/STD_8http://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Domain_namehttp://en.wikipedia.org/wiki/Telephone_directoryhttp://en.wikipedia.org/wiki/Hostnamehttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Example.comhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Internet_protocol_suitehttp://en.wikipedia.org/wiki/Internet_Control_Message_Protocolhttp://en.wikipedia.org/wiki/Packet_(information_technology)http://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Intranethttp://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Local_Area_Networkhttp://tools.ietf.org/html/rfc15http://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/STD_8http://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Domain_namehttp://en.wikipedia.org/wiki/Telephone_directoryhttp://en.wikipedia.org/wiki/Hostnamehttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Example.comhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Internet_protocol_suitehttp://en.wikipedia.org/wiki/Internet_Control_Message_Protocolhttp://en.wikipedia.org/wiki/Packet_(information_technology)http://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Intranet
  • 7/29/2019 Dell Tech Notes

    13/22

    What are Cookies?

    HTTP cookies, more commonly referred to as Web cookies, tracking cookies orjust cookies, are parcels of text sent by a server to a Web client (usually abrowser) and then sent back unchanged by the client each time it accesses that

    server. HTTP cookies are used for authenticating, session tracking (statemaintenance), and maintaining specific information about users, such as sitepreferences or the contents of their electronic shopping carts.

    What is Antivirus ?

    Antivirus software are computer programs that attempt to identify, neutralizeor eliminate malicious software. The term "antivirus" is used because theearliest examples were designed exclusively to combat computer viruses;however most modern antivirus software is now designed to combat a widerange of threats, including worms, phishing attacks, rootkits, Trojans, often

    described collectively as malware.

    How do u go tosafe mode ?

    To use a Safe Boot option, follow these steps:

    1. Restart your computer and start pressing the F8 key on your keyboard.On a computer that is configured for booting to multiple operatingsystems, you can press the F8 key when the Boot Menu appears.

    2. Select an option when the Windows Advanced Options menu appears,and then press ENTER.

    3. When the Boot menu appears again, and the words "Safe Mode" appearin blue at the bottom, select the installation that you want to start, andthen press ENTER.

    Description of Safe Boot options

    Safe Mode (SAFEBOOT_OPTION=Minimal): This option uses a minimal setof device drivers and services to start Windows.

    Safe Mode with Networking (SAFEBOOT_OPTION=Network): This optionuses a minimal set of device drivers and services to start Windowstogether with the drivers that you must have to load networking.

    Safe Mode with Command Prompt(SAFEBOOT_OPTION=Minimal(AlternateShell)): This option is the same asSafe mode, except that Cmd.exe starts instead of Windows Explorer.

    Enable VGA Mode: This option starts Windows in 640 x 480 mode by usingthe current video driver (not Vga.sys). This mode is useful if the displayis configured for a setting that the monitor cannot display.Note Safe mode and Safe mode with Networking load the Vga.sys driverinstead.

    13

    http://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Web_serverhttp://en.wikipedia.org/wiki/Client_(computing)http://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Electronic_shopping_carthttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Rootkithttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Web_serverhttp://en.wikipedia.org/wiki/Client_(computing)http://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Electronic_shopping_carthttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Rootkithttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Malware
  • 7/29/2019 Dell Tech Notes

    14/22

    Last Known Good Configuration: This option starts Windows by using theprevious good configuration.

    Directory Service Restore Mode: This mode is valid only for Windows-based domain controllers. This mode performs a directory service repair.

    Debugging Mode: This option turns on debug mode in Windows.

    Debugging information can be sent across a serial cable to anothercomputer that is running a debugger. This mode is configured to useCOM2.

    Enable Boot Logging: This option turns on logging when the computer isstarted with any of the Safe Boot options except Last Known GoodConfiguration. The Boot Logging text is recorded in the Ntbtlog.txt filein the %SystemRoot% folder.

    Starts Windows Normally: This option starts Windows in its normal mode. Reboot: This option restarts the computer. Return to OS Choices Menu: On a computer that is configured to starting

    to more than one operating system, this option returns to the Boot

    menu.

