Вы находитесь на странице: 1из 24

The frequently asked questions for internet concepts in google

1. How a google search works?


Google has three distinct parts:
1. Googlebot, a web crawler that finds and fetches web pages.
2. The indexer that sorts every word on every page and stores the resulting index of
words in a huge database.
3. The query processor, which compares your search query to the index and recommends
the documents that it considers most relevant.
The web crawler used by google is googlebot and yahoo is slurp and msn is msn bot.
web crawler (also known as a Web spider or Web robot) is a program or automated script which
browses the www in a methodical, automated manner.
The query processor has several parts, including the user interface (search box), the “engine” that
evaluates queries and matches them to relevant documents, and the results formatter.
Search engines use software called spiders which comb the internet looking for documents and
their web address. The documents and web addresses are collected and sent to the search engine's
indexing software. The indexing software extracts information from the documents, storing it in
a database. The kind of information indexed depends on the particular search engine. Some index
every word in a document and some index only the document title only. When you perform a
search by entering keywords, the database is searched for documents that match. The search
engine assembles a webpage that lists the results as hypertext links.

2. What is the difference between http and https?

http is hyper text transfer protocol which is responsible for transmitting and receiving
information across the Internet where as https is secure http, which is used exchanging
confidential information with a server, which needs to be secured in order to prevent
unauthorized access.

https, or ​secure http​, was developed by Netscape ​corporation to allow authorization and secured
transactions. the default port for http is 80 and https is 443.Https is used in many situations, such
as log-in pages for ​banking​, forms, ​corporate log ons, and other applications in which data needs
to be secure.

3.What happens when a website address is given in the web browser.

A simple exchange between the client machine and Web server goes like this:
1. The client's browser dissects the URL in to a number of separate parts, including address, path
name and protocol.

2. A Domain Name Server (DNS) translates the domain name the user has entered in to its IP
address, a numeric combination that represents the site's true address on the Internet (a domain
name is merely a "front" to make site addresses easier to remember).
3. The browser now determines which protocol (the language client machines use to
communicate with servers) should be used. Examples of protocols include FTP, or File Transfer
Protocol, and HTTP, HyperText Transfer Protocol.

4. The server sends a GET request to the Web server to retrieve the address it has been given.
For example, when a user types http://www.example.com/1.jpg, the browser sends a GET 1.jpg
command to example.com and waits for a response. The server now responds to the browser's
requests. It verifies that the given address exists, finds the necessary files, runs the appropriate
scripts, exchanges cookies if necessary, and returns the results back to the browser. If it cannot
locate the file, the server sends an error message to the client.

5. The browser translates the data it has been given in to HTML and displays the results to the
user.
This process is repeated until the client browser leaves the site.

4. Difference between .jpeg and .gif?

JPEG stands for "Joint Photographic Experts Group".Benefits of jpeg are Small image size,
viewable from the internet , uses millions of colors and is the perfect format for images.
downfalls of jpeg are high compression loss and Every time a JPEG is saved, it loses more and
more of the picture.

GIF images are truly the internet standard for any type of small, simple file. GIF stands for
Graphics Interchange Format. The most common use for a GIF is for menu buttons or icons for a
webpage. The reason being that GIFs are extremely tiny in file s ize and have no complex colors,
so they load almost instantly on any webpage. Benefits of gif are Supported by all web browsers
,Very small file size,Quick to load.Only basic colors can be used. Downfalls of gif are Makes
complex pictures look horrible,No detail allowed in images

5. difference between .exe and .dll?

A dynamic link library (DLL) is a collection of small programs, any of which can be called when
needed by a larger program that is running in the computer. The advantage of DLL files is that,
because they don't get loaded into random access memory together with the main program, space
is saved in RAM. When and if a DLL file is needed, then it is loaded and run. For example, as
long as a user of Microsoft Word is editing a document, the printer DLL file does not need to be
loaded into RAM. If the user decides to print the document, then the Word application causes the
printer DLL file to be loaded and run.
Exe files can be anything. Almost everything you run on your computer is started by an exe file.
They contain executable code for a computer to run and can do anything.exe runs on its own and
the dll file is linked or referenced to the exe at run time. An EXE can run independently, whereas
DLL will run within an EXE. DLL is an in-process file and EXE is an out-process file. exe use
by End User like-Client
.Dll can not use by End User.

6. Difference between .exe and .msi

msi file is created by Windows Installer for a silent (unattended) installation. It contains a record
of all the keystrokes required to complete the installation. MSI stands for MicroSoft Installer.

