Monday, July 28, 2008

Cable Modems

Cable Modem models of cable modems.


  • Latest equipment used for repair
  • Extend the life of your current modems
  • Save money on purchasing new modems







Cat-5 Ethernet Cables

  • Well made quality cables
  • 7 Foot long
  • Individually Packaged






Cat-5 Ethernet USB Cables




  • Hi-Speed
  • USB 2.0
  • 6 FT. cable length



Power Supplies

  • Direct Replacement
  • Individually Packaged
  • Low Prices


Driver CDs


  • Convenient installation for technicians
  • Exact copies of manufacturers disks
  • Fast turnaround time

Friday, July 25, 2008

win 2003

.What is presentation layer responsible for in the OSI model?
The presentation layer establishes the data format prior to passing it along to the network application’s interface. TCP/IP networks perform this task at the application layer.

Does Windows Server 2003 support IPv6?
Yes, run ipv6.exe from command line to disable it.

Can Windows Server 2003 function as a bridge?
Yes, and it’s a new feature for the 2003 product. You can combine several networks and devices connected via several adapters by enabling IP routing.

What’s the difference between the basic disk and dynamic disk?

The basic type contains partitions, extended partitions, logical drivers, and an assortment of static volumes; the dynamic type does not use partitions but dynamically manages volumes and provides advanced storage options

What’s a media pool?
It is any compilation of disks or tapes with the same administrative properties.

How do you install recovery console?

C:\i386\win32 /cmdcons, assuming that your Win server installation is on drive C.

What’s new in Terminal Services for Windows 2003 Server?
Supports audio transmissions as well, although prepare for heavy network load.

What scripts ship with IIS 6.0?
iisweb.vsb to create, delete, start, stop, and list Web sites, iisftp.vsb to create, delete, start, stop, and list FTP sites, iisdir.vsb to create, delete, start, stop, and display virtual directories, iisftpdr.vsb to create, delete, start, stop, and display virtual directories under an FTP root, iiscnfg.vbs to export and import IIS configuration to an XML file.

What secure authentication and encryption mechanisms are supported by IIS 6.0?
Basic authentication, Digest authentication, Advanced digest authentication, Certificate-based Web transactions that use PKCS #7/PKCS #10, Fortezza, SSL, Server-Gated Cryptography, Transport Layer Security

What’s the relation between SSL and TLS?
Transport Layer Security (TLS) extends SSL by providing cryptographic authentication.

What’s the role of http.sys in IIS?

It is the point of contact for all incoming HTTP requests. It listens for requests and queues them until they are all processed, no more queues are available, or the Web server is shut down.

Where’s ASP cache located on IIS 6.0?
On disk, as opposed to memory, as it used to be in IIS 5.

What is socket pooling?
Non-blocking socket usage, introduced in IIS 6.0. More than one application can use a given socket.

Describe the process of clustering with Windows 2003 Server when a new node is added?
As a node goes online, it searches for other nodes to join by polling the designated internal network. In this way, all nodes are notified of the new node’s existence. If other nodes cannot be found on a preexisting cluster, the new node takes control of the quorum resources residing on the shared disk that contains state and configuration data.

What applications are not capable of performing in Windows 2003 Server clusters?
The ones written exclusively for NetBEUI and IPX.

What’s a heartbeat?
Communication processes between the nodes designed to ensure node’s health.

What’s a threshold in clustered environment?
The number of times a restart is attempted, when the node fails.

You need to change and admin password on a clustered Windows box, but that requires rebooting the cluster, doesn’t it?
No, it doesn’t. In 2003 environment you can do that via cluster.exe utility which does not require rebooting the entire cluster.

For the document of size 1 MB, what size would you expect the index to be with Indexing Service?
150-300 KB, 15-30% is a reasonable expectation.

Doesn’t the Indexing Service introduce a security flaw when allowing access to the index?
No, because users can only view the indices of documents and folders that they have permissions for.

