win interview questions

Upload: maarishettym

Post on 09-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Win Interview Questions

    1/15

    Windows Server Questions

    1.What are the Features of windows2003?ACTIVE DIRECTORYEasier Deployment and Management

    ADMT version 2.0migrates password from NT4 to 2000 to 20003 or from 2000 to 2003Domain Rename--- supports changing Domain Name System and/or NetBios nameSchema Redefine--- Allows deactivation of attributes and class definitions in the Active directoryschemaAD/AM--- Active directory in application mode is a new capability of AD that addresses certaindeployment scenarios related to directory enabled applicationsGroup Policy Improvements----introduced GPMC tool to manage group policyUIEnhanced User Interface

    Grater SecurityCross-forest Authentication

    Cross-forest AuthorizationCross-certification EnhancementsIAS and Cross-forest authenticationCredential ManagerSoftware Restriction Policies

    Improved Performance and DependabilityEasier logon for remote officesGroup Membership replication enhancementsApplication Directory PartitionsInstall Replica from media

    Dependability Improvements--- updated Inter-Site Topology Generator (ISTG) that scales better bysupporting forests with a greater number of sites than Windows 2000.

    FILE AND PRINT SERVICESVolume shadow copy serviceNTFS journaling file systemEFSImproved CHDSK PerformanceEnhanced DFS and FRSShadow copy of shared foldersEnhanced folder redirection

    Remote document sharing (WEBDAV)

    IISFault-tolerant process architecture----- The IIS 6.0 fault-tolerant process architecture isolates Web sitesand applications into self-contained units called application poolsHealth Monitoring---- IIS 6.0 periodically checks the status of an application pool with automaticrestart on failure of the Web sites and applications within that application pool, increasing applicationavailability. IIS 6.0 protects the server, and other applications, by automatically disabling Web sites

    http://newadmins.blogspot.com/2008/10/windows-server-questions.htmlhttp://newadmins.blogspot.com/2008/10/windows-server-questions.html
  • 8/8/2019 Win Interview Questions

    2/15

    and applications that fail too often within a short amount of timeAutomatic Process Recycling--- IIS 6.0 automatically stops and restarts faulty Web sites andapplications based on a flexible set of criteria, including CPU utilization and memory consumption,while queuing requestsRapid-fail Protection---- If an application fails too often within a short amount of time, IIS 6.0 will

    automatically disable it and return a "503 Service Unavailable" error message to any new or queuedrequests to the applicationEdit-While-Running

    2.What are the Difference between NT & 2000?NT SAM database is a flat database. Where as in windows 2000 active directory database is ahierarchical database.In windows NT only PDC is having writable copy of SAM database but the BDC is only read onlydatabase. In case of Windows 2000 both DC and ADC is having write copy of the databaseWindows NT will not support FAT32 file system. Windows 2000 supports FAT32

    Default authentication protocol in NT is NTLM (NT LAN manager). In windows 2000 defaultauthentication protocol is Kerberos V5.Windows 2000 depends and Integrated with DNS. NT user Netbios namesActive Directory can be backed up easily with System state data

    3.What Difference between 2000 & 2003?Application Server mode is introduced in windows 2003Possible to configure stub zones in windows 2003 DNSVolume shadow copy services is introducedWindows 2003 gives an option to replicate DNS data b/w all DNS servers in forest or All DNS serversin the domain.Refer Question 1 for all Enhancements

    4.What Difference between PDC & BDC?PDC contains a write copy of SAM database where as BDC contains read only copy of SAM database.It is not possible to reset a password or create objects with out PDC in Windows NT.

    5.What are Difference between DC & ADC?There is no difference between in DC and ADC both contains write copy of AD. Both can also handlesFSMO roles (If transfers from DC to ADC). It is just for identification. Functionality wise there is nodifference.