Windows Installer: Microsoft's choice for installing applications on a Windows system.

Msi files are windows installer files. MSI files can only be installations. EXE files can be
literally anything that can run on your computer.

7. What is spyware?

Spyware is any software or malware used to spy or track your computer activity. spyware
may come bundled with downloads of free software or come in the form of a cookie via a
website and this spyware may track your internal activity or may steal secret account
usernames and passwords and credit card numbers. Because of the spyware in the system the
system performance may be decreased and also annoying popups may come on ur pc.

8. What is the difference between virus and worms

Worms are like malware with destructive codes. Worms are able to mutate or replace their
own code by automatically which makes worms very dangerous, difficult to find and hard to
delete. Similar to viruses, worms can spread to other computers by secretly and automatically
emailing themselves to other internet users in your address book.Main difference between
worms and viruses is that a worm will replace your computer files rather than simply
inserting their code into your files so a worm is somewhat difficult to remove when
compared to virus.

9.What is a trojan?

Trojans install themselves secretly onto your computer, most often through your
downloading a simple mail attachment often .avi , .pif, .exe, .jpgMost Trojans are able to
gain complete control over you pc after installation. With this control the the Trojan and the
hacker behind it may change your system settings, delete important files and steal your
passwords and watch your computer activity.

10. Difference between .wave and .mp3?

.wav is a older format designed by microsoft to play short snippets of sound on any audio
enabled computer. They are bulky, simple and any computer can play them. for playing these
.wav files no software is not needed. MP3 are good files and compressed when compared to
.wav files. They are easy for uploading. MP3 are for quicker transfer over the internet. it is a
lossy data compression and insignificant data is removed and there by decreasing the file size
to 1/7 of the file size of .wav file. Generally the size of .wav file is 40 to 50 mb.

11. What is a cookie and what are the advantages and disadvantages ?

A message given to a web browser by a web server The browser stores the message in a text file
The message is then sent back to the server each time the browser requests a page from the
server. When you enter a website using cookies, you may be asked to fill out a form providing
such information as your name and interests. This information is packaged into a cookie and sent
to your Web browser which stores it for later use. The next time you go to the same Web site,
your browser will send the cookie to the web server. The server can use this information to
present you with custom Web pages.

The disadvantage of cookies are because the user information is stored in a text file in the
computer so it is easy for any spyware program to track the cookies which were present in the
computer.

12. What is the path of the cookies in computer?

C:/​documents and settings/ username/ local settings/ cookies

13. What are temporary interent files ?


14.

Temporary Internet Files is a directory on microsoft windows computer systems. The directory is
used by internet explorer to cache pages on websites visited by the user. This allows such
websites to load quicker the next time they are visited

Each time a user visits a website using Microsoft Internet Explorer, files downloaded with each
web page (including html images cascading style sheets and java scripts ) are saved to the
Temporary Internet Files folder, created a cache of the web page on the local computer's
harddisk. The next time the user visits the cached website, only changed content needs to be
downloaded from the Internet; the unchanged data is available in the cache.

Despite the name 'temporary', the cache of a website remains stored on the hard disk until the
user manually clears the cache. This is often regarded as a privacy issue because anyone with
access to the computer can view the cache.

14. What is the path of temporary internet files

C:/​ documents and settings /user name /local settings / temporary interent files .

15. What is a firewall?


A system designed to prevent unauthorized access to or from a private network Firewalls can be
implemented in both hardware and software or a combination of both. Firewalls are frequently
used to prevent unauthorized users from accessing private networks connected to the Internet,
especially intranets All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security criteria. A
firewall is considered a first line of defense in protecting private information. A firewall protects
your network from unwanted Internet traffic. The primary functions of a firewall are to let good
traffic pass through while ‘bad’ traffic gets blocked.

16. What is proxy ?


A proxy server (or proxies) is a normal computer that hides the identity of computers on its
network from the Internet. Which means that only the address of the proxy server is visible to the
world and not of those computers that are using it to browse the Internet.

A server that sits between a client application such as a web browser and a real server. It
intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards
the request to the real server.
  proxy servers are specialized web servers that allow web browsers to receive web pages from
web servers without communicating with them directly. Proxy servers are often used to provide
more secure web access in organizations; the proxy server is allowed to connect to the Internet,
but the individual web browsers are only allowed to "talk" to the proxy server. When there are
many users sharing a single proxy server, the proxy server can also speed up web browsing by
caching popular pages.

