CompTIA Interview Questions and Answers [BEST & NEW]
CompTIA-Interview-Questions-and Answers-ACTE

CompTIA Interview Questions and Answers [BEST & NEW]

Last updated on 17th Nov 2021, Blog, Interview Questions

About author

Reema Yadav (Support Project Manager )

Reema Yadav is the project manager in the management department with 4+ years of experience. He has research in TTB, Agile PMO, KRA KPI, Scrum metrics, Jira Software, CRO, and RTE. Her professionalism was helpful to crack seekers.

(5.0) | 19278 Ratings 2614

We have assembled the most commonly asked CompTIA manager Interview Questions and Answers will assist you to prepare for the CompTIA manager viva questions and answers that an interviewer might ask you during your interview. There are a lot of opportunities from many reputed companies in the world. According to research, CompTIA manager has a market share of about 3.25%. So, You still have opportunities to move ahead in your career in the CompTIA manager certification guide. ACTE offers advanced CompTIA manager Interview Questions that helps you in cracking your interview & acquiring your dream career as an CompTIA manager Developer. This complete guide of CompTIA manager interview questions will encourage you to crack your Job interview easily.

    Subscribe For Free Demo

    1.What is a Personal computer?


      A personal computer (PC) is a system of components that work together, A PC is computer hardware – not an operating system or application.

      The components that make up a PC :

    • Motherboard
    • Processor (CPU)
    • Memory (RAM)
    • Storage (Hard drive)
    • Power supply
    • Mouse and keyboard
    • Video card
    • Network card
    • Cooling fan

    2. What Is Storage Device?


      The storage device is the place where the computer data is stored when it is not in use.

    3.What Is System Board (MotherBoard)?


      A system board, also known as a motherboard is the main board of the computer.

    4. What Is Computer Memory? What are different types of RAM?


      Computer memory is where your computer stores the data.

    5. What are different Hard Disk Drive Connector Types?


      Hard drive connectors are typically connected with integrated disk controllers and are of various types like IDE/EIDE/PATA, SATA, SCSI, etc.

    6. What are the different CPU Technologies?


      Types of CPU technologies are Hyper-Threading, Multicore, Throttling, Microcode, Overclocking, and Cache.

    7. What are the functions of an Operating System?


      Operating System is the software that provides the ability to run computer applications.

    • Connects you to devices on your computer.
    • Manages RAM.
    • Prioritizes applications/processes.
    • Connects to networks.
    • Manages files and folders.
    • Provides a graphical interface.
    • Secures computer data.
    • Applications must be compatible with operating systems. Examples of operating systems: Window/ XP, Vista, MAC, Linux, windows server.

    8. Tell us something about the Components and Terminology of Operating Systems.


      Registry, Virtual Memory, and File Structure.

    Components and Terminology of Operating Systems

    9. What are System Files?


    • Registry data files.
    • INI – allows you to choose the OS or the OS with different boot options.
    • NTLDR – the boot loader, not in vista, located in the root of the active disk partition, reads the boot.ini, if XP is selected, it runs, then it runs ntoskrnl.exe and hal.dll, then reads the registry and loads, device drivers.
    • COM – to get information about hardware run by ntldr.
    • SYS – used to boot windows from SCSI disk devices.

    10. What are the different methods of Installing an Operating System?


      There are multiple methods of installing an operating system. For many end-users, the OS comes pre-installed on their new computer and they never think about it. However, as a technician, it is very important to know how to install, re-install and upgrade an OS. Methods of installation :

      1. Boot media – CD

      2. Boot media alternatives – DVD, floppy, or USB

      3. Network installation, remote installation service (RIS) or automated deployment services (ADS)

      4. Drive imaging – ghost

    11. What are the basic hardware parts that you need to get a PC working?


      The basic parts of a PC are a computer case, a monitor, keyboard, mouse, and the power cord. Each of these parts has their own value and an important role to get a PC working. Make sure you mentioned them and explain briefly what they’re function is.

