You are on page 1of 22

Interview based questions for L1 profile

Domain: Operating Systems

1. Difference between Vista and XP. . Bitlocker Option available Windows XP has . No Bitlocker option
- Bitlocker drive encryption, Bitlocker on volume Prevents hard drive from hackers 2. Windows Vista has Windows Defender tool Windows XP has No Windows Defender tool available - prevents from spyware & unwanted S/W installing on computer 3. Windows Vista has Parental control Feature Windows XP has No Parental control Feature - This option enables parents to restrict Childrens which sites, games .software to use & not

Windows XP was released in 2001. Windows Vista was released in 2007. Vista is much quicker at deploying actions than XP was. Vista has better GUI, Vista introduces a new "Glass" look to their interface, It is quicker and more sleek than the solid boxes used for the old XP system. The Start Menu has been redesigned as well, with fewer folders and better organization. Sleep State is new to Vista, and was previously named Standby in XP. Sleep State is quicker to wake than Standby,

2.Difference between Vista and Win 7


Windows 7 open the programs and files you use most in just a click or two, Pin programs to the taskbar. Pin files to Jump Lists. Just like tacking notes on a bulletin board, you can use pin to keep the things you need close at hand. In Windows 7 Navigate lots of open windows more quickly. Peek gives

you the power of X-ray vision, so you can peer past all your open windows straight to the Windows 7 desktop. Simply move your mouse over the little transparent rectangle in the lower right corner of your screenand watch open windows instantly turn transparent, revealing all your hidden icons and gadgets. Windows 7 desktop will look different now because of the new taskbar. You can now reorder the opened Window buttons. Along with old Windows Vista games, Win 7 will have online version of Checkers, Spades and Backgammon.

3. What is the difference between Internet Explorer 6 7?


security issues in IE6 have been resolved. Tabs have been added. Font size can be changed for purpose of printing a page. Toolbars have Search box, news, feeds,etc. IE7 is more safer online.

What is the difference between Internet Explorer 7 8?


new feature in version 8 is the InPrivate browsing. It is a feature that you can activate and deactivate at will. When you leave an InPrivate browsing session, all the data for that session like cookies and temporary files are automatically deleted without touching the data that were not done in the InPrivate sessions. Pages made for IE7 may not render correctly in IE8.

4.What is System Restore? Does system restore have any effect on saved documents and files? If Not, Why?
System Restore helps you restore your computer's system files to an earlier point in time. It's a way to undo system changes to your computer without affecting your personal files, such as e-mail, documents, or photos. Sometimes, the installation of a program or a driver can cause an unexpected change to your computer or cause Windows to behave unpredictably. Usually, uninstalling the program or driver corrects the problem. If uninstalling does not fix the problem, you can try restoring your computer's system to an earlier date when everything worked correctly.

Open System Restore by clicking the Start button , clicking All Programs, clicking Accessories, clicking System Tools, and then clicking System Restore. If you are prompted for an administrator password or confirmation, type the password or provide confirmation. System Restore affects Windows system files, programs, and registry settings. It can also make changes to scripts, batch files, and other types of executable files on your computer.

5.What is Last Known Good Configuration?


The Last Known Good Configuration feature is a recovery option that you can use to start your computer by using the most recent settings that worked. The Last Known Good Configuration feature restores registry information and driver settings that were in effect the last time the computer started successfully. Use the Last Known Good Configuration feature when you cannot start Windows XP after you make a change to your computer, or when you suspect that a change that you just made may cause a problem.

6.Steps to increase the performance of the computer.


Virus Scan Program Run the Scandisk program Run the Defragmenter program - Another program that you should run about every two months is called Disk Defragmenter. Defrag will arrange your files better so your PC can access them faster. It's best to run this program after the Scandisk program is finished. Clear your temporary files & cookies. Deleted prefetch files and history.

7.What is Cipher strength in Internet Explorer? How to check it?


cipher strength is the number of bits in the key used to encrypt data. When you click About Internet Explorer on the Help menu, the Cipher Strength value is mentioned.