17.How do you access or change the username and password of a particular user in windows
operating system?

To create any user in windows operating systems we should go to the computer management tool
which can be opened by going to run and type compmgmt.msc or right click on my computer
and then manage and then go to local users and groups and click users form there create a new
user account and give the password.

16. What is the difference between history cache cookies


In history what are all the websites that were viewed by the users is stored. The information
consists of the website name and the date and time it was accessed by the user of a particular
computer.
Each time a user visits a website using Microsoft Internet Explorer, files downloaded with each
web page (including html images cascading style sheets and java scripts ) are saved to the
Temporary Internet Files folder, created a cache of the web page on the local computer's
harddisk. The next time the user visits the cached website, only changed content needs to be
downloaded from the Internet; the unchanged data is available in the cache.

A message given to a web browser by a web server The browser stores the message in a text file
The message is then sent back to the server each time the browser requests a page from the
server. The cookie stores all the user information like username, password, and address and all
the information which was given by the user .

16. What are different ways of entering windows editor

Windows editor is nothing but the registry editor which contains all software, hardware and all
system settings and all the configuration information of the computer. We can open registry
editor by going to c:/windows/system32/regedit
Or go to run from start menu and then give regedit.

16. how to disable the script ?

go to tools option in internet explorer and then select internet options and then go to security tab
and then click internet web content zone and then select custom level and then scroll down to
scripting section and then click disable under active scripting and scripting of java applets and
again click ok.

16. How do you set the path of any software

Go to mycomputer properties and then go to the advanced tab then click the environment
variables and then click new and give the variable name and variable value of the software you
are setting the path.

16. how to find the code in .exe files

You cannot simply open up an .EXE like a text file and start editing. If you want to change
something in an EXE file, you may be able to do this by changing its resources with ​Resource
Tuner​. This way, you can change the interface of the program in that EXE file. You may also
want to translate a program to your native language. But you will not be able to modify the
actual code in any way.
Resource Tuner lets you open Windows executable files such as .EXE, .DLL, Device Drivers
(.SYS), OCX Controls, and several others. Once inside, you can change the look of the icons,
cursors, dialogs, buttons, sounds, animations and other elements of the Windows user interface
by editing and replacing resources in the executable files. EXE files are not plain ASCII files that
you can easily edit.

A hex editor (or ​binary file editor or ​byte editor​) is a type of ​computer program that allows a user
to manipulate ​binary (normally non-plain text) ​computer files​. Hex editors that were designed to
edit ​sector​ data from ​floppy​ or ​hard disks​ were sometimes called ​sector editors​ or ​disk editors​.

FlexHex is an awesome hex editor program specially designed to help you securely edit binary
files, OLE compound files, logical devices, and physical drives. This is a well designed, rock
solid piece of software, with tons of features and an excellent, easy to use interface.

16. can you open msaccess file from ms excel

In many cases, it is desirable or necessary to export data from your MS Access Database to a MS
Excel Spreadsheet format. To get the appropriate data, the data you want on the Excel
spreadsheet, from a table in Access, the first step is to create a query. A query is nothing more
than a command given to the database requesting the information you are asking for

In this database, the table "contacts" is where we are going to query our data. The following
picture shows the Datasheet View of the table Contacts.

To create a query, open the Database Window, shown below. Click on the queries button. This
will show all the queries in the database and two other Create Query selections in the window.
Along the top tool bar there are also three other choices; Open, Design and New. Click the New
button.

You will now be asked a series of questions. The first box to appear will give you five choices.
Highlight the top choice, Design View and click OK. Two boxes will now open. The first one is
the query; the second one is asking which table(s) you wish to use in the query. Where it is
possible to use more than one table in a query, for this example we will only select the Contacts
table. Highlight Contacts and click the Add button, then click the Close button. This will leave
the query window open with a small window representing the table in the upper portion of the
query window.

In the small window that represents the table Contacts, you will see that each column of data is
represented. The lower half of the query window represents the data that the query will "show".
Double click on each of the data points that you will ultimately export to your Excel spreadsheet
and to your Mail M Merge Wizard. Your query should now look like this:

To test the query, press the "!" button on the tool bar. The data from the table will be shown to
you in datasheet view. If the data is correct, this is almost what your spreadsheet will look like.
Save the query as "qry_addbook".