    12. What is a graphic card/ a graphic driver?


      The graphic components of your PC are on a separated card that has its own slot and gets plugged into the motherboard. That is why these components are called graphic cards. You should mention that lap-tops usually have their graphic components built in the motherboard.The graphic driver is a program that controls and oversees how your graphic components respond to everything else in your software.

    13. What is the motherboard?


      The mother-board or also called the main-board is the backbone of the PC. The motherboard is a platform that connects all of the parts together, including the sound drivers, video drivers, graphic cards, hard drives, the CPU memory.

    14. How would you define ROM and how RAM?


      ROM and RAM are both memories but differ in their functions. ROM (Read-only memory) is a memory that reads and storages codes of the programs that run under the processor, while RAM (random-accessible memory) runs only temporarily while power is on and the PC is working. ROM continues to store data even when power is off. That’s why RAM is more important for video gaming, so it can support more.

    15. When talking about RAM, what is Cache Ram?


      The cache RAM or sometimes known as SRAM is the place where often used data is stored on a regular basis. It is a small high-speed memory box positioned behind the CPU and above the main memory. The processor always firstly checks the SRAM, before proceeding somewhere else.

    16.What is a modem?


      A modem or a modulator-demodulator is a device that converts the waves coming from telephones and cables and then processes them into the computer. The PC has digital information and telephones usually send analog waves. The modems’ function is receiving and converting these waves, creating communication.

    17. What is FireWire?


      FireWire is a type of device that can transfer information between all sorts of digital devices, including audio and video equipment and it is also easy to use.

    18. How many cycles per second do one GHZ do?


      One billion cycles per second.

    19. What is a microprocessor?


      Microprocessors are small, programmable, multi-tasking devices that can input data, process it, and then provide the outcome as the output results. Their functionality used to be integrating data from the CPU on one integrated circuit or more, but now all the CPUs are microprocessors. Their functionality is based on the binary system and includes symbols and numbers. Integrating the whole CPU on just one chip saves a lot of processing power.

    20. What Is GUI?


      The GUI or the graphical-user interface


    21. How would you set up a wireless network?


      Firstly, you would need the wireless adapters for each device on a wireless network. Lap-tops nowadays have in-built wireless adapters, but if you happen to have an outdated one, be sure to get wireless adapters first. Then, wireless routers are needed to set up a full and all-wireless network. You also need access points to spread the network. Access points are usually set up after the routers have been installed. This is how you allow the network to grow. Then, the access points and the wireless routers all get channeled through the wireless antenna which puts out a strong radio signal. In the end, a wireless repeater to expand the range on your wireless for users who can’t get the signal is the last you should do.

    22.Explanation of DRAM.


      If RAM is random-access memory, DRAM is Dynamic random-access memory. What does that mean? It means that it stores every BIT of data from the PC in one circuit. DRAM shifts between two states, being charged or discharged so its value is either 0 or 1.

    23. Can DRAM speed up your PC?


      Yes, DRAM is a valuable thing to upgrade when thinking about boosting your system performance. The fact is, it does not upgrade your CPU in terms of faster response, but on the other hand, it reduces the time the CPU waits for information from the hard drive.

    24. Why do hard-drive partitions?


      It will optimize your PC and help you maintain your data more effectively. Having all the data on only one partition can be of great risk if for example, your Windows crashes for good. Always separate the backup files and all the other things on different partitions. Even try to put a boot-up OS version on one partition. It will help immensely.

    25. How many bytes are there in 1 kilobyte?


      One thousand bytes.

    26. What are IP addresses?


      An IP address is your personal data identifier. All the computers that are on the web, communicate through IP addresses as to faster identify the specified and wanted a computer and then transfer data to it. IP addresses are vital for one network to function. Picture it as a spider’s web with all the little dots in-between the web. Those dots are the IP address, the unique identifiers on every location, on every computer on the web.