    6.What is DNS & WINSDNS is a Domain Naming System, which resolves Host names to IP addresses. It uses fully qualifieddomain names. DNS is a Internet standard used to resolve host namesWINS is a Windows Internet Name Service, which resolves Netbios names to IP Address. This isproprietary for Windows

    7.How may Types of DNS ServersPrimary DNS

  • 8/8/2019 Win Interview Questions

    3/15

    Secondary DNSActive Directory Integrated DNSForwarderCaching only DNS

    8.If DHCP is not available what happens to the client ?Client will not get IP and it cannot be participated in network . If client already got the IP and havinglease duration it use the IP till the lease duration expires.

    9.what are the different types of trust relationships ?Implicit TrustsExplicit TrustsNT to Win2k or Forest to Forest

    10.what is the process of DHCP for getting the IP address to the client ?There is a four way negotiation process b/w client and serverDHCP Discover (Initiated by client)

    DHCP Offer (Initiated by server)DHCP Select (Initiated by client)DHCP Acknowledgment (Initiated by Server)DHCP Negative Acknowledgment (Initiated by server if any issues after DHCP offer)

    11.Difference between FAT,NTFS & NTFSVersion5 ?NTFS Version 5 featuresEncryption is possibleWe can enable Disk QuotasFile compression is possibleSparse filesIndexing ServiceNTFS change journalIn FAT file system we can apply only share level security. File level protection is not possible. InNTFS we can apply both share level as well as file level securityNTFS supports large partition sizes than FAT file systemsNTFS supports long file names than FAT file systems

    12.What are the port numbers for FTP, Telnet, HTTP, DNS ?FTP-21, Telnet 23, HTTP-80, DNS-53, Kerberos-88, LDAP-389

    13.what are the different types of profiles in 2000 ?Local ProfilesRoaming profilesMandatory Profiles

    14.what is the database files used for Active Directory ? ?The key AD database filesedb.log, ntds.dit, res1.log, res2.log, and edb.chkall of which reside in \%systemroot%\ntds on a domain controller (DC) by default. During AD installation, Dcpromo lets youspecify alternative locations for these log files and database files

  • 8/8/2019 Win Interview Questions

    4/15

    NTDS.DIT

    15.What is the location of AD Database ?%System root%/NTDS/NTDS>DIT

    16.What is the authentication protocol used in NT ?NTLM (NT LAN Manager)

    17.What is subnetting and supernetting ?Subnetting is the process of borrowing bits from the host portion of an address to provide bits foridentifying additional sub-networksSupernetting merges several smaller blocks of IP addresses (networks) that are continuous into onelarger block of addresses. Borrowing network bits to combine several smaller networks into one largernetwork does supernetting

    18.what is the use of terminal services ?

    Terminal services can be used as Remote Administration mode to administer remotely as well asApplication Server Mode to run the application in one server and users can login to that server to userthat application.

    19.what is the protocol used for terminal services ?RDP

    20.what is the port number for RDP ?3389Friday, October 3, 2008 SelvaNo comments

    Windows Server2000 Administration Questions

    1.Explain hidden shares.Hidden or administrative shares are share names with a dollar sign ($) appended to their names.Administrative shares are usually created automatically for the root of each drive letter. They do notdisplay in the network browse list.2.How do the permissions work in Windows 2000?What permissions does folder inherit from the parent?When you combine NTFS permissions based on users and their group memberships, the leastrestrictive permissions take precedence. However, explicit Deny entries always override Allow entries.

    3.Why cant I encrypt a compressed file on Windows 2000?You can either compress it or encrypt it, but not both.4.If I rename an account, what must I do to make sure the renamed account has the same permissionsas the original one?Nothing, its all maintained automatically.5.Whats the most powerful group on a Windows system?Administrators.6.What are the accessibility features in Windows 2000?

    https://www.blogger.com/comment.g?blogID=4921083674761503180&postID=5948173829336782665https://www.blogger.com/comment.g?blogID=4921083674761503180&postID=5948173829336782665http://newadmins.blogspot.com/2008/09/windows-server2000-administration.htmlhttps://www.blogger.com/comment.g?blogID=4921083674761503180&postID=5948173829336782665http://newadmins.blogspot.com/2008/09/windows-server2000-administration.html
  • 8/8/2019 Win Interview Questions

    5/15

    Sticky Keys, Filter Keys Narrator, Magnifier, and On-Screen Keyboard.7.Why cant I get to the Fax Service Management console?You can only see it if a fax had been installed.8.What do I need to ensure before deploying an application via a Group Policy?Make sure its either an MSI file, or contains a ZAP file for Group Policy.