8.What is Blue Screen Error?


A stop error screen or bug check screen, commonly called a blue screen of death (also known as a BSoD, bluescreen, or "blue screen

of doom"), is caused by a fatal system error and is the error screen displayed by the Microsoft Windows family of operating systems upon encountering a critical error, of a non-recoverable nature, that causes the system to "crash." The common expression blue screen of death comes from the color of the screen generated by the error.

9.What are the various security features in Vista which were not there in XP?
User Account Control is a new infrastructure that requires user consent before allowing any action that requires administrative privileges Windows Vista includes Windows Defender, Microsoft's anti-spyware utility. According to Microsoft, it was renamed from 'Microsoft AntiSpyware' because it not only features scanning of the system for spyware, similar to other free products on the market, but also includes Real Time Security agents that monitor several common areas of Windows for changes which may be caused by spyware. These areas include Internet Explorer configuration and downloads, auto-start applications, system configuration settings, and add-ons to Windows such as Windows Shell extensions. Windows Defender also includes the ability to remove ActiveX applications that are installed and block startup programs. It also incorporates the SpyNet network, which allows users to communicate with Microsoft, send what they consider is spyware, and check which applications are acceptable. Windows Vista includes a range of parental controls for non-domain user accounts. Windows Parental Controls rely on UAC to implement reduced rights account identities needed for offline restrictions. An administrator can apply parental control restrictions to other users on the computer. Windows Vista introduces Network Access Protection (NAP), which makes sure that computers connecting to a network or communicating over a network conform to a required level of system health as has been set by the administrator of the network. Depending on the policy set by the administrator, the computers which do not meet the requirements will either be warned and granted access or allowed a limited access to network resources or completely denied access.

10.

Use of command MSCONFIG.

Boot.ini Startup System.ini services

Domain: Networking
1.What are the various layers in OSI Model? 2.What are the differences between Hub, Switch and Router? What are their respective layers on the OSI model?
HUB is a device for connecting multiple twisted pair or fibre optic Ethernet devices together and making them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. A network bridge connects multiple network segments at the data link layer (Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a device that behaves according to the IEEE 802.1D standard. A bridge and switch are very much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge. Bridges are similar to repeaters or network hubs, devices that connect network segments at the physical layer (Layer 1) of the OSI model; however, with bridging, traffic from one network is managed rather than simply rebroadcast to adjacent network segments. Bridges are more complex than hubs or repeaters. Bridges can analyze incoming data packets to determine if the bridge is able to send the given packet to another segment of the network. A network switch or switching hub is a computer networking device that connects network segments. Switches that additionally process data at the network layer (layer 3 and above) are often referred to as

Layer 3 switches or multilayer switches. A switch works similiarly where it also makes decisions on where the data is going by reading a small portion of it (the destination address) and determines on which particular port to send it out. A router is an electronic device that intercepts signals on a computer network. The router determines where the signals have to go. Each signal it receives is called a data packet. The packet contains address information that the router uses to divert signals appropriately. (Network layer)

3.What is Default Gateway?


In general, a gateway is a device on a network that acts as an entrance to another network. In more technical terms, a gateway is a routing device that knows how to pass traffic between different subnets and networks. A computer will know some routes (a route is the address of each node a packet must go through on the Internet to reach a specific destination), but not the routes to every address on the Internet.

4.What are the various classes of IP Addressing?


IP addresses were originally organized into classes. The address class determined the potential size of the network. The class of an address specified which of the bits were used to identify the network, the network ID, or which bits were used to identify the host ID, host computer. It also defined the total number of hosts subnets per network. There were five classes of IP addresses: classes A through E. Classful addressing is no longer in common usage and has now been replaced with classless addressing. Any netmask can now be assigned to any IP address range.

