41) What is IIS?
IIS, or Internet Information Server is a technology that integrates with Microsoft servers in managing internet related functions, such as web site administration and creation of web-based applications.
42) What is a symbolic link?
A symbolic link does the same function when compared to a standard shortcut. However, a symbolic link works at the file system level, and therefore doe not leave any physical file name on disk.
43) Are sessions stored and recalled?
No. Sessions are only present as long as the browser is used. When a browser is closed, the session is terminated as well, and all data stored in the session is lost.
44) Which Microsoft Certification is required for applicants whose qualification includes proficiency in the use of Microsoft Office programs?
The MOS, or Microsoft Office Specialist certifications, is required for such a case. Applicants who hold such certificates show that they meet the standards set by Microsoft in terms of applying Microsoft Office programs and Windows operating system for everyday productivity.
45) What is COM?
COM is short for Component Object Model. It is a Microsoft technology that allows developers to make use of reusable components and services provided by Microsoft. COM technology includes COM+, DCOM and ActiveX.
46) What is dual-boot system?
Dual boot system allows you to install and maintain two operating systems on a single PC. The purpose for this is to maintain compatibility between older and newer software. For example, there maybe programs that only work under Windows 98, therefore having a dual boot system between Windows 98 and another version like Windows XP is a good choice.
47) What files are important in a bootable Windows XP operating system?
There are four important files in order to make a bootable Windows XP operating system. These are Ntldr, Ntdetect, Boot.ini and Ntfs.sys
48) Is it advisable to install separate Firewall software in Windows?
Windows already has a built in Firewall software. Installing another firewall software can lead to program conflicts and would open loopholes in security.
49) Give an algorithm that will perform swapping of values between two variables.
Let’s call the first variable A and the second variable B. Designate a third variable that will be used for the swap. Calling this third variable MIDDLE, assign MIDDLE to contain the value of the variable A. Then assign the value of B to the variable A. Finally, assign the value of MIDDLE to the variable B.
50) What is the advantage of NTFS over FAT and FAT32?
NTFS was build for better performance, especially when it comes to managing the way files are stored and retrieved. It supports encryption, compression and improved metadata support. As a result, NTFS is more robust, secure and has better utilization of hard drive space.
No comments:
Post a Comment