    9.How do you configure mandatory profiles?Rename ntuser.dat to ntuser.man10.How to get multiple displays to work in Windows 2000?Multiple displays have to use peripheral connection interface (PCI) or Accelerated Graphics Port(AGP) port devices to work properly with Windows 2000.11.Whats a maximum number of processors Win2k supports?212.I had some NTFS volumes under my Windows NT installation. What happened to NTFS after Win2k installation?It got upgraded to NTFS 5.13.How do you convert a drive from FAT/FAT32 to NTFS from the command line?

    convert c: /fs:ntfs14. Explain APIPA.Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional computers if noDHCP server can be contacted. APIPA assigns the computer an IP address within the range of169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0.15.How does Internet Connection Sharing work on Windows 2000?Internet Connection Sharing (ICS) uses the DHCP Allocator service to assign dynamic IP addresses toclients on the LAN within the range of 192.168.0.2 through 192.168.0.254. In addition, the DNSProxy service becomes enabled when you implement ICS.16What is Active Directory schema?The Active Directory schema contains formal definitions of every object class that can be created in anActive Directory forest it also contains formal definitions of every attribute that can exist in an ActiveDirectory object.Active Directory stores and retrieves information from a wide variety of applications and services.16.What is Global Catalog Server?A global catalog server is a domain controller it is a master searchable database that containsinformation about every object in every domain in a forest. The global catalog contains a completereplica of all objects in Active Directory for its host domain, and contains a partial replica of allobjects in Active Directory for every other domain in the forest. It have two important functions:Provides group membership information during logon and authenticationHelps users locate resources in Active Directory17.What is the ntds.tit file default size?40 MB18.Describe how the DHCP lease is obtained.Its a four-step process consisting of(a) IP request(b) IP offer(C) IP selection(d) acknowledgement.

  • 8/8/2019 Win Interview Questions

    6/15

    19. Weve installed a new Windows-based DHCP server, however, the users do not seem to be gettingDHCP leases off of it.The server must be authorized first with the Active Directory.20.How can you force the client to give up the dhcp lease if you have access to the client PC?ipconfig /release

    21. What authentication options do Windows 2000 Servers have for remote clients?PAP, SPAP, CHAP, MS-CHAP and EAP.22. What are the networking protocol options for the Windows clients if for some reason you do notwant to use TCP/IP?NWLink (Novell), NetBEUI, AppleTalk (Apple).23. What is data link layer in the OSI reference model responsible for?Data link layer is located above the physical layer, but below the network layer. Taking raw data bitsand packaging them into frames. The network layer will be responsible for addressing the frames,while the physical layer is reponsible for retrieving and sending raw data bits.24.What is binding order?The order by which the network protocols are used for client-server communications. The most

    frequently used protocols should be at the top.25.How do cryptography-based keys ensure the validity of data transferred across the network?Each IP packet is assigned a checksum, so if the checksums do not match on both receiving andtransmitting ends, the data was modified or corrupted.26.Should we deploy IPSEC-based security or certificate-based security?They are really two different technologies. IPSec secures the TCP/IP communication and protects theintegrity of the packets. Certificate-based security ensures the validity of authenticated clients andservers.27.What is LMHOSTS file?Its a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.28.Whats the difference between forward lookup and reverse lookup in DNS?Forward lookup is name-to-address, the reverse lookup is address-to-name.29.How can you recover a file encrypted using EFS?