What’s the typical size of the index?
Less then 100K documents - up to 128 MB. More than that - 256+ MB.

How would you search for C++?
Just enter C++, since + is not a special character (and neither is C).

What about Barnes&Noble?
Should be searched for as Barnes’&’Noble.

What’s a vector space query?
A multiple-word query where the weight can be assigned to each of the search words. For example, if you want to fight information on ‘black hole’, but would prefer to give more weight to the word hole, you can enter black[1] hole[20] into the search window.

What is Virtual Memory?
Virtual memory is a technique that allows the execution of processes that may not be completely in memory. A separation of user logical memory from physical memory allows an extremely large virtual memory to be provided for programmers when only a smaller physical memory is available. It is commonly implemented by demand paging. A demand paging system is similar to a paging system with swapping. Processes reside on secondary memory (which is usually a disk). When we want to execute a process, we swap it into memory.

In the TCP client-servel model, how does the three-way handshake work in opening connection?
The client first sends a packet with sequence "x" to the server. When the server receives this packet, the server will send back another packet with sequence "y", acknowledging the request of the client. When the client receives the acknowledgement from the server, the client will then send an acknowledge back to the server for acknowledging that sequence "y" has been received.
What is a router? What is a gateway?
Routers are machines that direct a packet through the maze of networks that stand between its source and destination. Normally a router is used for internal networks while a gateway acts a door for the packet to reach the ‘outside’ of the internal network

Sunday, July 20, 2008

Networking Question

What is a default gateway?
- The exit-point from one network and entry-way into another network, often the router of the network.
How do you set a default route on an IOS Cisco router?

- ip route 0.0.0.0 0.0.0.0 x.x.x.x [where x.x.x.x represents the destination address]
What is the difference between a domain local group and a global group?

- Domain local groups grant permissions to objects within the domain in which the reside. Global groups contain grant permissions tree or forest wide for any objects within the Active Directory.
What is LDAP used for?

- LDAP is a set of protocol used for providing access to information directories.
What tool have you used to create and analyze packet captures?

- Network Monitor in Win2K / Win2K3, Ethereal in Linux, OptiView Series II (by Fluke Networks).
What is the significance of the IP address 255.255.255.255?

- The limited broadcast address is utilized when an IP node must perform a one-to-everyone delivery on the local network but the network ID is unknown.

Wednesday, July 16, 2008

Interview base Question

. What does the Mount protocol do?
The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request.

What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
10Base2—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments
. 10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling, with 5 continuous segments not exceeding 100 meters per segment
. 10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling

Explain a DNS resource record?

A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.

What protocol is used by DNS name servers?

DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.

Explain RIP (Routing Information Protocol)?
It is a simple protocol used to exchange information between the routers.

Explain OSPF?

It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions.

Explain NVT (Network Virtual Terminal)?

It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.

Explain Gateway-to-Gateway protocol?

It is a protocol formerly used to exchange routing information between Internet core routers

Explain IGP (Interior Gateway Protocol)?

It is any routing protocol used within an autonomous system.
Why should you care about the OSI Reference Model It provides a framework for discussing network operations and design.


Explain the difference between routable and non- routable protocols?

Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router

Explain the range of addresses in the classes of internet addresses?

Class A 0.0.0.0 - 127.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255 Class
D 224.0.0.0 - 239.255.255.255 Class
E 240.0.0.0 - 247.255.255.255

Explain the minimum and maximum length of the header in the TCP segment and IP datagram?

The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.

Explain MAC address?

The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.

Explain RAID?

A method for providing fault tolerance by using multiple hard disk drives.

Explain NETBIOS and NETBEUI NETBIOS?
is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.

Explain frame relay, in which layer it comes?

Frame relay is a packet switching technology. It will operate in the data link layer

Explain subnet?

A generic term for section of a large networks usually separated by a bridge or router.
How Gateway is different from Routers?

A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats.