The next step is to build a macro. On your database window, select Macros. Click the New
button on the tool bar. This will open the new macro in Design View. Click on the first Action
Item drop down box. Select OutputTo. The arguments will appear in the bottom half of the form.
Select the following Action Arguments:

Object Type: Query


Object Name: qry_addbook
Output Format: Microsoft Excel (*.xls)
Output File: Leave Blank
Auto Start: Yes
Template File: Leave Blank
Encoding: Leave Blank
When this macro is run, Access will create an Excel file based on the query in the argument. By
leaving the Output File argument blank, Access will prompt the user to name the new Excel file.
By selecting Auto Start to Yes, Access will open Excel and the new spreadsheet. Save your
macro as "mcro_addbook". Test your macro by clicking the "!" button on the tool bar. You
should be prompted to name the new file, and Excel should open with the new file opened.

For ease of use, it is desirable to create an easy way to run this new macro. A button on a
database's Main Form or Switchboard is a common way to accomplish this. Close the macro
window and open the Main Form or Switchboard of the database.

16. can you open ie4, ie5, ie6, ie7 simultaneously on a single computer ? or how to run
multiple versions of ie on a single computer ?

. Using both Internet Explorer 6 and 7 might be useless to a normal user but very helpful to a
web developer who needs to make sure his or her sites are compatible with different browsers.

To have both IE6 and IE7 version installed on your computer, you need to install the standalone
versions of Internet Explorer. By that I mean there are automatic standalone IE installers that you
can download and install to get different version of Internet Explorer running on your PC in no
time. Here are the two possible download scenarios:

If you have installed IE7 on your computer and would like to install older versions of IE, you
should download the multiple installer. This program can install your choice of standalone IE3
IE4.01 IE5 IE5.5 and IE6.

If you already have Internet Explorer 6 installed and wish to install IE7 while keeping IE7 then
you should download Internet Explorer 7 standalone ​Installer​. Simply download and run the
program and it will automatically install standalone IE7.

16. what is registry editor ?

The Registry is a database used to store settings and options for the 32 bit versions of Microsoft
Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for
all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a
Control Panel settings, or File Associations, System Policies, or installed software, the changes
are reflected and stored in the Registry.

The physical files that make up the registry are stored differently depending on your version of
Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows
directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional
CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the
%SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a
tool commonly known as a "Registry Editor" to make any changes.

Registry Editor is an advanced tool for viewing and changing settings in your system registry,
which contains information about how your computer runs. Windows stores its configuration
information in a database (the registry) that is organized in a tree format. Although Registry
Editor enables you to inspect and modify the registry, normally you do not need to do so, and
making incorrect changes can break your system. The navigation area of the Registry Editor
displays folders, each of which represents a predefined key on the local computer.

Folder/predefined key Description


HKEY_CURRENT_USER Contains the root of the configuration information for the
user who is currently logged on. The user's folders, screen
colors, and Control Panel settings are stored here. This
information is referred to as a user's profile.
HKEY_USERS Contains the root of all user profiles on the computer.
HKEY_CURRENT_USER is a subkey of
HKEY_USERS.
HKEY_LOCAL_MACHINE Contains configuration information particular to the
computer (for any user).
HKEY_CLASSES_ROOT Is a subkey of HKEY_LOCAL_MACHINE\Software. The
information stored here ensures that the correct program
opens when you open a file by using Windows Explorer.
HKEY_CURRENT_CONFI Contains information about the hardware profile used by
G the local computer at system

16. what is the difference between web server and web browser ?

A Web browser is a software application that enables a user to display and interact with text,
images, and other information typically located on a web page at a website on the www or a lan .
Text and images on a Web page can contain hyperlinks to other Web pages at the same or
different website. Web browsers allow a user to quickly and easily access information provided
on many Web pages at many websites by traversing these links. Web browsers format html
information for display, so the appearance of a Web page may differ between browsers.

Examples of web browsers are internet explorer, firefox, netscape, opera, safari etc.

A Web Server is a computer on the World Wide Web (connected to the Internet Backbone) that
stores HTML documents that can be retrieved via a Web browser.

A computer that delivers (serves up) Web pages. Every Web server has an IP address and
possibly a domain name. For example, if you enter the URL
http://www.pcwebopedia.com/index.html in your browser, this sends a request to the server
whose domain name is pcwebopedia.com. The server then fetches the page named index.html
and sends it to your browser. Any computer can be turned into a Web server by installing server
software and connecting the machine to the Internet.

Examples of web server softwares are for linux operating system the apache web server is used
and for windows operating sytem internet information server is used.