    Use the domain recovery agent.Tuesday, September 30, 2008 Selva 1 comment

    Windows Server 2003 Interview Questions

    1. How do you double-boot a Win 2003 server box?The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change theBoot.ini timeout and default settings, use the System option in Control Panel from the Advanced taband select Startup

    2.What do you do if earlier application doesnt run on Windows Server 2003?When an application that ran on an earlier legacy version of Windows cannot be loaded during thesetup function or if it later malfunctions, you must run the compatibility mode function. This isaccomplished by right-clicking the application or setup program and selecting Properties >Compatibility > selecting the previously supported operating system.

    3.If you uninstall Windows Server 2003, which operating systems can you revert to?Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows

    https://www.blogger.com/comment.g?blogID=4921083674761503180&postID=8821133984301601942http://newadmins.blogspot.com/2008/09/windows-server-2003-interview-questions.htmlhttps://www.blogger.com/comment.g?blogID=4921083674761503180&postID=8821133984301601942http://newadmins.blogspot.com/2008/09/windows-server-2003-interview-questions.html
  • 8/8/2019 Win Interview Questions

    7/15

    Server 2003

    4.How do you get to Internet Firewall settings?Start > Control Panel > Network and Internet Connections > Network Connections

    5.What is Active Directory?Active Directory is a network-based object store and service that locates and manages resources, andmakes these resources available to authorized users and groups. An underlying principle of the ActiveDirectory is that everything is considered an objectpeople, servers, workstations, printers,documents, and devices. Each object has certain attributes and its own security access control list(ACL).

    6.Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller(BDC) in Server 2003?The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer readand write relationship that hosts copies of the Active Directory.

    7.How long does it take for security changes to be replicated among the domain controllers?Security-related modifications are replicated within a site immediately. These changes include accountand individual user lockout policies, changes to password policies, changes to computer accountpasswords, and modifications to the Local Security Authority (LSA).

    8.Whats new in Windows Server 2003 regarding the DNS management?When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contactsan existing DC to update the directory and replicate from the DC the required portions of the directory.If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and howto fix the problem. In order to be located on a network, every DC must register in DNS DC locatorDNS records. The Active Directory Installation Wizard verifies a proper configuration of the DNSinfrastructure. All DNS configuration debugging and reporting activity is done with the ActiveDirectory Installation Wizard.

    9.When should you create a forest?Organizations that operate on radically different bases may require separate trees with distinctnamespaces. Unique trade or brand names often give rise to separate DNS identities. Organizationsmerge or are acquired and naming continuity is desired. Organizations form partnerships and jointventures. While access to common resources is desired, a separately defined tree can enforce moredirect administrative and security restrictions.

    10.How can you authenticate between forests?Four types of authentication are used across forests:(1) Kerberos and NTLM network logon for remote access to a server in another forest(2) Kerberos and NTLM interactive logon for physical logon outside the users home forest(3) Kerberos delegation to N-tier application in another forest(4) user principal name (UPN) credentials.

    11.What snap-in administrative tools are available for Active Directory?

  • 8/8/2019 Win Interview Questions

    8/15

    Active Directory Domains and Trusts Manager, Active Directory Sites and Services Manager, ActiveDirectory Users and Group Manager, Active Directory Replication (optional, available from theResource Kit), Active Directory Schema Manager (optional, available from adminpack)

    12.What types of classes exist in Windows Server 2003 Active Directory?

    Structural class. The structural class is important to the system administrator in that it is the only typefrom which new Active Directory objects are created. Structural classes are developed from either themodification of an existing structural type or the use of one or more abstract classes.Abstract class. Abstract classes are so named because they take the form of templates that actuallycreate other templates (abstracts) and structural and auxiliary classes. Think of abstract classes asframeworks for the defining objects.Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous attributes whencreating a structural class, it provides a streamlined alternative by applying a combination of attributeswith a single include action.88 class. The 88 class includes object classes defined prior to 1993, when the 1988 X.500 specificationwas adopted. This type does not use the structural, abstract, and auxiliary definitions, nor is it in

    common use for the development of objects in Windows Server 2003 environments.