What are the important topologies for networks
BUS topology: In this each computer is directly connected to primary network cable in a single line.
Advantages: Inexpensive, easy to install, simple to understand, easy to extend.
STAR topology: In this all computers are connected using a central hub.
Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.
RING topology: In this all computers are connected in loop.
Advantages: All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.

What are major types of networks and explain
Server-based network
Peer-to-peer network Peer-to-peer network
computers can act as both servers sharing resources and as clients using the resources. Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration

Explain difference between baseband and broadband transmission?
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.

. What are the possible ways of data exchange
(i) Simplex
(ii) Half-duplex
(iii) Full-duplex
Learn all about Ready Boost


If you're using Windows Vista, you can use Ready Boost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory. Learn more.

One of the questions I am often asked is how to speed up the time it takes Windows to load or boot. There are a variety of factors (both hardware and software) involved in lowering the amount of time it takes for Windows to load. I will go over most of these ways in this page starting with changes in the system BIOS and moving onward from there.All of these changes are optional, and do not need to be carried out. Instead, they are offered as suggestions to try to lower the time it takes for Windows to boot. Some of these changes are very advanced and should only be attempted if you are comfortable with making the changes and have your data backed up.

System BIOS Changes:

One of the first places to help speed boot time in Windows is to make some simple changes to the system BIOS. The BIOS or Basic Input/output System is a set of instructions and commands built into the motherboard that allows the computer to know what type of hardware is connected and how to communicate with that hardware. You'll first have to gain access to the BIOS setup screen to make any changes. Do not make changes to the system settings in the BIOS lightly, one mistake can render the computer unbootable and cause more problems than its worth. For this reason, do not attempt making changes to the system BIOS unless you are willing to accept the risk along with it. With that said, you'll want to follow the directions below and make some simple changes to speed up the boot process
.1) You must start with the computer completely off, not in sleep or hibernation mode. Then turn the computer on
.2) Enter the system BIOS screen by the manufacturer’s suggestion. Depending on the computer, this may involve pressing the DEL key, pressing F1, Pressing F10, holding down CTRL-ALT-S, or a variety of other keystrokes to get to the BIOS screen. For a more complete list of keystrokes to enter the BIOS screen, visit Michael Steven's page on the subject
.3) Once in the BIOS setup, look for a BOOT menu and select it with your keyboard arrow keys, Tab, and Enter
.4) In most modern BIOS screens, you'll find an option for Quick Boot. Enable this to skip memory tests and other minor Power on Self Tests (POST)
.5) Find an option for Boot Device Priority next, and change the first boot device to be the hard drive. Changing this option will speed up the boot process, but it will also not allow the computer to boot from a floppy disk or CD-ROM. If booting from anything other than the hard drive is important to you, please skip this step. If later on, you need to boot from a CD-ROM, simply re-enter the BIOS setup and make the CD-ROM the first boot device
.6) Choose the option to Exit and Save Changes and the computer will reboot.There are other options in the BIOS to speed up boot time such as choosing the exact settings for your hard drive, and disabling AUTO DETECT of hard drives and other media. However I am skipping those changes and leaving them for a later discussion.

How to Speed Up Windows Boot Time
Changes to Windows Settings:


The next group of changes to consider will be to the many Windows settings. We will use a handy tool called the System Configuration Utility to accomplish most of these changes. Follow the steps below to open and use this tool.

Startup Tab Changes:

1) Click on Start, Run and type MSCONFIG and press Enter

2) Click on the STARTUP tab in the System Configuration Utility to view all the items that begin on Startup. An example is shown below.Each item on the Startup tab that is checked loads immediately after Windows starts. If there are lots of items here, this will slow down the boot time for Windows considerably. Each of these items can be toggled on or off simply by using the checkmark box to the left of the item.The column directly to right of the checkmark is the Name of the program, while the next column over is the location on the hard drive or other device of the file. Finally the last column shows where in the computer the file is started from. This location could be in the registry as is the case with all the locations that begin with HKLM or HKCU, or it could be in the Windows Startup folder found under ALL PROGRAMS in Windows XP.You can examine each of these startup items and uncheck any that are not necessary. How do you know which ones are not necessary? Well, in most computer configurations, you'll want drivers running for your graphics or video controller and sound card, and most likely an antivirus and firewall running. Other startup items are usually extras that could be eliminated from boot up. To discover what a particular item is used for, jot down the name for the item and go over to a site called Process Library, type in the name of the process and click Find. This is a very handy tool for discovering which startup items are truly needed.When you are done modifying the checkmarks to the Startup tab, click OK and you'll be asked to reboot the system.Windows Services ChangesOnce the computer is rebooted, click on Start, Run and type MSCONFIG and press Enter again. This will reopen the System Configuration Utility. Click on the Services tab, then click on the option at the bottom called "Hide All Microsoft Services" to see what unnecessary Windows services are running that can be removed. Generally speaking, you want services related to your video/sound cards and antivirus or firewall programs left running. Other services may not be essential and can be removed. Remember to only remove unessential services or you risk experiencing boot problems. Use Google to search for information on unfamiliar services. Another good resource is Black Viper's Strange Services page.


Hardware Changes to Increase Boot Time:

Adding more Memory (RAM)Other than upgrading the motherboard and CPU, you can generally increase the amount of RAM in your computer to make it load programs and applications faster and provide a more enjoyable computing experience. You'll want to check your motherboard to make sure you have available slots and the maximum amount of RAM you can add to your particular motherboard.

Replacing your Hard Drive with a Faster RPM Drive:

If you have a slower hard drive such as a 5400 RPM or slower, you may want to consider upgrading to a faster 7200 RPMhard drive. The difference in RPM speed will generally be quite noticeable.

Changing to Static IP:

If your computer is connected to a local area network that you control and you have a DHCP server enabled on your router, during the boot process the computer queries the network to valid IP address. You can shave seconds off your boot time by assigning a valid IP address to your computer instead of using DHCP to assign it. To setup a Static IP for your computer, follow these directions.
1) Click on Start, Run
2) Type NCPA.CPL and press Enter to open the Network Connection Control Panel
3) Right-click on the Local Area Connection and choose Properties
4) Click on Internet Protocol (TCP/IP) and click Properties
5) You should see a screen similar to the one below. Fill in your static IP, subnet, default gateway, and DNS server information and click OK. If you aren't sure of your IP ranges on your router, consult your router manual or a friend that is more knowledgeable in networking terminology. Again, this is an optional item and does not necessarily need to be accomplished. Using DHCP is fine, although you sacrifice a few seconds for an IP to be assigned to from the network.

Switching from Master/Slave to Cable Select:

Master/Slave Settings Now for a refresher course on hard drive connections. When connecting more than one hard drive to a computer on the same IDE controller, you generally have to assign one as the primary (master) and one as the secondary (slave). You do this by changing the jumpers on the hard drive next to the power connector. Normally, the drive will have a diagram to let you know which jumper should be set for a master drive and which to set for a slave drive. You'll notice in the picture below the jumpers are circled on the end of the drive and the top of the drive shows the diagram to follow.After changing the jumpers, connect the hard drive cable from the motherboard to the hard drives. Under normal circumstances, the end of the drive cable attaches to the Master hard drive, while the inside connector on the cable connects to the Slave drive.

What About Cable Select?