Class A: Class A addresses are specified to networks with large number of total hosts. Class A allows for 126 networks by using the first octet for the network ID. The first bit in this octet, is always set and fixed to zero. And next seven bits in the octet is all set to one, which then complete network ID. The 24 bits in the remaining octets represent the hosts ID, allowing 126 networks and approximately 17 million hosts per network. Class A network number values begin at 1 and end at 127. An example of a Class A IP address is 102.168.212.226, where "102" identifies the network and "168.212.226" identifies the host on that network. Class B: Class B addresses are specified to medium to large sized of networks. Class B allows for 16,384 networks by using the first two octets for the network ID. The two bits in the first octet are always set and fixed to 1 0. The remaining 6 bits, together with the next octet, complete network ID. The 16 bits in the third and fourth octet represent host ID, allowing for approximately 65,000 hosts per network. Class B network number values begin at 128 and end at 191. An example of a Class B IP address is 168.212.226.204 where "168.212" identifies the network and "226.204" identifies the host on that network. Class C: Class C addresses are used in small local area networks (LANs). Class C allows for approximately 2 million networks by using the first three octets for the network ID. In class C address three bits are always set and fixed to 1 1 0. And in the first three octets 21 bits complete the total network ID. The 8 bits of the last octet represent the host ID allowing for 254 hosts per one network. Class C network number values begin at 192 and end at 223. An example of a Class C IP address is 200.168.212.226 where "200.168.212" identifies the network and "226" identifies the host on that network. Class D and E: Classes D and E are not allocated to hosts. Class D addresses are used for multicasting, and class E addresses are not available for general use: they are reserved for future purposes.

5.What is Subnet Mask?

A mask used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network. Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format. The full address is: 10010110.11010111.00010001.00001001 The Class B network part is: 10010110.11010111 and the host address is 00010001.00001001 If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are reserved for identifying the subnet. The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By convention, the bits for the network address are all set to 1, though it would also work if the bits were set exactly as in the network address.) In this case, therefore, the subnet mask would be 11111111.11111111.11110000.00000000. It's called a mask because it can be used to identify the subnet to which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The result is the subnetwork address:
Subnet Mask IP Address Subnet Address 255.255.240.000 150.215.017.009 150.215.016.000

11111111.11111111.11110000.0000000 0 10010110.11010111.00010001.0000100 1 10010110.11010111.00010000.0000000 0

The subnet address, therefore, is 150.215.016.000.

6.What is subnetting?
Subnetting is the process of breaking down an IP network into smaller subnetworks called "subnets." Each subnet is a non-physical description (or ID) for a physical sub-network (usually a switched network of host containing a single router in a multi-router network).

7.What is Address Resolution Protocol?

The address resolution protocol (arp) is a protocol used by the Internet Protocol (IP) [RFC826], specifically IPv4, to map IP network addresses to the hardware addresses used by a data link protocol. The protocol operates below the network layer as a part of the interface between the OSI network and OSI link layer. It is used when IPv4 is used over Ethernet. The term address resolution refers to the process of finding an address of a computer in a network. The address is "resolved" using a protocol in which a piece of information is sent by a client process executing on the local computer to a server process executing on a remote computer. The information received by the server allows the server to uniquely identify the network system for which the address was required and therefore to provide the required address. The address resolution procedure is completed when the client receives a response from the server containing the required address.

8.What is a MAC Address? How to check the MAC Address of a computer? Does every device in a network have a MAC address?
A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies including Ethernet. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model. MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. Where to find Mac address: Open "Network Connections" Select your Local Area Connection and right-click, select "Status". In "Support" tab, click "Details". Our MAC Address is the "Physical Address" listed in Network
Connection Details. OR At the command prompt, type 'ipconfig /all' without quotes Alternatively, if using Windows XP, you can use the command 'getmac'. Your MAC Address is listed under 'Physical Address' as a series of 6 groups of two digits, letters and numbers, separated by dashes, such as in the image below. Make sure you get the

physical address of the correct network adapter - usually there are several listed.