26.how to improve the system performance

4 ways to improve system performance

Free Up Disk Space

By freeing disk space, you can improve the performance of your computer. The Disk Cleanup
tool helps you free up space on your hard disk. The utility identifies files that you can safely
delete, and then enables you to choose whether you want to delete some or all of the identified
files.

Use Disk Cleanup to:


Remove temporary Internet files.


Remove downloaded program files (such as Microsoft ActiveX controls and Java
applets).


Empty the Recycle Bin.


Remove Windows temporary files.


Remove optional Windows components that you don't use.


Remove installed programs that you no longer use.
Tip: Typically, temporary Internet files take the most amount of space because the browser
caches each page you visit for faster access later.

To use Disk Cleanup

1 Click Start, point to All Programs, point to Accessories, point to System Tools,
. and then click Disk Cleanup. If several drives are available, you might be
prompted to specify which drive you want to clean.

Disk Cleanup calculates the amount of space you will be able to free.

2 In the Disk Cleanup for dialog box, scroll through the content of the Files to
. delete list.
Choose the files that you want to delete.

3 Clear the check boxes for files that you don't want to delete, and then click OK.
.

4 When prompted to confirm that you want to delete the specified files, click Yes.
.
After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your
computer cleaner and performing better.

Speed Up Access to Data

Disk fragmentation slows the overall performance of your system. When files are fragmented,
the computer must search the hard disk when the file is opened to piece it back together. The
response time can be significantly longer.

Disk Defragmenter is a Windows utility that consolidates fragmented files and folders on your
computer's hard disk so that each occupies a single space on the disk. With your files stored
neatly end-to-end, without fragmentation, reading and writing to the disk speeds up.
When to Run Disk Defragmenter

In addition to running Disk Defragmenter at regular intervals, optimally monthly, certain events
warrant running the utility outside of the monthly rule of thumb.

You should run Disk Defragmenter under the following circumstances:


You add a large number of files.


Your free disk space nears 15 percent.


You install new programs or a new version of
Windows.
To use Disk Defragmenter:

1 Click Start, point to All Programs, point to Accessories, point to System Tools,
. and then click Disk Defragmenter.

Click Analyze to start the Disk Defragmenter.

2 In the Disk Defragmenter dialog box, click the drives that you want to
. defragment, and then click the Analyze button.
After the disk is analyzed, a dialog box appears, letting you know whether you
should defragment the analyzed drives.
Tip: You should analyze a volume before defragmenting it to get an estimate of
how long the defragmentation process will take.
3 To defragment the selected drive or drives, click the Defragment button.
. After the defragmentation is complete, Disk Defragmenter displays the results.

4 To display detailed information about the defragmented disk or partition, click


. View Report.

5 To close the View Report dialog box, click Close.


.

6 To close the Disk Defragmenter utility, click the Close button on the title bar of
. the window.

Detect and Repair Disk Errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your
computer, you can check the integrity of the files stored on your hard disk by running the Error
Checking utility.

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk
performance and sometimes make data writing (such as file saving) difficult, or even impossible.
The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to
see whether certain files or folders are misplaced.

If you use your computer daily, you should try to run this utility weekly to help prevent data loss.

To run the Error Checking utility:

Important: Be sure to close all files before running the Error-Checking utility.

1 Click Start, and then click My Computer.


.

2 In the My Computer window, right-click the hard disk you want to search for bad
. sectors, and then click Properties.

3 In the Properties dialog box, click the Tools tab.


.

4 Click the Check Now button.


.

5 In the Check Disk dialog box, select the Scan for and attempt recovery of bad
. sectors check box, and then click Start.

In most circumstances, select Scan for and attempt recovery of bad sectors.

6 If bad sectors are found, choose to fix them.


.
Tip: Only select the Automatically fix file system errors check box if you think that your disk
contains bad sectors.

Protect Your Computer Against Spyware

Spyware collects personal information without letting you know and without asking for
permission. The information that spyware collects ranges from a list of Web sites that you visit
to usernames and passwords. In addition to privacy concerns, spyware can hamper your
computer's performance.