    13.How do you delete a lingering object?Windows Server 2003 provides a command called Repadmin that provides the ability to deletelingering objects in the Active Directory.

    14.What is Global Catalog?The Global Catalog authenticates network user logons and fields inquiries about objects across a forestor tree. Every domain has at least one GC that is hosted on a domain controller. In Windows 2000,there was typically one GC on every site in order to prevent user logon failures across the network.

    15.How is user account security established in Windows Server 2003?When an account is created, it is given a unique access number known as a security identifier (SID).Every group to which the user belongs has an associated SID. The user and related group SIDstogether form the user accounts security token, which determines access levels to objects throughoutthe system and network. SIDs from the security token are mapped to the access control list (ACL) ofany object the user attempts to access.

    16.If I delete a user and then create a new account with the same username and password, would theSID and permissions stay the same?No. If you delete a user account and attempt to recreate it with the same user name and password, theSID will be different.

    17.What do you do with secure sign-ons in an organization with many roaming users?Credential Management feature of Windows Server 2003 provides a consistent single sign-onexperience for users. This can be useful for roaming users who move between computer systems. TheCredential Management feature provides a secure store of user credentials that includes passwords andX.509 certificates.

    18.Anything special you should do when adding a user that has a Mac?

  • 8/8/2019 Win Interview Questions

    9/15

    "Save password as encrypted clear text" must be selected on User Properties Account Tab Options,since the Macs only store their passwords that way.

    19.What remote access options does Windows Server 2003 support?Dial-in, VPN, dial-in with callback.

    20.Where are the documents and settings for the roaming profile stored?All the documents and environmental settings for the roaming user are stored locally on the system,and, when the user logs off, all changes to the locally stored profile are copied to the shared serverfolder. Therefore, the first time a roaming user logs on to a new system the logon process may takesome time, depending on how large his profile folder is.

    21.Where are the settings for all the users stored on a given machine?C:\Document and Settings\All Users

    22.What languages can you use for log-on scripts?

    JavaScript, VBScript, DOS batch files (.com, .bat, or even .exe)Monday, September 29, 2008 Selva 3 comments

    Network Questions - I

    1. What is the difference between TCP and UDPTCP is a connection oriented protocol, which means that everytime a packet is sent say fromhost A to B, we will get an acknowledgement. Whereas UDP on the other hand, is a connectionless protocol.Where will it be used : TCP -> Say you have a file transfer and you need to ensure that the filereaches intact, and time is not a factor, in such a case we can use TCP.UDP-> Media Streaming, question is say you are watching a moviewould you prefer that

    your movie comes..perfectly.but u need to wait a long time before you see the nextframe ?..or would you prefer the movie to keep streamingYesThe second option isdefinely better.This is when we need UDP

    2. What is a MAC address?MAC is a machines Physical address, The internet is addressed based on a logical addressingapproach. Say, when the packet reaches say the bridge connection a LAN, the question is..howdoes it identify, which computer it needs to send the packet to. For this it uses the concept ofARP, Address Resolution Protocol, which it uses over time to build up a table mapping fromthe Logical addresses to the Physical addresses. Each computer is identified using itsMAC/Physical address ( u can use the ipconfig -all option to geturMAC address).

    3. What is MTU?

    The MTU is the Maximum Transmission Unit used by the TCP protocol. TCP stands forTransmission Control Prototcol. The MTU determines the size of packets used by TCP for eachtransmission of data. Too large of an MTU size may mean retransmissions if the packetencounters a router along its route that cant handle that large a packet. Too small of an MTUsize means relatively more overhead and more acknowledgements that have to be sent andhandled. The MTU is rated in octets or groups of 8 bits. The so-called official internetstandard MTU is 576, but the standard rating for ethernet is an MTU of 1500.