9.What is DHCP?
The Dynamic Host Configuration Protocol (DHCP) is an auto configuration protocol used on IP networks. Computers that are connected to IP networks must be configured before they can communicate with other computers on the network. DHCP allows a computer to be configured automatically, eliminating the need for intervention by a network administrator. It also provides a central database for keeping track of computers that have been connected to the network. This prevents two computers from accidentally being configured with the same IP. Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network.

DHCP assigns an IP address when a system is started, for example: A user turns on a computer with a DHCP client. The client computer sends a broadcast request (called a DISCOVER or DHCPDISCOVER), looking for a DHCP server to answer. The router directs the DISCOVER packet to the correct DHCP server. The server receives the DISCOVER packet. Based on availability and usage policies set on the server, the server determines an appropriate address (if any) to give to the client. The server then temporarily reserves that address for the client and sends back to the client an OFFER (or DHCPOFFER) packet, with that address information. The server also configures the client's DNS servers, WINS servers, NTP servers, and sometimes other services as well. The client sends a REQUEST (or DHCPREQUEST) packet, letting the server know that it intends to use the address. The server sends an ACK (or DHCPACK) packet, confirming that the client has a been given a lease on the address for a server-specified period of time.

10.

What is DNS?

Domain Name System (DNS) is one of the industry-standard suite of protocols that comprise TCP/IP. Microsoft Windows Server 2003. DNS is implemented using two software components: the DNS server and the DNS client (or resolver). Both components are run as background service applications. Network resources are identified by numeric IP addresses, but these IP addresses are difficult for network users to remember. The DNS database contains records that map user-friendly alphanumeric names for network resources to the IP address used by those resources for communication. In this way, DNS acts as a mnemonic device, making network resources easier to remember for network users. Another important function of the DNS is to control the delivery of email messages.
How does DNS work?

A DNS program works like this - every time a domain name is typed in a browser it is automatically passed on to a DNS server, which translates the name into its corresponding IP address (e.g. the domain name NTC Hosting.com is translated to 66.40.65.49). Thanks to the DNS, we do not need to bother to remember complicated numeric combinations to reach a certain website - we can use its meaningful and much easier to remember domain name instead.

11.

What is TCP/IP, UDP Protocol, Telnet?

TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Interne Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination. TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.) TCP is an alternative to UDP. Unlike TCP, however, UDP does not provide the service of dividing a message into packets (datagrams) and reassembling it at the other end. Specifically, UDP doesn't provide sequencing of the packets that the

data arrives in. This means that the application program that uses UDP must be able to make sure that the entire message has arrived and is in the right order. Network applications that want to save processing time because they have very small data units to exchange (and therefore very little message reassembling to do) may prefer UDP to TCP. The Trivial File Transfer Protocol (TFTP) uses UDP instead of TCP. Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else's computer remotely. On the Web, HTTP and FTP protocols allow you to request specific files from remote computers, but not to actually be logged on as a user of that computer. With Telnet, you log on as a regular user with whatever privileges you may have been granted to the specific application and data on that computer.

12.

Difference b/w TCP/IP and OSI model?

The OSI model originally distinguishes between service, interval and protocols. The TCP/IP model doesnt clearly distinguish between service, interval and protocol.

The OSI model is a reference model. The TCP/IP model is an implementation of the OSI model.

In OSI model, the protocols came after the model was described. In TCP/TP model, the protocols came first and the model was really just a description of the existing protocols.

In OSI model, the protocols are better hidden. In TCP/IP model, the protocols are not hidden.

The OSI model has 7 layers. The TCP/IP model has only 4 layers.

The OSI model supports both connectionless and connection-oriented communication in the network layer, but only connection -oriented

communication in transport layer.

The TCP/IP model supports both connectionless and connectionoriented communication in the transport layer, giving users the choice.

13.

What is a VPN?

A virtual private network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. There are many different classifications, implementations, and uses for VPNs. You can create VPN connection in windows by creating a new connection in network connections page.