16. how to set the performance options in windows operating systems

1. click start then click run and then type sysdm.cpl in the open box
2. click the advanced tab and then click settings under performance
3. click the advanced tab and then use one of the following methods
under processor scheduling
click programs to assign more processor resources to the foreground
program than the background program
click background services to assign equal amounts of processor resources
to all programs.
background program A background program is a program that runs
while the user is working on another task. The computer's
microprocessor assigns fewer resources to background programs than to
foreground programs.

environment variable An environment variable is a string of environment


information such as a drive, path, or file name that is associated with a symbolic
name that Windows can use. You use System in Control Panel or the set command at
the command prompt to define environment variables.

foreground program A foreground program is a program that runs in the active


window (the upper-most window with the highlighted title bar). The foreground
program responds to commands that the user issues.

27.What is watson’s tool ?

Dr. Watson for Windows is a program error debugger that gathers


information about your computer when an error (or user-mode fault)
occurs with a program. Technical support groups can use the
information that Dr. Watson obtains and logs to diagnose a program
error. When an error is detected, Dr. Watson creates a text file
(Drwtsn32.log) that can be delivered to support personnel by the method
they prefer. You also have the option of creating a crash dump file, which
is a binary file that a programmer can load into a debugger.
If a program error occurs, Dr. Watson for Windows starts automatically. To configure Dr.
Watson, follow these steps:
Click start and then click run and then type drwtsn32 and then click ok
by default, the log file created by Dr. Watson is named Drwtsn32.log and is saved in the
following location:
drive:​ \Documents and Settings\All Users.WINNT\Application Data\Microsoft\Dr Watson

Drwatson.exe is an older program error debugger that was included with


earlier versions of Windows NT. Microsoft recommends that you use
Drwtsn32.exe instead of Drwatson.exe in Windows XP.
16. What are all the recovery features in windows xp ?
Recovery Feature Function Tool Type,
Interface
Last Known Good A startup option to use when the system cannot start in Built-in, startup
Configuration normal or safe mode following a driver or application option
installation that causes a problem. By using the Last
Known Good Configuration, you can recover by
reversing the most recent driver and registry changes
made since you last started Windows XP Professional.
Device Driver A Device Manager feature that allows you to replace an Built-in, GUI
Roll Back individual device driver with the previously installed
version if the driver was updated after you installed
Windows XP Professional. Device Driver Roll Back is
available in normal or safe mode.
System Restore A service that actively monitors your system and records Built-in, GUI
changes to the registry, to system files, and to certain
application files. System Restore allows you to undo
recent registry and file changes by using information
previously saved in restore points. Use to restore the
system to a previous state. System Restore is available in
normal or safe mode.
Add or Remove A Control Panel feature you can use to uninstall Built-in, GUI
Programs in programs. Use to temporarily uninstall software that you
Control Panel suspect is causing a problem. You can uninstall an
application in normal or safe mode.
Recovery Console A command-line environment that you can use to Built-in,
perform advanced troubleshooting operations. command-line
In addition to Last Known Good Configuration and safe environment
mode, advanced users can use Recovery Console to
attempt manual recovery operations.
Backup A tool for saving data, such as the system state, before Built-in, GUI
you troubleshoot problems, attempt workarounds, or
apply updates. Backup (Ntbackup.exe) enables you to
restore system settings and data if your troubleshooting
attempts worsen the problem.
Use in conjunction with a parallel installation to restore
a system that cannot start in normal or safe modes.
Backup is available in safe or normal mode. For more
information about parallel installations, see Chapter 29,
“Troubleshooting the Startup Process.”
Automated A Backup (Ntbackup.exe) option to use when boot and
System system files become corrupt, preventing your system
Recovery (ASR) from starting in normal or safe modes or from using
Recovery Console. This option is more desirable than
formatting disks and reinstalling Windows because ASR
restores system settings and critical files on the system
and boot partitions.
The user interface to ASR backup is the ASR Wizard in
Backup, which steps you through the process of creating
an ASR backup set and an ASR floppy. Windows XP
Professional Setup provides the user interface to ASR
restore.
Because the ASR process formats disks, consider this a
last resort when using Last Known Good Configuration,
Device Driver Roll Back, System Restore, or Recovery
Console does not solve the problem. ASR is available in
safe or normal mode.
16. what is event viewer ?
To open Event Viewer, click Start, click Control Panel, click Performance and
Maintenance, click Administrative Tools, and then double-click Event Viewer.
Or go to run and then type eventvwr and then press ok.
Event Viewer
In Windows XP, an event is any significant occurrence in the system or in a program that
requires users to be notified, or an entry added to a log. The Event Log Service records
application, security, and system events in Event Viewer. With the event logs in Event Viewer,
you can obtain information about your hardware, software, and system components, and monitor
security events on a local or remote computer. Event logs can help you identify and diagnose the
source of current system problems, or help you predict potential system problems.
Event Log Types
A Windows XP-based computer records events in the following three logs:
• Application log