    27. What is a gateway?


      Internetworking explains the act of communication between the two networks. The gateways are usually set up on the “end” or “edge” of the network and their function is not just to set up communication with another network, but to protect the network as well. That is why the gateways also come with firewalls. Simply like connecting several computers in a local network with a router (which in that case serves as a gateway). They operate on any level in OSI.

    28. What is the OSI model?


      OSI model is short for Open System Interconnection and is the ISO standard for networking across the World Wide Web. OSI model sets up a network limit (framework) to attach protocols in seven different layers. Starting at one station, all the way down to the bottom of the chain. Known OSI models are for example the X400 or the X500 and some of them are still very popular as the ones for e-mail and directory. Older OSI models now serve as a teaching or a practice method for all the protocols that need to be implemented.

    29. How would you describe the network?


      Simply put, a network is a communication between two computers. A network allows two or more computers to exchange files between them, share the same screen, message, use for printing, and much more. The way the network is based and how the computers are connected varies a lot. From telephone cables to sending out digital signals through Wi-Fi antennas, connected through satellites, infrared beams, and so on. There are several types of networks like LAN, WAN, etc. LAN is a local area network, WAN is a wide area network.

    30. Explain the difference between a hub and a switch?


      Both the hub and a switch are network components that connect electronic devices in two different ways. They both create network traffic, but they respond to it differently. The hub (or also called the receiver) is a device that after receiving all the information, puts out a repetition signal and sends it to all the other devices. The negative thing about this is that it can cause unnecessary traffic your way. Having a switch is good for better control of traffic. It collects packages from all the address information and sends it out to the given specific port. It is more manageable and better for a bigger network. Hubs are used for smaller networks.

    31. VPN – what does it stand for?


      A VPN is a virtual private network that allows safe use of the Internet and safe surfing. It builds a layer of security on top of the Internet and browsing through this isolated network, greatly helps to keep your data away from prying eyes.

    32.What is DNS?


      DNS stands for Domain Name Servers and it is a list of all the domains and then gets translated into IP addresses.

    Course Curriculum

    Develop Your Skills with CompTIA Security+ for System Administrators Certification Training

    Weekday / Weekend BatchesSee Batch Details

    33.How does a network problem differ from a DNS problem?


      A DNS (domain name server) problem is when the domain name cannot be translated into an IP address. If your computer can’t recognize an IP address on a certain domain name and cannot really establish communication, then you’d have a DNS problem. The network problem usually appears when you cannot trace and find the IP address.

    34. How to set up a VLAN and what is VLAN?


      Highly flexible networks called Virtual Local Area Network don’t require any physical connection but rather respond through logical operations. They also don’t have to be in the same space or geographical standpoint.

    35.What is the purpose of Active Directory?


      Active Directory is a Windows directory that works with complex network resources and responds in one universal way.

    36. What is DHCP?


      DHCP is a Dynamical Host Configuration Protocol.

    37. How to set up a default router or a default gateway?


      Like we’ve said previously, a gateway is a way of accessing a network. When you experience difficulty accessing one (any kind of network issue), the default gateway is used to create an access point for your PC to use the web. This is when the IP address cannot match any other routes.

    38.What are the different classes of networks?


      Different networks come in different sizes. Setting up a small network may be useful for a network-caffe, but not for a big company. Therefore, networks differ from Class A to B to C with different sizes and amounts of computers and network traffic that it can hold.

    39. What is circular logging?


      This kind of logging keeps the transactional logging process in the windows directory from expanding and enlarging. It overwrites (circulates) the first log file so that it won’t take up space on the hard disk.

    40. Which protocol is used in a directory service?


      it is the LDAP (Light-weight Directory Access Protocol) which is an industry protocol for maintaining directory data.