    An environment variable is set when you use one of the Safe Boot options. Theenvironment variable is SAFEBOOT_OPTION. This variable is set to eitherNetwork or to Minimal.

    What is a boot device?

    Devices that can boot a computer are usually boot disks or boot drives(normally a hard drive, but can be a floppy disk or a CD).

    What is a Device Manager?

    The Device Manager is a Control Panelapplet in Microsoft Windows operatingsystems. It allows users to view and control the hardware attached to thecomputer. When a piece of hardware is not working, the offending hardware ishighlighted for the user to deal with. The list of hardware can be sorted byvarious criteria.

    For each device, users can:

    Supply device drivers for the hardware

    Enable or disable devices Tell Windows to ignore malfunctioning devices View other technical properties

    14

    http://simple.wikipedia.org/wiki/Hard_drivehttp://simple.wikipedia.org/wiki/Floppy_diskhttp://simple.wikipedia.org/wiki/Compact_diskhttp://en.wikipedia.org/wiki/Control_Panel_(Windows)http://en.wikipedia.org/wiki/Applethttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Device_driverhttp://simple.wikipedia.org/wiki/Hard_drivehttp://simple.wikipedia.org/wiki/Floppy_diskhttp://simple.wikipedia.org/wiki/Compact_diskhttp://en.wikipedia.org/wiki/Control_Panel_(Windows)http://en.wikipedia.org/wiki/Applethttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Device_driver
  • 7/29/2019 Dell Tech Notes

    15/22

    Windows 2000 and Windows XP:

    1. Right-click My Computer then select Properties2. Select the Hardware tab3. Click the Device Manager button

    What is Msconfig?

    MSConfig, or Microsoft System Configuration Utility, (or simply SystemConfiguration in Windows Vista) is a utility to troubleshoot the Windowsstartup process. It is bundled with all Microsoft Windowsoperating systemssince Windows 98 except Windows 2000. Windows 95 and Windows 2000 userscan download the utility as well, although it was not designed for them.MSConfig modifies which programs run at startup, edits certain configurationfiles, and simplifies controls over Windows services.

    Explain Registry.

    The Windows registry is a directory which stores settings and options for theoperating system for Microsoft Windows 32-bit versions, 64-bit versions, andWindows Mobile. It contains information and settings for all the hardware,operating system software, most non-operating system software, users,preferences of the PC, etc. Whenever a user makes changes to Control Panelsettings, file associations, system policies, or most installed software, thechanges are reflected and stored in the registry. The registry also provides awindow into the operation of the kernel, exposing runtime information such asperformance counters and currently active hardware.

    What are Registry Hives?

    The Registry is split into a number of logical sections, or "hives". Hives aregenerally named by their WindowsAPI definitions, which all begin "HKEY".

    A hive is a logical group of keys, subkeys, and values in the registry that has aset of supporting files containing backups of its data.

    Each time a new user logs on to a computer, a new hive is created for that userwith a separate file for the user profile. This is called the user profile hive. A

    user's hive contains specific registry information pertaining to the user'sapplication settings, desktop, environment, network connections, and printers.User profile hives are located under the HKEY_USERS key.

    What are service packs?