Cable Select (CS) settings were designed to make it easier to connect hard drives because you didn't need to bother with setting the Master/Slave jumpers. You just connect the drives and depending on where you connected them to the cable the computer would know which is Master and which is Slave...in theory. Now comes the confusing part.With cable select, you first needed a special 40 conductor IDE cable that would determine master/slave connections. This was different from the normal IDE cables at the time. Also, the Master connector on CS cables was the inside connector not the end connector. This made for a very confusing switch from everyday master/slave configurations.80 conductor Ultra DMA cables WILL determine the Master/Slave settings through Cable Select however. So as technology advances, Cable Select as a concept may still catch on. With the newer Ultra DMA cables, you can set both drives to Cable Select (CS), connect them and they will work. Another change with the 80 conductor cables, the Master connector is on the end of the cable where it should be. In situations where you are using a newer Ultra DMA drive and cable, you can use Cable Select or standard Master/Slave jumper settings and the drive will boot properly.In my scenario to start this article, the change from Master/Slave to Cable Select for this particular computer reduced the Windows boot time by more than 2 minutes.For more information on Master/Slave settings versus Cable Select visit the following pages:

Other Windows Performance Tips:

Reduce the Number of Fonts installed:
Every font that is installed in Windows has to load when Windows starts. The more fonts you have installed, the slower Windows loads. Although you can safely have around 1000 fonts loaded in Windows, I like to keep my font list closer to 300-500 or fewer if possible. There are certain fonts that are definitely required by Windows, so be careful in removing any fonts from your computer unless you know they are not needed. Fonts such as Verdana,Arial,Trebuchet, Tahoma, Tahoma, Times New Roman, MS Sans Serif, and Courier New should be left on your system. Follow the directions below to remove extra fonts from Windows XP.
1) Open My Computer
2) Double-click on Drive C
3) Click on File, New Folder and title it Fonts Backup
4) Double-click on the Windows folder to open it
5) Double-click on the Fonts folder
6) Highlight the fonts you wish to remove, click on Edit and choose COPY
7) Navigate back to the C:\Fonts Backup folder and PASTE these fonts into your backup folder
8) Return to the Fonts Folder and right-click on any fonts you previously copied to the backup folder, then choose Delete.If you accidentally removed a font, simply reverse the procedure by copying and pasting the font back into the Windows\Fonts folder.

Disk Cleanup, Scandisk, and Defrag:

Performing regular hard drive maintenance on your computer every few months will not only catch problems before they cause serious damage but also make your hard drive run at its optimal level. Follow these instructions to clean up the drive and defrag it.
1) Open My Computer
2) Right-click on the hard drive usually Drive C
3) Click on the Tools tab
4) Under Error Checking, click on Check Now. Optionally, you may want to check the boxes to "Automatically Fix File Errors" and "Scan For and Attempt Recovery for Bad Sectors"
5) Next, click on the General tab and click on Disk Cleanup. After the computer calculates the amount of files to remove, place a checkmark next to the type of files you wish to remove and click Ok. Read the descriptions for each type of file to determine if you should delete it.
6) Finally, click on the Tools tab again and under Defragmentation click Defragment Now
7) Click on the hard drive you wish to defrag, click on Analyze and then click on Defragment. This process may take some time to complete.

Speed ur pc

5 ways to speed up your PC

By following a few simple guidelines, you can maintain your computer and keep it running smoothly. This article discusses how to use the tools available in Windows XP Service Pack 2 (SP2) and Windows Vista to more efficiently maintain your computer and safeguard your privacy when you're online.

* Free up disk space
* Speed up access to data
* Detect and repair disk errors
* Protect your computer against spyware
* Learn all about ReadyBoost

Free up disk space
By freeing disk space, you can improve the performance of your computer. The Disk Cleanup tool helps you free up space on your hard disk. The utility identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files.Use Disk Cleanup to:

.Remove temporary Internet files.
.Remove downloaded program files (such as Microsoft ActiveX controls and Java applets).
•Empty the Recycle Bin.
•Remove Windows temporary files.
•Remove optional Windows components that you don't use.
•Remove installed programs that you no longer use.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.
To use Disk Cleanup
1.Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.
2.In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.
Choose the files that you want to delete.
3.Clear the check boxes for files that you don't want to delete, and then click OK.
4.When prompted to confirm that you want to delete the specified files, click Yes.
After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and performing better


Speed up access to data

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together. The response time can be significantly longer.
Disk Defragmenter is a Windows utility that consolidates fragmented files and folders on your computer's hard disk so that each occupies a single space on the disk. With your files stored neatly end-to-end, without fragmentation, reading and writing to the disk speeds up.
When to run Disk DefragmenterIn addition to running Disk Defragmenter at regular intervals—monthly is optimal—there are other times you should run it too, such as when:
•You add a large number of files.
•Your free disk space totals 15 percent or less.
•You install new programs or a new version of Windows.