    41. What is your experience with operating systems and which ones have you used?


      This is a commonly asked question and shouldn’t be a reason to stress at all. Questions like these should be answered almost instantly.To impress the interviewers, it is best to explain to them about all the operating systems that you have worked with. Don’t hesitate in telling them every bit of detail, because they want to make sure that you are an all-rounder and can work with any OS.

    42. How would you make sure that a printing quality issue is fixed or not?


      An IT technician’s job is to keep all the personal computers and devices in the office running smoothly. One of the devices that are used repeatedly is a printer, and keeping it up and running is essential to everyday business chores.If the interviewer asks you, how will you check whether the printer is printing correctly or not, you may tell them that you will print blank pages to ensure that the pages come out clean.

    43. What are the functions of Operating Systems?


      Tell the interviewer the functions of an operating system that include the following: You may also tell the interviewer about the different operating systems including Windows XP, Vista, MAC, Linux, and Windows server.

    • Prioritized applications and processes
    • Secures computer data
    • Manages files and folders
    • Connects you to devices on your computer
    • Manages RAM
    • Connects to networks
    • Provides a graphical interface

    44. Do you know the different OS terminologies?


      Make sure you come prepared for your CompTIA A+ job interview by learning the ins and outs of all the operating system terminologies. Answer the question by telling the interviewer about Registry, virtual memory and file structure.

    45. What are the many ways you can install an Operating System?


      Even if the company computers already have OS installed, it is important for a technician to be aware of the many installation procedures. In case you need to reinstall or update an OS, you must answer with the following:

    • Automated deployment services (ADS) or remote installation service (RIS), Network installation
    • Drive imaging – ghost
    • Boot media alternatives – USB, floppy, or DVD
    • Boot media – CD

    46.Are you good at communicating with end-user?


      As a CompTIA A+ technician, it is important that you are capable of handling end-user queries and problems. You’re going to solve all computer and IT related problems faced by employees in an organization.So, when the interviewer throws this question at you, the most important thing is to remain confident while answering it. Tell them you will be fixing problems with the PC, replacing faulty mouse and other components of a PC, installing and upgrading the system, fixing issues with the printer and much more. The more things you add to the list, the better.

    47. Tell us about an issue that was brought to you and the way you handled it?


      Employers want to make sure they are hiring a technician who is not only certified, but also holds practical work experience. That’s the reason you can expect them to ask about your game-plan for fixing an IT related issue you dealt with on your previous job. The trick to acing the answer to this question is to tell them all the tasks you performed on a daily basis and how many problems you solved.

    48. What are the different types of CPU technologies?


      Types of CPU technologies are cache, overclocking, microcode, throttling, multicore, and hyper-threading. It’s a plus to be able to work with all of these.

    types of CPU technologies

    49. What do you mean by Gateway?


      A gateway can be defined as a hardware device. And one can connect this hardware device to two or more networks at a time; it can be denoted as a router, firewall, server, or any other device Which works as a gateway. The significant role of a gateway is to regulate traffic in the network.

    50. Differentiate between a Gateway and a Router.


      The difference between a gateway and a router Is that a gateway Conveys data between different networks. At the same time, a router conveys data between two similar systems.

    51. What are the various types of Hard Disc Drive Connectors?


      The rigid drive connectors are connected with A variety of integrated disc controllers. And the different types of Hard Disc Drive Connectors are; ITE, EITE, PATA, SATA, SCSI, et cetera.

    52. Define the functions of an operating system.


      An operating system can be defined as software that supplies. That helps computers run applications. Different types of applications. Various functions of the operating system are :

    • It has to manage the RAM Or memory of a computer.
    • It helps the user to connect any type of device On their computer.
    • It provides a user with a graphical interface.
    • It secures the data of a computer.
    • It helps the user to connect To various networks.
    • It helps to manage files and folders on the computer.
    • It manages and monitors A series of applications and processes.
    • A user has to make sure that the application they installed should be compatible with their operating system. As every application is designed specifically for A particular type of operating system. Like Windows XP, Windows Vista, LINUX, and MAC so on.