14.

Basics of Active Directory.

An active directory is a directory structure used on Microsoft Windows based computers and servers to store information and data about networks and domains. An active directory (sometimes referred to as an AD) does a variety of functions including the ability to provide information on objects, helps organize these objects for easy retrieval and access, allows access by end users and administrators and allows the administrator to set security up for the directory. An active directory can be defined as a hierarchical structure and this structure is usually broken up into three main categories, the resources which might include hardware such as printers, services for end users such as web email servers and objects which are the main functions of the domain and network. It is interesting to note the framework for the objects. Remember that an object can be a piece of hardware such as a printer, end user or security settings set by the administrator. These objects can hold other objects within their file structure. All objects have an ID, usually an object name (folder name). In addition to these objects being able to hold other objects, every object has its own attributes which allows it to be characterized by the information it contains. Most IT professionals call these settings or characterizations schemas. The type of schema created for a folder will ultimately determine how these

objects are used. For instance, some objects with certain schemas cannot be deleted, they can only be deactivated. Others types of schemas with certain attributes can be deleted entirely. For instance, a user object can be deleted, but the administrator object cannot be deleted. When understanding active directories, it is important to know the framework that objects can be viewed at. In fact, an active directory can be viewed at either one of three levels, these levels are called forests, trees or domains. The highest structure is called the forest because you can see all objects included within the active directory. Within the Forest structure are trees, these structures usually hold one or more domains. Going further down the structure of an active directory are single domains. To put the forest, trees and domains into perspective, consider the following example. A large organization has many dozens of users and processes. The forest might be the entire network of end users and specific computers at a set location. Within this forest directory are now trees that hold information on specific objects such as domain controllers, program data and system, among others. Within these objects are even more objects which can then be controlled and categorized.

15. How to check the IP address? What are the commands ipconfig /all, ipconfig /release and ipconfig /renew used for?
To check IP address : Type IPCONFIG in CMD and press enter. /all: Displays the full TCP/IP configuration for all adapters. Without this parameter, ipconfig displays only the IP address, subnet mask, and default gateway values for each adapter. Adapters can represent physical interfaces, such as installed network adapters, or logical interfaces, such as dial-up connections. /Reslease: Release the IP address. This option terminates any active TCP/IP connections on all network adapters and releases those IP addresses for use by other applications. 'ipconfig /release" can be used with specific Windows connection names. In this case, the command will affect only the specified connections and not all. The command accepts either full connection names or wildcard names. Examples: ipconfig /release "Local Area Connection 1" ipconfig /release *Local* /Renew: Renew the IP address.
This option re-establishes TCP/IP connections on all network adapters. As with the release option, ipconfig /renew takes an optional connection name specifier. Both /renew and /release options only work

on clients configured for dynamic (DHCP) addressing.

16. What is the use of command PING? What is its full form
Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. PING: Packet InterNet Groper)

Domain: MS Outlook
1.Differences between MS Outlook and Outlook Express.
Outlook and Outlook Express were designed by different programming teams for different audiences with different needs. Outlook Express was developed as part of Internet Explorer with the home user in mind while Outlook was developed as part of

Microsoft Office with the corporate user in mind. Outlook Express handles not only Internet mail but also Internet news, a feature that Outlook does not natively possess. But Outlook has a host of features that Outlook Express does not have, such as a calendar, a task list, a journal, and automatic backup into archive files. The address book in Outlook is a very sophisticated contact management system unlike the simple address book used by Outlook Express. Outlook can be programmed using Visual Basic for Applications (VBA) but Outlook Express cannot. Outlook has message rules for both incoming and outgoing mail, while Outlook Express can only filter incoming. Outlook rules also offer a much wider range of actions than do rules in Outlook Express. Outlook Express was designed for use on a single computer and so its message store and settings cannot be stored on a server. Outlook however was tailor-made for networks, and so its message store can be on a central server that many machines can access. If you need to access your e-mail from more than one machine on your network, Outlook Express is just not the solution for you.