    15

    http://en.wikipedia.org/wiki/Windows_2000http://en.wikipedia.org/wiki/Windows_XPhttp://en.wikipedia.org/wiki/My_Computerhttp://en.wikipedia.org/wiki/Utility_softwarehttp://en.wikipedia.org/wiki/Bootinghttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Operating_systemshttp://en.wikipedia.org/wiki/Windows_98http://en.wikipedia.org/wiki/Configuration_filehttp://en.wikipedia.org/wiki/Configuration_filehttp://en.wikipedia.org/wiki/Windows_servicehttp://en.wikipedia.org/wiki/Directory_(database)http://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Windows_Mobilehttp://en.wikipedia.org/wiki/Hardwarehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Control_Panel_(Windows)http://en.wikipedia.org/wiki/File_associationhttp://en.wikipedia.org/wiki/Installation_(computer_programs)http://en.wikipedia.org/wiki/Windows_APIhttp://en.wikipedia.org/wiki/Application_programming_interfacehttp://en.wikipedia.org/wiki/Windows_2000http://en.wikipedia.org/wiki/Windows_XPhttp://en.wikipedia.org/wiki/My_Computerhttp://en.wikipedia.org/wiki/Utility_softwarehttp://en.wikipedia.org/wiki/Bootinghttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Operating_systemshttp://en.wikipedia.org/wiki/Windows_98http://en.wikipedia.org/wiki/Configuration_filehttp://en.wikipedia.org/wiki/Configuration_filehttp://en.wikipedia.org/wiki/Windows_servicehttp://en.wikipedia.org/wiki/Directory_(database)http://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Windows_Mobilehttp://en.wikipedia.org/wiki/Hardwarehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Control_Panel_(Windows)http://en.wikipedia.org/wiki/File_associationhttp://en.wikipedia.org/wiki/Installation_(computer_programs)http://en.wikipedia.org/wiki/Windows_APIhttp://en.wikipedia.org/wiki/Application_programming_interface
  • 7/29/2019 Dell Tech Notes

    16/22

    A service pack (in short SP) is a collection of updates, fixes and/orenhancements to a software program delivered in the form of a singleinstallable package.

    What is a Task Manager?

    A task manager is a program used to provide information about the processesand programs running on a computer, as well as the general status of thecomputer. It can also be used to terminate processes and programs, as well aschange the processes' priority.

    Use CTRL+ALT+DEL to invoke Task Manager.

    Reasons why a computer is slow.

    1.Start up overload: As you add additional programs, they claim start-up

    status quickly and quietly. The more programs you have that are loading atstart-up, the slower the start-up.

    2.Spyware: Malicious programs that stealthily embed themselves into yoursoftware. They are installed in your software, without your knowledge, in manyways. Through e-mail especially, the ones that are multi-forwarded.

    3.The Registry: If your registry is corrupted or bloated, there could be a BSODin your future.

    4.Badly Fragmented Hard Drive. Over time, your computer's files can be

    scattered over your hard drive; this is called fragmentation and a cause for filesearches to be slower than usual.

    5. Poor Security Software. A large number of security programs, and suites,are bloated with software and demand a great deal of system resource andmemory.

    6. Remnants of Uninstalled Programs.

    7. The Page File. The Windows Page File is a temporary source of memoryused by the system in processing functions. It is actually a buffer that is used

    for "wiggling room." If your page file is too small, your operating system willnot have enough room to move and the result will be poor performance anderror message.

    8. Too Many Windows and Temporary Files. Your hard drive could becrammed with many useless files left over from re-installs, and just generaluse.

    16

    http://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Process_(computing)http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Priorityhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Process_(computing)http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Priority
  • 7/29/2019 Dell Tech Notes

    17/22

    9. Viruses or any ITD.

    10. Hardware Problems. There are assortments of things that can happen toyour hardware: wear and tear, over heating and dust.

    Explain Printer Spool issues.

    Each time you execute a command to print a document or file, your printer-driver software first converts your document information into a language theprinter can understand, and this translated information creates the map orinstructions the printer needs to place the ink (or toner) in the right places onthe paper.

    In order to do this conversion, and to make an accurate map, your driversoftware tends to make a rather lengthy set of instructions, called a "SpoolFile". This temporary file is written to your printer's Printer Spool Folder, or

    often called a "Temporary Files Folder", within your printer's folder inside theExtensions folder of your Startup Volume's System Folder.

    The instructions needed to print a document tend to be complicated, and thusneed a lot of disk-space to store that temporary information. The larger andmore complicated the original file is, the larger and more complex the SpoolFile becomes, and the more likely you are to run out of available free space onyour hard drive(s) to host it.

    How to install software?

    Manual:- After inserting the CD 1. Open My Computer

    2. Open the CD drive

    3. Click on Setup.exe

    A pop-up screen will appear, follow the instructions from there.