    53. What do you mean by system files in Brief ?


      Finds like registry data files, INI, NTLDR, COM, and SYS Are known as System files. Each of these files works differently To serve a particular purpose.

    • Registry Data files to store databases of low-level settings for the Windows operating system
    • The INI Permits a user to choose a Suitable operating system. While it also helps a user to choose Different boot options for their operating systems.
    • The NTLDR Is a boot loader. It is generally found in the active disk partition. It is written as “Boot.ini” When XP is selected. It runs the comment; further, it runs the ntoskml.exe, and then it runs hal.dll. After running these commands, it reads the registry data files and loads the device drivers.
    • The COM Helps the user to get information about the hardware run by “ntldr.”
    • The SYS Is a system file that is used to boot windows. It is used to boot windows from SCSI disc drivers.

    54. Describe the different methods of installing an operating system.


      There are various known methods to install any operating system. For every end-user, the operating systems are installed by the computer technicians. So it is evident that an end-user Will never understand the different methods put in to install an operating system. However, a technician’s job is to understand and learn about various ways and methods of installing operating systems into a computer.

      There are four methods of installing an operating system into a computer. And those methods are :

    • Boot media- CD
    • Alternatives to boot media- DVD, floppy, or USB.
    • Drive Imaging- Ghost
    • Network installation Method That are automated deployment services Or remote installation services.

    55. Tell us about the necessary hardware parts that you need to get Your Personal Computer working.


      A person’s computer’s essential hardware parts denote a computer case, A monitor, keyboard, mouse, and power cord. Every hardware part of a personal computer is essential. It plays an essential role in helping computer work Normally and precisely.

    56. What do you mean by a graphics card or a graphics driver?


      Graphics Card is an essential component of a computer That consists of a computer’s graphic components. There is a separate slot In which a graphics card is plugged in. And this load for the graphics card is situated in the motherboard. And this is the reason why it is called a graphics card. A user needs to buy and plug-in a graphics card into the motherboard off with the CPU Of their personal computer. In laptops, there is no such requirement, As laptops come along with a built-in graphics card.A graphics driver is another component That is different from a graphics card. But without the availability of a graphics driver, A graphics card cannot be used in a computer. Generally, a graphics driver is defined as a computer program after installing the graphics card. It plays a significant role in controlling and monitoring the Response of graphics components In a computer.

    graphics card or a graphics driver

    57. What do you mean by a motherboard?


      The motherboard is the backbone of a computer. It can be defined as a platform that connects various parts of a computer. It helps connect sound drivers, video drivers, graphics cards and hard drives, And the CPU.

    58. What do you mean by modem?


      The modem is an acronym for a modulated-demodulator. It can be defined as a device that helps to convert the Telephonic waves and cable waves. And it processes those waves into the computer. The primary function of a murder mystery And convert Telephone Nick and cable waves To facilitate communication.

    59. What is cache RAM?


      The computer user creates any type of data. And the computer Stores those data regularly to provide better output For any input. The place where all these data are stored regularly is called cache RAM. The abbreviation for cache RAM is SRAM. It can be defined as a Small and compact high-speed memory, situated just behind the CPU as it stores every daughter of a computer. So, a processor always cheques into the SRAM before doing something else.

    60. Define FireWire in Brief .


      FireWire is such a device that helps in transferring every bit of information between various types of digital devices. It is a bit versatile in transferring different types of information and data. Different digital devices. It is even capable of transferring Information, Between audio and video equipment and devices. To use this device, one has to plug and unplug it while the power is on. The moment it is plugged into the computer, the computer responds to a FireWire device immediately. When the fire where is plugged into a computer, Then the transfer of various information starts immediately.

    61. What OSI model stands for?


      OSI model stands for Operating system interconnection.

    62. What is the best example for OSI Model?


      The best example of The OSI model Our email and directory.