2.What are PST and OST files?


Off-line Storage Table: An OST file (.ost) is an offline folder file in Microsoft Outlook. Offline folders make it possible for the user to work offline and then to synchronize changes with the Exchange server the next time they connect. The ability to work offline is useful in environments with limited or unreliable connectivity. In computing, a Personal Storage Table (.pst) is an open proprietary file format used to store copies of messages, calendar events, and other items within Microsoft software such as Microsoft Exchange Client, Windows Messaging, and Microsoft Outlook. The open format is controlled by Microsoft who provide free specifications and free irrevocable technology licensing.

In Microsoft Exchange Server, the messages, the calendar, and other data items are delivered to and stored on the server. Microsoft Outlook stores these items in a personal-storage-table (.pst) or off-linestorage-table (.ost) files that are located on the local computer. Most commonly, the .pst files are used to store archived items and the .ost files to maintain off-line availability of the items. The .pst file format is supported by several Microsoft client applications, including Microsoft Exchange Client, Windows Messaging, and Microsoft Outlook To create a .pst file while Outlook is running, follow these steps: 1. On the File menu, point to New, and then click Outlook Data File. 2. In the Types of storage area, click Office Outlook Personal Folders File (.pst) to create a new Outlook 2003 .pst file. Click Outlook 97-2002 Personal Folders File (.pst) to create a new Outlook .pst file that is compatible with earlier versions of Outlook. 3. Click OK. 4. Use the default Outlook folder location, or you can locate a different folder location. 5. In the File name box, type a name for the new .pst file, or you can use the default name. Click OK. 6. In the Name box, type a title for the .pst file, or you can use the default title of Personal Folders. The title that you enter in the Name box is the name that is used on the Outlook 2003 All Mail Folders list, and it is applied to any shortcuts that are made for the .pst file on the Outlook Bar. You can also select an encryption setting and a password for the .pst file. After you select the settings that you want, click OK. Note You cannot change the encryption setting after you create the .pst file. For more information about the encryption settings, see the "Security settings for .pst files" section in this article. 7. The new .pst file is added to the Outlook 2003 All Mail Folders list. To view the Folder List, click Folder List on the Go menu.

3.If a user is not able to send and receive emails from outlook, what are the basic troubleshooting steps that you will

follow?
You should first try to determine whether you can connect to the Internet. If you are connected to the Internet but you cannot send or receive e-mails, go to method 1 to create a new e-mail profile. If you cannot connect to the Internet, this might be the reason that you are unable to send or receive e-mails. You might want to contact your ISP. After your Internet connection is restored, try to send yourself an e-mail to check whether your problem is resolved. If you are still unable to send or receive e-mails after your Internet connection is restored, go to method 1.

Method 1: Create a new e-mail profile


Step 1: Open the Mail Setup dialog box 1. Click Start, click Run, type Control in the Open box, and then click OK. 2. Depending on the version of Windows running on your computer, do one of the following:
o

Windows XP: If you are in the Category View, click User Accounts, and then click Mail. If you are not in the Category View, double-click Mail.

Windows Vista: Click User accounts, and then click Mail.

3. The Mail Setup dialog box opens. Step 2: Start the New Profile wizard 1. Click Show Profiles. 2. Click Add to start the New Profile wizard. Step 3: Create a profile 1. In the Profile Name box, type Test, and then click OK to name the new e-mail profile. 2. Follow the steps appropriate for your version of Outlook:
o

Microsoft Office Outlook 2010 a. Click to select the Manually configure server settings check box.

b. Click Next. c. On the Choose Service page, click Internet E-mail. d. Click Next. e. Fill in the boxes in the Internet E-mail Settings dialog box. Make sure that the Account Type setting is set to POP3. Note Enter the information from your ISP or from your email administrator in the Incoming mail server box and in the Outgoing mail server (SMTP) box. f. Click Next, follow the prompts to finish setting up your account, and then click Finish. g. Your new profile is created. Go to step 4.
o