    4. Difference Between. Switch , Hub, Router..

    https://www.blogger.com/comment.g?blogID=4921083674761503180&postID=8188732386727764259http://newadmins.blogspot.com/2008/09/network-questions-i.htmlhttps://www.blogger.com/comment.g?blogID=4921083674761503180&postID=8188732386727764259http://newadmins.blogspot.com/2008/09/network-questions-i.html
  • 8/8/2019 Win Interview Questions

    10/15

    Hub: 1.it is a layer1 device..used to connect various machine on Lan.2.It forwards broadcast by default.3.It supports one collision domain and one broadcast domain.4.it works on Bus topology resulting less speed.Switch: 1. A layer2 device.

    2. Forward broadcast first time only.3. one broadcast domain & collision domains depends on no. of ports.4.It is based on Star Topology giving 100mbps to every pc on Lan.Router: 1. Does not Broadcast by default.2. breaks up Broadcast domain.3. Also called Layer3 switch.

    5. VPN.....VPN(Virtual Private Network ) these are basically the logical networks on the physical lineyou can have many VPN over same line..Need of VPN arises when your company need to increase the network but dont want to buy anymore switches.. take an eg. your dept. your room is packed with employees andurcompany

    need to add 4 more persons tourdeptt. what will they do.. the solution is to create VPNsyoucan configure the switch ports in other deptts. and create a specific VLAN ofurdeptt. So that thepersons can sit there and access to the required pcs.

    6. ARP & RARP.....

    Stands for Address Resolution Protocolwhenever a request is sent by a node on one networkto the node on another network the Physical address(MAC) is required and for this the IPaddress need to be flow over the network..whenever a router with that network (IP) gets themsg. the required MAC address is sent through the network this process of converting the IPaddress to MAC address is Called ARP..and the reverse thats the convertion of the Mac addressto the IP address is called RARP ( Reverse Address Resolution Protocol)

    7. What is the difference between layer 2 and layer 3 in the OSI model?

    Layer 2 is responsible for switching data whereas Layer 3 is responsible for routing the data.Layer3: With information gathered from user, Internet protocol make one IP packet with sourceIP and Destination IP and other relevant information. It can then route packet through router tothe destination.Layer2: Soon after it receives IP packet from layer 3, it encapsulate it with frame header (ATMheader in case of ATM technology) and send it out for switching. In case of Ethernet it will

    send data to MAC address there by it can reach to exact destination.Sunday, September 21, 2008 SelvaNo comments

    WINDOWS Shortcut Keys

    General Windows KeystrokesGet Help F1Open the Start Menu WINDOWS LOGO KEY or CTRL+ESCSwitch between Open Applications ALT+TABOpen the Shortcut Menu APPLICATIONS KEY or SHIFT+F10Minimize all Applications WINDOWS LOGO KEY+MFind a File or Folder from Desktop F3

    https://www.blogger.com/comment.g?blogID=4921083674761503180&postID=811124159948837739http://newadmins.blogspot.com/2008/09/windows-shortcut-keys.htmlhttps://www.blogger.com/comment.g?blogID=4921083674761503180&postID=811124159948837739http://newadmins.blogspot.com/2008/09/windows-shortcut-keys.html
  • 8/8/2019 Win Interview Questions

    11/15

    Move to First Item on the Taskbar WINDOWS LOGO KEY+TABOpen Windows Explorer WINDOWS LOGO KEY+EOpen Run Dialog WINDOWS LOGO KEY+RApplication KeystrokesExit the Active Application ALT+F4

    Open the Application Control Menu ALT+SPACEBARMove to the Menu Bar ALTMove between Menus ALT, ARROW KEYSChoose a Menu Item ENTEROpen a child Window Control Menu ALT+DASHCancel or close a Menu ESC or ALTWorking in Dialog BoxesMove through Dialog Controls TABMove Backward through Dialog Controls SHIFT+TABMove to Another Page CTRL+TABReverse Direction through Pages CTRL+SHIFT+TAB

