Computer Hardware and Networking Interview Questions and Answers
For Computer Hardware and Networking Job Interview one has to have all technical concepts cleared. The questions are based on the concepts you know in Computer hardware and networking. You need to have a clear base of all the concepts for successfully getting a job in this field. Below mentioned are some computer hardware and networking interview questions and answers. However you should be prepared for other questions as well because computer hardware and networking is a broader field with many concepts. Most frequently asked computer hardware and networking interview questions and answers are given for your reference.
1 Q: What are routers?
A: A router is a device that forwards data packets along networks. Routers can connect two or more network segments. Router functions in an Internet protocol based network operate at the network layer. Routers store information in its routing table such as paths, hops and bottlenecks.
2 Q: What is the difference between Intranet and Internet?
A: Internet is a broad public network that anyone can access through an Internet Service Provider while intranet is a privately owned part of the internet under which only a selected number of IP’s are allowed to communicate. The primary difference between the Internet and the Intranet is about accessibility.
3 Q:. Explain Domain Name System.
A: A domain name is the information that you enter into a web browser in order to reach a specific website. Domain name system is the way that Internet domain names are located and translated into Internet Protocol addresses. DNS naming is used in TCP/IP networks, such as the Internet , to locate computers and services through user friendly names.
4 Q: What is MAC address?
A: MAC, Media Access Control, address is a hardware identification number that uniquely identifies each device on a network. The MAC address is manufactured into every network card, such as Ethernet card or WIFI card, and therefore cannot be changed. MAC addresses are 12 digit hexadecimal numbers(48 bits in length).
5 Q:. Describe data encapsulation.
A: Data Encapsulation also known as data hiding refers to sending data where the data is augmented with successive layers of control information before transmission across a network. The user can only perform a restricted set of operations on the hidden members of the class by executing special functions commonly called methods.
6 Q:. What are the different ways of securing a computer network?
A: There are different ways of securing a computer network. Some of them are use of Virus Protection software, use firewall program , authenticate users etc. All these combined together will provide securing a computer network.
7 Q:. Describe the function of the OSI Session Layer.
A: The function of the OSI Session layer is to establish, manage and terminate sessions between communicating hosts. This layer also synchronizes dialog between the presentation layer of the two communicating hosts and manages their data exchange. The session layer offers provisions for efficient data transfer , class of service and exception reporting of session layer, presentation layer and application layer.
8 Q:. What is WAN?
A: WAN stands for Wide Area Network. WAN consists of two or more local area networks (LANs) and this computer network spans a relatively large geographical area. The largest WAN in existence is the Internet.
9 Q:. Explain the functionality of PING.
A: The functionality of PING command is that it allows to test the connection speed between your network and another network node. Basically it is used to check whether the system is in network or not. By using PING command, you can tell the strength, distance and availability of a connection either in your own network or over the internet.
10 Q: When is a switch said to be congested?
A: It is possible that a switch receives packets faster than the shared link can accommodate and stores in its memory , for an extended period of time, then the switch will eventually run out of buffer space , and some packets will have to be dropped and in this state a switch is said to be in a congested state.
11 Q:. What is the difference between POP3 and IMAP Mail Server?
A: POP3 is a protocol to download and locally store your emails. When your client connects it will download all mail stored in your mailbox and save it to your hard disk. It will then by default delete the copy that is held on the servers. IMAP Mail Server is a protocol used to access and manipulate the contents of the mailbox on the server in real time. You can open mails, create folders to store mails, delete messages from the server and otherwise use the system as normal.
12 Q: What is Gateway of Last Resort?
A: Gateway of Last Resort also known as Default Gateway is used when a router does not know about the destination network of a packet it has received. In other words, it is a route used by the router when no other known route exists to transmit the IP packet. Known routes are present in the routing table. Hence any route not known by the routing table is forwarded to the default route.
13 Q: What is the difference between memory and hard disk space?
A: Memory is RAM (Random Access Memory). RAM is a collection of electronic circuitry where your computer’s programs and data are stored when it is running. The hard disk drive which typically resides in the computer but nowadays external hard drives is also available. A computer’s memory is used for temporary storage while a computer’s hard drive is used for permanent storage.