Sunday, August 6, 2017

QUESTIONS FOR CAMPUS INTERVIEW with answers 65

Q1:- Differentiate between RAM and ROM?

RAM stands for Random Access Memory. It can store information and have new information stored over it later. And it’s a physical device you can change it Types of RAMDDR (Double Data Rate), DDR2 and SDRAMROM stands for Read Only Memory. It can’t be written-over Types of ROMPROM (Programmable Read-Only Memory) and CD-ROM.


Q2:-What is Cache Memory?

Cache memory is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. As the microprocessor processes data, it looks first in the cache memory and if it finds the data there, it does not have to do the more time-consuming reading of data from larger memory


Q3:- What is difference between 32 bit and 64 bit memory?

The terms 32-bit and 64-bit refer to the way a computer's processor (also called a CPU), handles information. The 64-bit version of Windows handles large amounts of random access memory (RAM) more effectively than a 32-bit system.


Q4:- What is Virtual memory?

Virtual memory is storage space on your computer’s hard disk that Windows uses in conjunction with random access memory (RAM).


Q5:-What is BIOS?

BIOS stand for Basic Input/output System, although the full term is used very infrequently. The system BIOS is the lowest-level software in the computer; it acts as an interface between the hardware and the operating system.

Q6:-What is TCP/IP?


TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications
Protocol in a private network.


Q7:-What is Intranet?

An Intranet is a private network that is contained within an enterprise. It may consists of many interlinked LAN .The main purpose of an intranet is to share company information & computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.


 Q8:-What is Client/Server?

Client-server computing or networking is a distributed application architecture that partitions tasks or workloads between service providers (servers) and service requesters, called clients.


Q9:- What are the differences among router, switch, bridge and hub?

Hub      - A common connection point for devices in a network. Hubs are commonly used to connect         segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied               to the other ports so that all segments of the LAN can see all packets.
Switch  -In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model.
Router - A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP.s network.


Q10:- What is the port number of Telnet ,DNS, ftp(data) and ftp?

Telnet = 23 and DNS = 53ftp(data) = 20 and ftp=21

Thursday, July 13, 2017

What is Paytm?

Paytm, owned by One97 Communications, is a digital payments platform that allows you to transfer cash into the integrated wallet via online banking, debit cards, and credit cards, or even by depositing cash via select banks and partners. Using the money in the Paytm wallet, you can pay for a number of goods without using cash

Among the transactions you can make on Paytm are recharges for mobile phones, metro cards, DTH cable, data cards, etc, as well as postpaid payments for mobile phones, landline/ broadband, electricity, water and gas bills, etc. You can also book tickets for buses, trains, flights, movies, hotel rooms, etc. and pay for Uber cab rides using the platform. Additionally, you can buy goods on the company’s e-commerce platform using the wallet, and even make offline payments at over 8 lakh merchants, Paytm claims.

What is Paytm Wallet?


Paytm Wallet, as mentioned above, is the digital payment instrument where you can transfer money from your bank account or credit card to use for transactions on the platform. You need to set up an account using your mobile phone number and email ID to setup a Paytm account and transfer cash to the wallet. You can add up to Rs. 10,000 in a month in the Wallet; if you want to increase the monthly limit, then you can get the KYC (Know Your Customer) processor done. With this, you can have up to Rs. 1 lakh in the Paytm Wallet at any point of time.

How to use Paytm and Paytm Wallet?


In order to use the Paytm Wallet and transact cash-free, follow the steps below:


Set up a Paytm account using your mobile number and email ID

Add some money to your Paytm Wallet using netbanking, debit card, or credit card

To transfer money to someone else, select the 'Pay or Send' option

You can make payments to others or to bank accounts on Paytm by scanning a QR code

Alternatively, you can send money to another Paytm user via their phone number.


How to use Paytm for offline payments?


Security is top of everyone's mind when it comes to any digital, but Paytm – which is an RBI-approved wallet – says it keeps the money you put in the Wallet is “protected under Escrow account with a reputed bank.” Paytm uses Verisign-certified 128-bit encryption technology, which means that the secret key used in transactions is a sequence of 128 bits and does not reveal anything about the password length or contents. The platform is PCI DSS 2.0 certified, which means it does not store credit card data in unencrypted form.





Friday, July 7, 2017

How do I create an account on Paytm?

App

It’s simple.

1. Launch Paytm app
2. Go to ‘Profile’ section at the bottom of the page
3. Click on ‘Sign In to Paytm’
4. Click on ‘Sign Up’
5. Enter your mobile number, email address and a password
6. Click on ‘Sign Up’
7. You will get an OTP on the mobile number you entered
8. Once you enter the correct OTP and click on ‘Submit’, you’re ready to use Paytm.


Web

It’s simple.

1. Visit Paytm.com
2. Click on ‘Log In/Sign Up’ on the top-right corner of the page
3. Click on ‘Sign Up’
4. Enter your mobile number, email address and a password
5. You will get an OTP on the mobile number you entered
6. Once you enter the correct OTP and click on ‘Submit’, you’re ready to use all services on Paytm.com


Sunday, January 29, 2017

STEP BY STEP GUIDE TO SETUP ACTIVE DIRECTORY ON WINDOWS SERVER 2008

This tutorial will explain how to install AD on server 2008. This will valid for windows 2008 R2 as well.