The application log contains events logged by programs. For example, a database
program may record a file error in the application log. Events that are written to the
application log are determined by the developers of the software program.
• Security log

The security log records events such as valid and invalid logon attempts, as well as events
related to resource use, such as the creating, opening, or deleting of files. For example,
when logon auditing is enabled, an event is recorded in the security log each time a user
attempts to log on to the computer. You must be logged on as Administrator or as a
member of the Administrators group in order to turn on, use, and specify which events
are recorded in the security log.
• System log

The system log contains events logged by Windows XP system components. For
example, if a driver fails to load during startup, an event is recorded in the system log.
Windows XP predetermines the events that are logged by system components.
16. difference between internet and www ?
Many people use the terms Internet and World Wide Web (a.k.a. the Web) interchangeably, but
in fact the two terms are not synonymous. The Internet and the Web are two separate but related
things.

The Internet is a massive network of networks, a networking infrastructure. It connects millions


of computers together globally, forming a network in which any computer can communicate with
any other computer as long as they are both connected to the Internet. Information that travels
over the Internet does so via a variety of languages known as protocols

The World Wide Web, or simply Web, is a way of accessing information over the medium of the
Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the
HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web
services, which use HTTP to allow applications to communicate in order to exchange business
logic, use the the Web to share information. The Web also utilizes browsers , such as internet
explorer or netscape to access Web documents called Web pages that are linked to each other via
hyperlinks Web documents also contain graphics, sounds, text and video.

30.differnce between mozilla and internet explorer ?

Firefox allows you to surf the Internet safer and faster, and it displays the Internet the way that it
was intended to be. Firefox also gives you more web page viewing space so that you can see
more than you would with other browsers. Firefox gives you more web page space to view more
of a web page without a lot of scrolling, and the text is clearer in Firefox.

The major differences that come to my mind immediately are:


-- Firefox has tabbed browsing; IE just opens new windows
-- Firefox has built-in pop-up blocking.

Also, since IE comes automatically with most Windows installations, and because most people
lack the [inclination/expertise] to switch to a non-IE browser, ~95% of PC users use IE. So
whenever someone wants to write malicious code (spyware, virus , etc...), they will write it for
the widest installed base.

As a result, many bad things that happen on the 'net don't affect PCs browsing with Firefox. Most
crackers usually find it not worth the hassle to find hidden flaws in 5% of PCs when you can
easilly exploit the many publicly-known security holes in 95% of PCs.
16. difference between application server and web server ?

Web Server serves static HTML pages or gifs, jpegs, etc., and can also run code written in CGI,
JSP etc. A Web server handles the HTTP protocol. Eg of some web server are IIS or apache.

An Application Server is used to run business logic or dynamically generated presentation code.
It can either be .NET based or J2EE based (BEA WebLogic Server, IBM WebSphere, JBoss.

Web Server understands and supports only HTTP protocol whereas an


Application Server supports HTTP,TCP/IP and many more protocols. Also
many more features such as Caches,Clusters,Load Balancing are there in
Application Servers which are not available in Web Servers. We can also
Configure Application Servers to work as Web Server. In short, Applicaion
Server is a super set of which Web Server is a sub set.
A Web server exclusively handles HTTP requests, whereas an application server serves business
logic to application programs through any number of protocols.
A Web server handles the HTTP protocol. When the Web server receives an HTTP request, it
responds with an HTTP response, such as sending back an HTML page. To process a request, a
Web server may respond with a static HTML page or image, send a redirect, or delegate the
dynamic response generation to some other program such as CGI scripts, JSPs (JavaServer
Pages), servlets, ASPs (Active Server Pages), server-side JavaScripts, or some other server-side
technology. Whatever their purpose, such server-side programs generate a response, most often
in HTML, for viewing in a Web browser.

The application server


As for the application server, according to our definition, an application server exposes business
logic to client applications through various protocols, possibly including HTTP. While a Web
server mainly deals with sending HTML for display in a Web browser, an application server
provides access to business logic for use by client application programs. The application program
can use this logic just as it would call a method on an object (or a function in the procedural
world).
Such application server clients can include GUIs (graphical user interface) running on a PC, a
Web server, or even other application servers. The information traveling back and forth between
an application server and its client is not restricted to simple display markup. Instead, the
information is program logic. Since the logic takes the form of data and method calls and not
static HTML, the client can employ the exposed business logic however it wants.