    Autorun :- After inserting the CD

    A pop-up screen will appear automatically, follow the instructions from there.

    How to uninstall software?

    1. Go to Add/remove programs in control panel.2. Select the software that has to be uninstalled and click on remove.3. A pop-up screen will appear, follow the instructions.

    Or go to the location where the software is stored and execute uninstall.exe.

    17

  • 7/29/2019 Dell Tech Notes

    18/22

    Parts of Computer: Power Supply, Motherboard, Processor, Hard Disk Drive,RAM(Random Access Memory), CD/DVD-ROM drive, USB ports, Video/Sound

    Card(integrated or Cards on Slots),

    Peripherals: Monitor, Keyboard, Mouse, Printer, External HDD/Pen Drive (USB

    devices), Modem, Scanners.

    Operating System:

    1. Operating System: is the software that manages/helps run the computerhardware & the system.

    Types : Windows 95, 98, Windows 2000 professional, Windows XPHome & Professional, Windows Vista, Linux & Unix

    Difference b/w Win XP & Vista

    Features Windows XP Windows Vista

    Data Security(Firewall) Medium High

    Graphical Interface Good Better

    Restore & Back-upFunctions

    Medium High

    H/W Requirements Min 512MB RAM Min 1GB RAM up to 4GBRAM

    Instant Search NA Can easily search and find

    everything on your PC andthe Internet

    2. MS Office Software: MS Word, MS Excel, MS PowerPoint, MS Access, & MS

    Outlook for exchanging mails

    3. Internet Browsers: Helps in navigating through all the websites on the

    internet

    18

  • 7/29/2019 Dell Tech Notes

    19/22

    Types of browsers: Internet Explorer, Opera, Mozilla Firefox,

    Google Chrome.

    4. Anti-Virus: Software which helps to prevents the entry of virus, detects the

    virus & removes the virus from the system.

    List of Anti-Virus : Symantec Norton, McAfee, Kaspersky, Quickheel.

    5. Instant Messaging: This is a real time application where the messages are sent to

    other users on the system ( one to one)

    Types: Google Talk, MSN Messenger, Yahoo Messenger, Office

    Communicator, Skype.

    6. Media Players: This helps in playing music/video files.

    Types: Winamp, Real player, Windows Media Player, Nero Media Player.

    7. File Formats :

    Pictures : Bitmap, JPEG, JIF, MPEG, TIF

    Music : .WMA, .Mp3, .Avi

    Documents : .doc, .xls, .ppt,

    8. Scanners: Device that captures images from photographic prints, posters,magazine pages.

    Scanners are attached to the computer with a small computer system interface (SCSCI).

    9. Fax: is the telephonic transmission of scanned in printed text or images usually to

    a telephone number associated with the printer or any other output devices.

    Difference b/w core 2 duo & Dual core processors

    Core 2 duo id Intels 2nd generation, hence its called Core 2 Duo uses fast & less powerconsuming technology.

    Dual Core generic tem referring to any processor with 2 processors in one unit

    General Questions:

    1. BIOS: Basic Input & Output System: It has the entire hardware configuration

    stored on it. Use Delete Key to enter BIOS of any computer.

    2. BSOD : Blue Screen of Death : common error in Windows Operating System.

    19

  • 7/29/2019 Dell Tech Notes

    20/22

    Reasons for BSOD -

    Faulty memory, power supply issues, overheating of components, or hardware

    running beyond its specification limits.

    Hard Disk failure or OS failure.

    When the floppy/CD ROM/other removable memory devices are removed whilebeing used.

    3. Computer running slow:

    Go to Task Manager Processor Tab - Delete the unwanted programs running at

    the background

    Check the usage of the processor

    a. Hard Disk Drive space is less.

    Solution: Remove all the unwanted files & programs from the Hard drive.

    b. Data Corruption while installing or uninstalling the s/w programs.

    Solution: Run Scan Disk or Disk Defragmenter

    c. Bad hardware:

    Solution: verify the Device Manager does not have any device driver conflicts.

