Windows Interview Questions
Questions Answers Views Company eMail

How to Kill a Particular Process in windows?

Tomax,

5 6849

How to change the IP Address of the system in windows 95/98 and windows 2000 server system?

Tomax,

3 5918

What are the four layers that Windows NT have in order to achieve independence?

1 5149




What are rings in Windows NT?

1 3535

What is Executive in Windows NT?

2 3271

What are the sub-components of I/O manager in Windows NT?

2 3564

What level of security does Windows NT meets?

DCI,

2 4207

What is the difference U have seen from a Dos environment to windows environment?

Honeywell,

1 2565

what do U mean by event driven ?

Honeywell,

1 3146

How do WinMain look like ?

Honeywell,

1356

How the messages are processed in Windows ?

Honeywell,

1 6432

What are parameters needed to distinguish an event ?

Honeywell,

1151

advantage of Win NT over Win 95

HCL, BFL,

2 11925

memory managemant in Win95

BFL,

1 3345

what does find command do ?

Cadence,

3 4880







Un-Answered Questions { Windows }

Where is UID located in Active directory? (default file path)

451


Tel me step By Step while accessing the webmail and outlook for all the user's it is asking the user name and password frequently ?

1097


in a direct memory access how does the CPU know when the memory operation are complete

1487


What is mission critical system?

243


How difference windows from dos? Explain the ways of organizing windows. what is the use network neighborhood? what is the use control panel in windows xp?

846






How do you see the other DHCP Servers in the Network / Forest? What is the command helps you see the DNS and WINS Servers similarly?

1281


What is Duplicate Handle?

1287


absolute path gives the location a file or directory in reference to a rile directory while relative path is a path given file starting from another file. explain?

560


what is the excat control flow when we start a computer,specially including POST operation and Mostly the roleof the Kernel File?

1009


in a multiprogramming and time-sharing environment,several user share the system simultaneously. this situation can result in various security problems a.discuss two such problems b.how can we ensure the same degree of security in a time-share machine as in a dedicated machine?

15186


how to configure cluster server in windows 2k3 can you send me step-by-step? hardware requirements? how to configure cluster server in Exchange server 2k3can you send me step-by-step? hardware requirements?

3506


can User access these kernel objects structures?

1218


directories can be implemented either special files that can only be accused in limited ways or can be implemented as ordinary data files. what are advantages and disadvantages of this approach?

1052


What is a kernel object?

1024


describe a typical multiple-level priority-base scheduling and give FIVE examples of factors that can be implemented on the different levels

886