Requirement:


Minimum: Single processor with 1.4 GHz (x64 processor) or 1.3GHz (Dual Core)
Minimum: 512 MB RAM
Minimum: 32 GB or greater
The first step is to assign a ip to the server that you going to deploy the AD. Its nessary to install it as DNS server too. So its better to have fixed ip it doesn't mean you cannot install AD without fixed ip address but it will solve lot of issues if you used fixed ip.
In here the server ip is 10.0.0.14. Since we going to make it as DNS server too you should use the same ip as the preferred DNS server.
Next step is to install the Active directory roles. Unlikely the older version of windows servers Microsoft highly recommend to use server manager option to install roles before you run dcpromo.
Select the roles from the right hand panel and click on add roles option.
From the roles list select the "Active Directory Domain Services" role and Click "Next"
Review the confirmation and click on "Next"
Review the installation confirmation and click on "Next"
It will take few minutes to complete and when its done you will get this confirmation. And then click on "Close"
After that you will need to do a reboot.

After reboot please open up the "server Manager" again. And then click on "Roles" there you will see the "Active Directory Domain Services" is successfully installed in there. click on it then you will get a window like below.


In their please pay attention to the message
.


So please click on that link and it will start the DCPROMO wizard.




So next step to go through the DC promo wizard.
To start the installation click on "Next

Click on "Next"
Since we going to install New domain Controller in new forest please select the option "Create a new domain in new forest" option and click on "Next"

Now we have to provide the name for our domain controller. It must be FQDN. In our case I used rebeladmin.com as the domain. Please click "Next" after it.
In this window it will ask to select forest function level. If you going to add server 2003 domain controller to your forest later don't select the function level as server 2008. If you going to use full features of 2008 Ad you must select forest function level as server 2008. In my case I used server 2008. Click on "Next" after the select

In next window since it's the first DC we should make it as DNS server too. Leave the default selection and click on "Next"

If the wizard cannot create a delegation for the DNS server, it displays a message to indicate that you can create the delegation manually. To continue, click "Yes"
In next window it will show up the database location. It its going to be bigger AD its good if you can keep NTDS database in different partition. Click on "Next" after changes.
In next window its asking to define a restore mode password. Its more important if you had to do a restore from backup in a server crash. Click on "Next" after filling it.
Next window is giving you a brief of the installation. Click on "Next"
Then it will start the installation of the AD. It will take some time to complete. After complete of the installation perform a server reboot.
Then it will start the installation of the AD. It will take some time to complete. After complete of the installation perform a server reboot.

User name : your domain\administrator
Password : XXXXXXXX

Now its done and you can view the active directory options on administrative tools menu
Hope this tutorial is clear for you guys. If any question please ask me on rebeladm@live.com

contect -919628273549













Monday, January 23, 2017

Job Interview Questions on basic Computer Technology and Internet Part-2

Here I am going to share you about list of  basic Input Devices, Output devices and  Both input–output devices  related to computer

 Input Devices:

a)      Graphics Tablets
b)      Cameras
c)      Video Capture Hardware
d)     Trackballs
e)      Barcode reader
f)       Digital camera
g)      Gamepad
h)      Joystick
i)        Keyboard
j)        Microphone
k)      MIDI keyboard
l)        Mouse (pointing device)
m)    Scanner
n)      Webcam
o)      Touchpads
p)      Pen Input
q)      Microphone
r)       Electronic Whiteboard
s)     OMR
t)      OCR
u)     Punch card reader
v)    MICR (Magnetic Ink character reader)
w)     Magnetic Tape Drive


OUTPUT  DEVICES:

Monitor (LED, LCD, CRT etc)
Printers (all types)
Plotters
Projector
LCD Projection Panels
Computer Output Microfilm (COM)
Speaker(s)
Head Phone
Visual Display Unit
Film Recorder
Microfiche

Both Input–OutPut Devices:

1.Modems
2.Network cards
3.Touch Screen
4.Headsets (Headset consists of Speakers and Microphone. 
Speaker act Output Device and     Microphone act as Input 
            device)

5. Facsimile (FAX)  (It has scanner to scan the document and also 
           have printer to Print the  document)
6 .Audio Cards / Sound Card

All about basic

List of Input Devices, Output Devices and Both Input Output devices related to computer.

In my Last Post I have shared about the following Job Recruitment Questions on Basic Computer Technology and Internet…Job Recruitment Questions on Basic Computer Technology and Internet Part-1

Have you ever faced Bank Recruitment exam? Are you trying or preparing yourself for Government job?
If you are trying to build up your career then this section will be helpful for you.
In any type of Recruitment examination you will be asked to answer various types of questions. For example: General Knowledge, Basic English, Analytical, Computer and Technology, Basic Computer Knowledge, Basic Computer questions etc.
So, whatever the question you may face, but, questions regarding Basic Computer Knowledge and Technology  becomes  common in most of the recruitment examination.
In Bangladesh, India, Pakistan and Most of the countries of the world, either in Bank or in any type of  Government or Nongovernment (Private Sector) recruitment examination, question regarding Basic Computer and Technology is must.
Here, I have tried to share some basic interview questions regarding Basic Computer and Technology with solutions which will help you to prepare yourself in the recruitment exam and also will boost your preparation by providing basic computer knowledge.