    4. Hows the Resolution of the Screen Measured: Pixels

    Resolution of the Screen can be changed through the desktop properties where we can

    move the slide bar to change the resolution: 1280x768, 1280x1024.

    3 Device Manager: It is a software that gives the status of a hardware device.i.e.: .1) Shows each & every hardware that is present in the P.C

    2) Shows the properties of each & every hardware device.

    3 HOW TO INSTALL PROGRAMME: (a) StartSettingsControl

    PanelADD/REMOVE Programme

    Insert CD Rom into CD Drive Installation Wizard Follow Instructions

    1

    2 New System Configuration::1. Processor: - Intel Pentium IV Dual Core

    2. Speed: --- 3 GHz4. Hard Disk: ---160 GB SATA

    5. 2 GB DDR-2 RAM

    20

    http://en.wikipedia.org/wiki/Memory_(computers)http://en.wikipedia.org/wiki/Memory_(computers)
  • 7/29/2019 Dell Tech Notes

    21/22

    ISP CONNECTIONS|

    ^

    *Dial Up/ Narrowband * Broadband /P2P

    1. Uses a Telephone Line 1. Uses optical Fibre Cables

    2. Speed-56 Kbps 2. Speed-256 Kbps or more3. Cannot use both phone &internet 3.Can Use Both at a time

    @ The same time

    IP Address :: A number which uniquely identifies the complete on a network.

    To find IP address:: StartRunType CommandDOS Screen Type ipconfig Enter

    What Operating System:It is an interface between the user & the computer .Eg: Windows98, 2000,XP, Linux, Unix, Windows Vista is the latest version of O.S

    What is fishing? Phishing

    In the field of computer security, phishing is the criminally fraudulent process ofattempting to acquire sensitive information such as usernames, passwords and credit card

    details by masquerading as a trustworthy entity in an electronic communication.

    What is the task manager?

    Windows Task Manager is a task manager application included with Microsoft WindowsNT family of operating systems that provides detailed information about computer

    performance and running applications, processes and CPU usage, commit charge and

    memory information, network activity and statistics, logged-in users, and systemservices. The Task Manager can also be used to set process priorities, processor affinity,

    forcibly terminate processes, and shut down, restart, hibernate or log off from Windows.

    Windows Task Manager was introduced with Windows NT 4.0, previous versions of

    Windows NT included the Task List application, which had far fewer features. The tasklist was capable of listing currently running processes and killing them, or creating a new

    process.

    How long will it take to install windows XP in the computer?

    Depends on RAM and Processor I would say more than 25-45 mins

    21

  • 7/29/2019 Dell Tech Notes

    22/22

    What is DSL Cable port?

    DSL - digital subscriber loop/ digital subscriber line

    DSL can be used at the same time and on the same telephone line with regular telephone,as it uses high frequency, while regular telephone uses low frequency

    What is Phone line and modem line?

    Both r the same

    What is Bios?

    In computing, the Basic Input/output System (BIOS)[1] , also known as the SystemBIOS, is a de facto standard defining a firmware interface for IBM PC Compatible

    computers.[2]

    The BIOS is boot firmware, designed to be the first code run by a PC when powered on.The initial function of the BIOS is to identify, test, and initialize system devices such as

    the video display card, hard disk, and floppy disk and other hardware. This is to prepare

    the machine into a known state, so that software stored on compatible media can be

    loaded, executed, and given control of the PC.[3] This process is known as booting, or

    booting up, which is short for bootstrapping

    How do you insert a hard disk in a CPU

    Connect it to IDE bus or EIDE bus if available or connect to sata port (stupid question)

    To find IP address: StartRunType CommandDOS Screen Type ipconfig

    Enter

    ISDN:: Integrated services Digital Network (Broadband connection through

    telephones)

    SMPT:: Simple mail Transfer Protocol (for Sending mail) POP3 : Post Office Protocol (for receiving mails)

    Default mail client : Outlook Express

    Firewall: It protects the system from hackers.

    Antivirus: It protects the system against virus-attack.