    Course Curriculum

    Get JOB Oriented CompTIA Security+ for System Administrators Training for Beginners By MNC Experts

    • Instructor-led Sessions
    • Real-life Case Studies
    • Assignments
    Explore Curriculum

    63. Describe the network.


      A network can be described as a bridge between two or more computers that allows Them to communicate with each other. Network allows. Two computers to exchange data like files, Screens, Messages, Commands like printing, etc. Does the working process often depend on how two or more computers are connected? The process of a network. The working process often networks highly depends upon How Two or more computers are connected.

      From telephone cables 2 connecting any device through satellites, A network is created. And without creating a network, it is not possible to transfer or exchange any type of data or files from one device to another. When it comes to networks, Then there are many types of networks. And some of the most popular types of networks are LAN, WAN, etc. The LAN Network is used to connect two computers in a local area. At the same time, WAN is used to increase the range of network Across various computer systems.

    64.Define VPN.


      The VPN is an acronym for Virtual Private Network. Generally, the virtual private network Is used to provide security and privacy to a private and public network—to secure any network by connecting with remote servers with a dial-up connection.

    65. How is it possible to recover information from a virus-infected system?


      To recover information from a virus-infected system, the user must install an operating system. After installing an operating system and they have to update the antivirus in the system. Then the user can connect a hard drive to the system. Here a hard drive will act as a secondary drive for an infected system. Then the user has to clean and scan the hard drive. And by doing so, All the required data can be. They were copied into the system.

    66. When it comes to boot operations, How would you define BIOS?


      BIOS stands for the basic input-output system. It can be defined as the most primitive way of communicating with a computer. It provides the user with a platform to perform necessary Actions like changing the boot’s order and regulating system tasks.

    67. What is the meaning of RIP?


      The RIP stands for Routing information protocol. The primary function of routing information protocol Is to exchange and data Among the routers.

    Routing information protocol

    68. Define DHCP.


      The Dynamical Host Configuration Protocol or DHCP Is a type of protocol that permits any particular IP address as soon as possible. By allowing any specific IP address, DHCP Helps a computer to connect with the world web.

    69. What do you mean by circular logging?


      Circular logging can be defined as a type of logging, of which Helps in storing important transactional logging. The process is in the Windows dictionary. It circulates and expands the first log file. Doing so makes sure that the log files do not take space in the hard disk.

    70. What do you mean by proxy servers? How are they able to protect A system from computer networks?


      Proxy servers can be defined as those servers that help prevent external users from identifying a particular IP address. The processor was secured. Such type of IP addresses that belong to an internal network. The following mechanism of making virtual networks. Those virtual networks are not visible to external users. By creating a virtual network, the proxy servers make it impossible for the external users to identify a specific IP Address.

    71. Describe netstat


      The next step is a utility program. Its primary function is to give Information about the Present Transmission Control, Transmission Protocol, and Internet Protocol in any connection settings.

    72. What is a domain?


      when a computer is connected through A network of workplace or workplace network, it becomes a part of a domain.

    73. What is attenuation?


      When signals pass through a medium, those signals may lose some energy While traveling Through a medium. Any signal loses. Its energy Due to the resistance of any medium. And such loss of energy of Any signal is defined as attenuation.

    74. What is distortion?


      When traveling through any medium, a signal may change its shape. And when the shape or form of a signal is changed While passing through a medium, such phenomena are known as distortion.

    75. What is noise?


      When any signal passes through some electrical or electromagnetic energy, The quality of such signals may Deplete. And such depletion or degradation of signal due to electromagnetic energy is known as noise.

    76. What are Nodes ?


      Ans: Nodes: Devices or data points on a larger network are known as nodes. They are individual parts of a larger data structure and contain data. They also link other nodes.

    77. What Are Links?


      A link is the physical and logical network component for interconnecting hosts or nodes in a network. It is a physical communication medium such as coaxial cable or optical fiber.