    Select/Deselect in List View SPACEBAR or CTRL+SPACEBARToggle a Check Box ON/OFF SPACEBARWorking with TextMove One Character Left LEFT ARROWMove One Character Right RIGHT ARROWMove One Word Left CTRL+LEFT ARROWMove One Word Right CTRL+RIGHT ARROWMove to Beginning of Line HOMEMove to End of Line ENDMove One Paragraph Up CTRL+UP ARROWMove One Paragraph Down CTRL+DOWN ARROWMove to Beginning of Document CTRL+HOMEMove to End of Document CTRL+ENDScroll Up or Down One Screen PAGE UP or PAGE DOWNSelect One Character Left SHIFT+LEFT ARROWSelect One Character Right SHIFT+RIGHT ARROWSelect One Word Left CTRL+SHIFT+LEFF ARROWSelect One Word Right CTRL+SHIFT+RIGHT ARROWSelect to Beginning of Line SHIFT+HOMESelect to End of Line SHIFT+ENDSelect to Beginning of Document CTRL+SHIFT+HOMESelect to End of Document CTRL+SHIFT+ENDSelect All CTRL+AUndo CTRL+ZDelete Current Character DELETEDelete Prior Character BACKSPACE

    Working in Windows ExplorerDelete Selected File or Folder DELETERename Selected File or Folder F2Refresh Window F5

  • 8/8/2019 Win Interview Questions

    12/15

    Switch Between Tree View and List View F6 or TABGo Up One Folder Level BACKSPACEOpen File or Folder Properties ALT+ENTERUntruncate Columns in List View CTRL+NUM PAD PLUSUsing the Clipboard

    Copy Selected File or Text to Clipboard CTRL+CCut Selected File or Text to Clipboard CTRL+XPaste Contents of Clipboard CTRL+V

    Windows System Key Combinations

    CTRL+ESC - Open Start menuALT+TAB - Switch between open programsALT+F4 - Quit programSHIFT+DELETE - Delete items permanently

    Windows Program Key Combinations

    CTRL+C - CopyCTRL+X - CutCTRL+V - PasteCTRL+Z - UndoCTRL+B - BoldCTRL+U - UnderlineCTRL+I - Italic

    Mouse Click/Keyboard Modifier Combinations for Shell Objects

    SHIFT+RIGHT CLICK - Displays a context menu containing alternative verbs.SHIFT+DOUBLE CLICK - Runs the alternate default command (the second item on themenu).ALT+DOUBLE CLICK - Displays properties.SHIFT+DELETE - Deletes an item immediately without placing it in the Recycle Bin.

    General Keyboard-Only Commands

    F1 - Starts Windows Help.F10 - Activates menu bar options.

    SHIFT+F10 - Opens a context menu for the selected item. This is the same as right-clickinganobject.CTRL+ESC - Opens the Start menu. Use the ARROW keys to select an item.CTRL+ESC, ESC - Selects the Start button. (Press TAB to select quick launch, the taskbar,system tray)ALT+DOWN ARROW - Opens a drop-down list box.ALT+TAB - Switch to another running application. Hold down the ALT key and then press theTAB key to view the task-switching window.

  • 8/8/2019 Win Interview Questions

    13/15

    Press down and hold the SHIFT key while you insert a CD-ROM to bypass the auto-runfeature.ALT+SPACE - Displays the main window's System menu. From the System menu, you canrestore, move, resize, minimize, maximize, or close the window.ALT+- (ALT+hyphen) - Displays the Multiple Document Interface (MDI) child window's

    System menu. From the MDI child window's System menu, you can restore, move, resize,minimize, maximize, or close the child window.CTRL+TAB - Switch to the next child window of a Multiple Document Interface (MDI)application.ALT+ - Opens the corresponding menu.ALT+F4 - Closes the current window.ALT+DOWN ARROW - Opens a drop-down list box.CTRL+F4 - Closes the current Multiple Document Interface (MDI) window.ALT+F6 - Switch between multiple windows in the same program. For example, when theNotepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and themain Notepad window.

    Shell Objects and General Folder/Windows Explorer Shortcuts

    F2 - Rename objectF3 - Find: All FilesCTRL+X - CutCTRL+C - CopyCTRL+V - PasteSHIFT+DEL - Delete selection immediately, without moving the item to the Recycle Bin.ALT+ENTER - Open the property sheet for the selected object.To Copy a File - Press down and hold the CTRL key while you drag the file to another folder.