To use Disk Defragmenter:

1.Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.
Click Analyze to start the Disk Defragmenter.
2.In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.
Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.
3.To defragment the selected drive or drives, click the Defragment button. Note: In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.
After the defragmentation is complete, Disk Defragmenter displays the results.
4.To display detailed information about the defragmented disk or partition, click View Report.
5.To close the View Report dialog box, click Close.
6.To close the Disk Defragmenter utility, click the Close button on the title bar of the window.


Detect and repair disk errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.
As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult, or even impossible. The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced.
If you use your computer daily, you should run this utility once a week to help prevent data loss.


To run the Error Checking utility:
1.Close all open files.
2.Click Start, and then click My Computer.
3.In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties.
4.In the Properties dialog box, click the Tools tab.
5.Click the Check Now button.
6.In the Check Disk dialog box, select the Scan for and attempt recovery of bad sectors check box, and then click Start.
7.If bad sectors are found, choose to fix them.
Tip: Only select the "Automatically fix file system errors" check box if you think that your disk contains bad sectors.


Protect your computer against spyware

Spyware collects personal information without letting you know and without asking for permission. From the Web sites you visit to usernames and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer's performance. To combat spyware, you might want to consider using Microsoft Windows Defender, which is included in Windows Vista, and is available as a free download for Microsoft XP SP2. Alternatively, there are other free anti-spyware software programs available.


Learn all about ReadyBoost

If you're using Windows Vista, you can use ReadyBoost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory

Hardware And Computer Architecture

Hardware - Frequently Asked Questions

1.) Windows explorer is not working , what might be the problem and how you will fix?If The successful login is not letting the administrator to enter into the starting screen , then there will be missing of the browseui.dll,that file should be reinstalled to get the windows explorer working back.
2.) What are the components with which the Cisco Aironet components can associate?Not all Aironet devices can associate with all other types of Aironet devices. For instance, the Client Adapter card cannot form a wireless association with a Workgroup Bridge (WGB). Refer to Cisco Aironet Hardware Association Matrix for a complete description of association capabilities.
3.) What are the different platforms of Cisco Aironet APs available?Cisco Aironet 1500 SeriesCisco Aironet 1300 SeriesCisco Aironet 1240 AG SeriesCisco Aironet 1230 AG Series Cisco Aironet 1200 SeriesCisco Aironet 1130 AG SeriesCisco Aironet 1100 SeriesCisco Aironet 1000 Series
4.) WHAT MACS ARE UPGRADEABLE TO THE POWERPC?Apple will provide logic board replacements for all Centris, Quadra and WorkGroup Server models except the Quadra 700,900 and 950. There should also be logic board replacements for the IIvx, IIvi, LC 475, 520, 550, and 575, Performa 475,476, 550, and 600. Upgraded AV Macs will lose their special video capabilities, at least initially. Apple will also make available PowerPC processor upgrade boards that fit into the PDS slots of the Quadra 605, 610, 650, 700, 800, 900, and 950 as well as the Centris 610 and 650 and the Performa 475 and 476. Macs upgraded via a PDS card run at twice the speed of the system clock. Thus a 25 MHz 68040 Mac with a PDS accelerator will become a 50 MHz PowerMac. You'll be able to disable the accelerator if you have old software that's not PowerPC compatible or that just plain runs faster on the older hardware. 68030 desktop Macs with expansion slots will be upgradeable via third party accelerator cards. Daughtercard upgrades for the Powerbook 500 and Duo 280 series will be available sometime late this summer or early fall.
5.) CAN I ADD AN FPU TO MY MAC? CAN I REPLACE THE 68LC040 WITH A 68040?All 68020 and 68030 desktop Macs that did not ship with an FPU standard (i.e. the IIsi and LC series) have special slots that can accommodate an FPU card. All Macs that have the FPUless 680LC40 CPU run just fine if that chip is replaced with a full 68040 that includes an FPU. All PowerPC Macs include an integrated FPU. There is no way to add only an FPU to a 68000 Mac like an SE though some third party accelerators do include FPU's as well as faster CPU's.
6.) WHAT'S VRAM?Video RAM is where the computer stores the images displayed on your screen. On some earlier Macs with built-in video (Mac 128, IIci) this was kept in main memory. However it's considerably more efficient and faster to store the screen image in its own separate RAM. Generally the more VRAM you have the more colors or shades of gray you can display and the larger the monitors you can use. The chart below shows the number of colors that can be displayed at a given resolution with the specified amount of VRAM.
7.) What is Exchange Server 2007?Exchange Server 2007 is the next version of Exchange Server, the industry's leading server for e-mail, calendaring, and unified messaging. The release of Exchange Server 2007 is closely aligned with the Microsoft Office 2007 wave of products, which together deliver a best-in-class enterprise messaging and collaboration solution.
8.) What does it mean to "power cycle" a device?Power cycling an electronic device is a technical way of saying "resetting" it. When you power cycle a device, you turn it off and then turn it back on again. Pretty high-tech, huh? Usually, you should let the device sit for a couple seconds after turning it off to make sure the memory in the device is fully cleared before turning it back on. Any electronic device can be power cycled, but the term is frequently used with cable modems, DSL modems, and routers. This is because small internal errors in these devices can prevent them from functioning correctly. Resetting them typically fixes the errors and allows them to work correctly again.
9.) What does it mean when a computer is "low on resources?"The resources a computer has are mainly processing speed, hard disk storage, and memory. The phrase "low on resources" usually means the computer is running out of memory. The best way to prevent this error from coming up is to install more RAM on your machine. Upgrading your RAM is the best performance booster you can give your computer, and it usually doesn't cost a lot.


Computer Architecture - Frequently Asked Questions

1.) What is Virtual Memory?
This Memory is used extending the capability of physical memory. This memory is simulated by the hard drive.When all the RAM is being used the computer will swap data to the hard drive and back to give the impression that there is more memory
2.) What are the five stages in a DLX pipeline?
Instruction Fetch Stage Instruction Decode Stage Instruction Execution Stage Memory Stage Write Back
3.) What is MESI?
MESI is a Cache Coherency protocol used in multi-processor systems to indicate the state in which the data in the cache of a particular processor is. It stands of Modified, Exclusive, Shared and Invalid
4.) What is cache memory?
Cache memory is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous reading of data), it does not have to do the more time-consuming reading of data from larger memory.(cache memory is used between the c.p.u and the ram to access dta fastly)
5.) What is hard disk and what is its purpose?
Hard disk is the secondary storage device, which holds the data in bulk, and it holds the data on the magnetic medium of the disk.Hard disks have a hard platter that holds the magnetic medium, the magnetic medium can be easily erased and rewritten, and a typical desktop machine will have a hard disk with a capacity of between 10 and 40 gigabytes. Data is stored onto the disk in the form of files.
6.) What’s the speed and device maximum specs for Firewire?
EEE 1394 (Firewire) supports the maximum of 63 connected devices with speeds up to 400 Mbps.
7.) What’s the difference between L1 and L2 cache?
Level 1 cache is internal to the chip, L2 is external. L1 Cache is of Higher speed than that of L2 Cache.
8.) What is the difference between primary & secondary storage device?
In primary storage device the storage capacity is limited. It has a volatile memory. In secondary storage device the storage capacity is larger. It is a nonvolatile memory. Primary devices are: RAM / ROM. Secondary devices are: Floppy disc / Hard disk.