Questions with Answer
Question: What is the elaboration of VOIP?
Answer:    Voice Over Internet Protocol.
Question: E-mail stands for?
Answer:   Electronic mail
Question:Write some common output devices of computer.
Answer:  Monitor, Printer and Speaker.
Question: Give some Example of programming language.
Answer:  BASIC, PaSCAL, C++, FORTRAN
Question: What is YouTube?
Answer: YouTube is a famous video sharing site.
Question:What is WiMax?
Answer :  WiMax is  Wireless Internet Technology.
Question: What is Cyber Super Weapon?
Answer: Cyber Super Weapon is a computer virus.
Question: What is  Palmtop?
Answer: Palmtop is a kind of small computer.
Question: What is XO?
Answer: Tablet Pc

Saturday, November 19, 2016

How to use Vlookup in Excel

Basically, VLOOKUP lets you search for specific information in your spreadsheet. For example,if you have a list of employee details, you could search for the details of specific employee.

1.To use vlookup first of all we have to create table (as shown in figure.)
2. Select tables and give table names such as Hulk.(as shown in figure)


3.Now we will write his name TO SEE the vlookup such as we want to see mobile number of Ram. Then we will type Ram and use vlookup formula for Ram.

=VLOOKUP(H19,HULK,6,0)

EXPLANATION

H19= IF YOU WANT TO SEE VLOOKUP OF RAM THEN CLICK ON RAM, H19 WILL BE SELECTED AUTOMATICALLY.BY THIS YOU CAN SEE  ANYONE VLOOKUP.NOW HERE I AM USING RAM. (YOU CAN TYPE ANY ONE NAME INSTEAD OF Ram)
HULK= HULK IS TABLE NAME (TABLE ARRAY)

6= WRITE THAT COLUMN  NUMBER  WHICH COLUMN NUMBER YOU WANT TO SEE.(FOR EX. COL 6)

0= FALSE VALUE(IT SHOW EXACT VALUE)
4.And press enter.It show the mobile number of Ram.


Then it show the Mobile no. of Ram

Now you have learnt the use of vlookup .

Password Protect Any Folder Without Any Software


In my previous post i have teach you to hide files behind images. In this tutorial i will show you interesting and usefull trick to password protect folder without using any software using batch file programming. This trick will work on all windows platform (Win XP, Win 7). Follow below tutorial to learn this trick

How To Lock Folder ?

1. Open Notepad and Copy code given below into it. 
cls
@ECHO OFF
title perfectit4u.blogspot.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== SECURITY goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End
2. Save the notepad file as lock.bat (.bat is must) 
3. Now double click on lock.bat and a new folder will be created with name MyFolder
4. Copy all your data you want to protect in that New folder 
5. Now double click on lock.bat and when command promp appears Type Y and press enter. 
6. Now MyFolder will be hidden from you view, to access that folde double click on lock.bat 
7. It will ask for password enter your password and done. (Default password is security) 
·         To change the password replace Security with new password in the above code

How To Further Secure ?


You might be thinking that anyone can access the password by opening that lock.bat file in Notepad or any other text editor. To make it more secure hide lock.bat in some secure location after following the above tutorial To access the secured file double click on lock.bat. I would suggest copying lock.bat file into Pendrive and copying it into your computer whenever you required to access to your protected files. 

Set up a computer-to-computer (ad hoc) network

An ad hoc network is a temporary connection between computers and devices used for a specific purpose, such as sharing documents during a meeting or playing multiplayer computer games. You can also temporarily share an Internet connection with other people on your ad hoc network, so those people don’t have to set up their own Internet connections. Ad hoc networks can only be wireless, so you must have a wireless NETWORK ADAPTER installed in your computer to set up or join an ad hoc network.

click to open network and sharing center.
click to manage wireless network.
 click to add button.

click on create an ad hoc network

fill the required information,
   such as network name=adhoc ,security type=wpa2-professional
   security key=123@qwe, check save the network tab.
 process start to create ad hoc network.


then click close button.


            click on the network icon tab on the
            created ad hock network. as shown in the figure.

           
For more latest update to visit my website 
rajnishjaiswalj928.blogspot.in



Learn To Hide Files Behind The Images

There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.

How To Hide File Behind Image ?

In order to do this you should have basic understanding of command line, but if you don't know check out  tutorial given below.
1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.(Download winrar)
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
cd desktop
5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.

 Copy /b imagename.jpg + filename.rar finalimage.jpg
Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)

Replace filename with name of your file you want to hide. It must be in .rar format.
Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.
How To Access Hidden File ?
To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.

QUESTIONS FOR CAMPUS INTERVIEW with answers 65

Q1:- Differentiate between RAM and ROM? RAM stands for Random Access Memory. It can store information and have new information stored o...