In most cases, the server exposes this business logic through a component API, such as the EJB
(Enterprise JavaBean) component model found on J2EE (Java 2 Platform, Enterprise Edition)
application servers. Moreover, the application server manages its own resources. Such
gate-keeping duties include security, transaction processing, resource pooling, and messaging.
Like a Web server, an application server may also employ various scalability and fault-tolerance
Bottom of Form

31. what is task manager in windows xp?


The Windows XP Task Manager is a very handy system utility that lists the applications and
processes that are running. It shows system resource usage, various performance statistics and
network information. With it, you can close hung programs and manage CPU and memory hogs.

When Task Manager is first opened the dialog box shown below appears. It has four tabs. (There
is also a Users tab if you are using Fast User Switching but I prefer to turn this off.) The default
tab "Applications" is a list of the applications that are running in the foreground. These are
programs that you can see on the desktop or on the taskbar and that are not running hidden in the
background.

All the tab windows have information at the bottom showing the number of ​processes that are
running, how much the CPU is being used, and how much memory resources are committed. The
Applications window also has a button "New Task" in the lower right corner

A common use for Task Manager is to end a program that has become frozen or hung. Select an
application and click the button "End Task". Another way is to right-click on a program entry,
which brings up the context menu shown below. It includes an entry "End Task". There is also
an entry "Go to Process" that will take you to the actual process that is running a selected
program. A new window will open listing all the processes.

Processes tab : A much larger group appears that includes


many background services Here you can see how much
memory and CPU time each process is taking. This
information can be enlightening and can help you decide if
something is causing your computer to slow down. Processes
can be ended either by a right-click menu or the button
"End Process" that is in the lower right corner of the dialog
box.

32.what does the exe files do in task manager ?

Task Manager is a Windows system utility that displays the tasks or processes currently running
on your computer. To open Task Manager, press Ctrl+Alt+Del. The Applcations tab lists the
applications currently running on your computer. A single application may actually consist of
several running processes, and many programs that run in the background are not listed (you can
see icons for some of these programs in the System Tray).

The Processes tab displays a comprehensive list of all the processes currently running on your
computer. This can be very useful for monitoring your system. The process tab displays
information about the processor useage and memory usage of each process. The problem is, how
to identify a process. Below is a list of some processes you may see in Task Managers Processes
list.

"System Idle Process"


"System" The Windows System Process
"SMSS.EXE" Session Manager Subsystem
"CSRSS.EXE" Client Server Runtime Subsystem
"WinLOGON.EXE" The Windows Logon process
"SERVICES.EXE" Services Control Manager
"LSASS.EXE" Local Security Authentication Server Service
"svchost.exe" Service Host
"spoolsv.exe" The print spooler service
"explorer.exe" Windows Explorer
"TASKMGR.EXE" The Task Manager
"regsvc.exe" Remote Registry Service

"System Idle Process" is basically another name for the time when Windows is doing nothing.
There are hundreds of thousands of processes that run on a computer, so you will definitely find
names of many other processess that are not listed above. For a list of well known processes,
visit www.answersthatwork.com/Tasklist_pages/tasklist.htm. You can also learn about almost
any task by using it's name as a search term in google.

Task Manager can also be used to tweak your system if it's running slow. The Performance tab
displays running graphs of your computers CPU and memory usage. If the CPU usage seems to
be running over 80 percent most of the time, or if the memory usage seems to be running higher
than the total physical memory, you may want to shut down some applications or processes.

On the Process tab, you can identify processes that are consuming a lot of processor time. Click
twice on the CPU column heading to sort the CPU column so the processes hogging the most
CPU time on top. You can sort the "Mem Usage" column the same way.

On the Application tab, if you right click on the name of an application and, in the popup menu
that appears, choose "Go To Process", Task Manager will open the Processes tab and highlight
the process that runs the application. On the Processes tab, if you right-click on the name of a
process, you can choose "SetPriority" and promote the priority of the process you need (or
demote the priority of a different process to free up some resources).

If you go to the Application tab and shut down an application, you will shut down any processes
related to that application. Or, you might choose to shut down a background process that you can
identify. To shut down an application or process, click on it's name in the list to highlight it, then
click on the End Task button.

On the Processes tab, if you right click on the name of a process, you can choose "End Process
Tree" to kill the process and any sub-processes started by the process.

Вам также может понравиться