Microsoft Office Outlook 2007 Click to select the Manually configure server settings check box. a. Click Next. b. On the Choose E-mail service page, click Internet Email. c. Click Next. d. Fill in the boxes in the Internet E-mail Settings dialog box. Make sure that the Account Type setting is set to POP3. Note Enter the information from your ISP or from your email administrator in the Incoming mail server box and in the Outgoing mail server (SMTP) box. e. Click Next, follow the prompts to finish setting up your account, and then click Finish. f. Your new profile is created. Go to step 4.

Microsoft Office Outlook 2003 and earlier versions of Outlook Click Add a new e-mail account. a. Click Next. b. Click POP3.

c. Click Next. d. Fill in the boxes in the Internet E-mail Settings dialog box. Make sure that the Account Type setting is set to POP3. Note Enter the information from your ISP or from your email administrator in the Incoming mail server and Outgoing mail server (SMTP) boxes. e. Click Next. f. Click Finish. g. Your new profile is created. Go to step 4. Step 4: Set the default profile 1. On the Mail dialog box, under the When Starting Microsoft Outlook, use this profile box, click to select the new profile that you created in step 3. 2. Click OK. 3. Use Outlook to send yourself an e-mail. If you successfully receive the e-mail, you have completed troubleshooting the problem. If you do not receive the e-mail, creating a new profile did not resolve your problem. Try method 2.

Method 2: Set TCP/IP as the default protocol


If creating a new profile did not resolve your problem, TCP/IP might not be set as your default Internet protocol. Follow these steps to set TCP/IP as your default protocol to connect to the Internet. 0100090000039200000000006900000000000400000003010800050000000 b0200000000050000000c020b000b00030000001e00040000000701040004 0000000701040069000000410b2000cc000a000a00000000000a000a000000 0000280000000a0000000a000000010004000000000000000000000000000 0000000000000000000000000000000ffffff00cc33000000000000000000000 0000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000011111111110101011111211111010101111 111111101c04211112111110101011111111111010101121121121101ff001 1211121110101011112121111020101111121111101000011111111110102 01040000002701ffff030000000000Back to the top

Step 1: Open the Network Connection Properties dialog box 1. Depending on the version of Windows running on your computer, do one of the following:
o

Windows XP or Windows 2000: Click Start, and then click Run. Windows Vista: Click Start Collapse this imageExpand this image

2. Type ncpa.cpl and then press Enter to open the Network Connections window. 3. Right-click your connection to the Internet, and then click Properties. Note If more than one connection is displayed in the Network Connections window, the connection that you use to connect to the Internet should say Connected or something similar. 0100090000039200000000006900000000000400000003010800050000000 b0200000000050000000c020b000b00030000001e00040000000701040004 0000000701040069000000410b2000cc000a000a00000000000a000a000000 0000280000000a0000000a000000010004000000000000000000000000000 0000000000000000000000000000000ffffff00cc33000000000000000000000 0000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000011111111110101011111211111010101111 1111111010000111121111101010111111111110101011211211211010000 11211121110101011112121111020101111121111101a7731111111111010 201040000002701ffff030000000000Back to the top Step 2: Verify that the connection uses TCP/IP 1. On the General tab, make sure that the Internet Protocol (TCP/IP) check box is selected. If it is not, click to select the Internet Protocol (TCP/IP) check box. 2. Click OK. 3. Click Yes if you are prompted to restart your computer. 4. Use Outlook to send yourself an e-mail. If you successfully receive the e-mail, you have completed troubleshooting the problem.

4.What is a Distribution List (DL)?

Distribution list is a term sometimes used for a function of email clients where lists of email addresses are used to email everyone on the list at once. This can be referred to as an electronic mailshot. It differs from a mailing list, electronic mailing list or the email option found in an Internet forum as it is usually for one way traffic and not for coordinating a discussion

You might also like