    To Create a Shortcut - Press down and hold CTRL+SHIFT while you drag a file to the desktopor a folder.

    General Folder/Shortcut Control

    F4 - Selects the Go To A Different Folder box and moves down the entries in the box (if thetoolbar is active in Windows Explorer).F5 - Refreshes the current window.F6 - Moves among panes in Windows Explorer.CTRL+G - Opens the Go To Folder tool (in Windows 95 Windows Explorer only).CTRL+Z - Undo the last command.CTRL+A - Select all the items in the current window.BACKSPACE - Switch to the parent folder.SHIFT+CLICK - Close Button For folders, close the current folder plus all parent folders.

    Windows Explorer Tree Control

    Numeric Keypad * - Expands everything under the current selection.Numeric Keypad + - Expands the current selection.

  • 8/8/2019 Win Interview Questions

    14/15

    Numeric Keypad - - Collapses the current selection.RIGHT ARROW - Expands the current selection if it is not expanded, otherwise goes to thefirst child.LEFT ARROW - Collapses the current selection if it is expanded, otherwise goes to the parent.

    Property Sheet Control

    CTRL+TAB/CTRL+SHIFT+TAB - Move through the property tabs.

    Accessibility Shortcuts

    Tap SHIFT 5 times - Toggles StickyKeys on and off.Press down and hold the right SHIFT key for 8 seconds - Toggles FilterKeys on and off.Press down and hold the NUM LOCK key for 5 seconds - Toggles ToggleKeys on and off.Left ALT+left SHIFT+NUM LOCK - Toggles MouseKeys on and off.Left ALT+left SHIFT+PRINT SCREEN - Toggles High Contrast on and off.

    Microsoft Natural Keyboard Keys

    WINDOWS - Start MenuWINDOWS+R - Run dialog boxWINDOWS+M - Minimize AllSHIFT+WINDOWS+M - Undo Minimize AllWINDOWS+F1 - HelpWINDOWS+E - Windows ExplorerWINDOWS+F - Find Files or FoldersWINDOWS+D - Minimizes all open windows and displays the desktop

    CTRL+WINDOWS+F - Find ComputerCTRL+WINDOWS+TAB - Moves focus from Start, to Quick Launch bar, to System Tray. UseRIGHT ARROW or LEFT ARROW to move focus to items on Quick Launch bar and SystemTrayWINDOWS+TAB - Cycle through taskbar buttonsWINDOWS+BREAK - System Properties dialog boxApplication key - Displays a context menu for the selected item

    Microsoft Natural Keyboard with IntelliType Software Installed

    WINDOWS+L - Log off Windows

    WINDOWS+P - Opens Print ManagerWINDOWS+C - Opens Control PanelWINDOWS+V - Opens ClipboardWINDOWS+K - Opens Keyboard Properties dialog boxWINDOWS+I - Opens Mouse Properties dialog boxWINDOWS+A - Opens Accessibility Options(if installed)WINDOWS+SPACEBAR - Displays the list of IntelliType HotkeysWINDOWS+S - Toggles the CAP LOCK key on and off

  • 8/8/2019 Win Interview Questions

    15/15

    Dialog Box Keyboard Commands

    TAB - Move to the next control in the dialog box.SHIFT+TAB - Move to the previous control in the dialog box.SPACEBAR - If the current control is a button, this clicks the button. If the current control is a

    check box, this toggles the check box. If the current control is an option button, this selects theoption button.ENTER - Equivalent to clicking the selected button (the button with the outline).ESC - Equivalent to clicking the Cancel button.ALT+ - Select menu item.

    Read more: http://newadmins.blogspot.com/search/label/interview%20questions#ixzz19QrCxifj

    http://newadmins.blogspot.com/search/label/interview%20questions#ixzz19QrCxifjhttp://newadmins.blogspot.com/search/label/interview%20questions#ixzz19QrCxifj