    78. What Is A workgroup?


      A workgroup Depends upon the location of a computer network. If a computer is connected through a home network, then it becomes a part of the Workgroup.

    79. What is Communication?


      A process of sending and receiving information between source and destination, in both ways.

    80. What is Transmission?


      A process of sending and receiving information between source and destination, in only one way. It is mentioned as the physical movement of data.

    81. How Comfortable Are You with End-User Communication?


      One of the most important functions of an A+ certified computer technician have conversation with end users to solve their day-to-day computer and other work-related technology problems. Common issues to expect may be replacing a computer mouse, fixing an office shared printer and, if you have administrator rights, even changing a user’s network ID password. All these tasks should be expected from your position, so you should indeed be quite comfortable with this.

    End-User Communication

    82. What are the types of errors?


      There are two categories of errors are Single-bit error, Burst error.

    83. What is Single-bit error?


      One-bit error per data unit

    84. What is Burst error?


      It consists two or more bits errors per data unit.

    85. What is backbone network?


      It refers to a centralized infrastructure for distributing various routes and information to different networks. Backbone networks connect LANs and WANs.

    86.When was the last time it worked? Are you the only user experiencing this issue?


      Then follow this up with your following steps, such as research, testing the solution and then we get ultimately resolution.

    87.What is anonymous FTP?


      Ans: With the help of an anonymous FTP, the users can be granted an access to files in public servers. Users can log in as anonymous guests, which the name.

    anonymous FTP

    88. Name the basic hardware parts that you need to get a PC working?


      Ans: The principle parts of a PC are a computer case, a monitor, keyboard, mouse and the power cord. Each of these parts consists their own value and an important role to get a PC working. Make sure you specified them and explain briefly what they’re function is.

    89. Explain ‘hidden shares’?


      Ans: A hidden or an administrative share is a network share that is not to visible when viewing another computer’s shares.

    90. What is ipconfig?


      Ans: An acronym for Internet Protocol Configuration, Ipconfig is used on Microsoft Windows to see and configure the network interface. It displays all TCP/IP network summary information, which can available on a network, and helps to modify the DHCP protocol and DNS settings.

    91. During a Boot Process, Where Do you Systems First Count Memory From?


      Ans: it is one of the most difficult question, because it will require you to think a few levels deep to where a system first processes memory. The answer is that memory is the first counted from the system board before anywhere else.

    92. What is Project 802?


      802 is a project started by IEEE to set standards to enable inter conversation between equipment from a variety of manufacturers.

    93. What is half-duplex?


      It is the mode of conversation between two devices. Here the data flows bi-directional but simultaneously. A suitable example of a half-duplex is a walkie-talkie.

    94. What is Brouter?


      Brouter is a device that functions both a bridge and a router. It forwards information within the networks and also routes data to individual systems in a network.

    95. What is FMEA?


      Failure Mode Effect and Analysis or FMEA is a qualitative and systematic tool to mention potential failure modes in a system, the reasons, and their effects.

    96. What is the semantic gap?


      A semantic gap is the variation between high-level programming sets in various computer languages and the simple computing instructions used by microprocessors.

    97. What Does GUI mean ?


      The GUI or the graphical-user interface is based simply so users can manipulate the files and programs on the monitor with a mouse, drag and click on objects instead of putting in command with text. The GUI interface is used and was launched together with the most popular system – Microsoft. Since then, not a lot of GUI changes have been made, since this operation is basic.

    98. What RIP stands for ?


      It is the abbreviation for Routing information Protocol

    99. What FMEA Stands For?


      Failure Mode Effect and Analysis

    Comptia Security+ for System Administrators Sample Resumes! Download & Edit, Get Noticed by Top Employers! Download

    100. What is full duplex?


      This is also a mode of conversation between two devices and the data flow is bi-directional too, but the flow is simultaneously.

      Example : telephone.

    full duplex

    Are you looking training with Right Jobs?

    Contact Us

    Popular Courses

    Get Training Quote for Free