Common Information Technology Interview Preparation Guide
Download PDF

Information Technology Frequently Asked Questions in various Information Technology based job Interviews by interviewer. The set of questions here ensures that you offer a perfect answer posed to you. So get preparation for your new job hunting

180 Information Technology Questions and Answers:

Table of Contents:

Common  Information Technology Job Interview Questions and Answers
Common Information Technology Job Interview Questions and Answers

1 :: Define Search Engine?

A search engine is a program that searches for Web documents with keyword (s) you specify. Yahoo!, Google, and AltaVista are just three examples of search engines that have been created to help you find information on the Web.

2 :: The Internet was developed in?

Late 1960s.
As surprising as its age is, the Internet was born from the U.S. military's need to construct a decentralized computer network that could withstand a nuclear war. The network was used and refined by universities throughout the 1970s and 1980s, but it wasn't until 1992 that the Internet was made available to the general public.

3 :: Which of the following word processors came first?

WordStar.
Before the invention of word processing and spreadsheet software, personal computers had little value in the mainstream business world. WordStar was used before the days of function keys and the mouse. It, instead, used a set of Ctrl and Alt key combinations to navigate and edit text documents.

4 :: Who co-founded Hotmail in 1996 and then sold the company to Microsoft?

Sabeer Bhatia.
Smith came up with the idea for anonymous web-based email in 1995, and worked with Sabeer Bhatia, his colleague at Apple, to found the company. The company launched on July 4, 1996 with Smith as its Chief Technology Officer. In December 1997 Bhatia sold Hotmail to Microsoft for a reported $400 million.

5 :: What does PPTP stand for?

Point to Point Tunneling Protocol.
It is a protocol used to create VPN connections over the net.
The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.

7 :: What is TTL?

Time To Live.
Time To Live specifies how many more hops a packet can travel before being dropped.

8 :: The invention of the transistor, or semiconductor, was one of the most important developments leading to the personal computer revolution. What company invented the transistor in 1947?

Bell Laboratories.
The transistor, which essentially is a solid-state electronic switch, replaced the much less suitable vacuum tube. Because the transistor consumed significantly less power, a computer system built with transistors was much smaller, faster and more efficient than a computer system built with vacuum tubes.

9 :: Sometimes computers and cache registers in a foodmart are connected to a UPS system. What does UPS mean?

Uninterruptable Power Supply.
An uninterruptable power supply (UPS) is a backup power supply, such as a battery, that provides emergency power in the event that power is lost from the main supply.

10 :: In the UK, what type of installation requires a fireman's switch?

Neon Lighting.
Neon lighting runs at a high voltage, typically above 1000 Volts. A fireman's switch protects a fireman from receiving a shock when a water jet is sprayed onto the installation. The switches are red, and mounted in a conspicuous position. (This is specified by IEE Regulations (Europe), SANS (South Africa), UK Electricity regulations and many Asian countries. I am unable to confirm other countries' requirements, so feel free to let me know.)

11 :: What is a NIC?

Network Interface Card.
A NIC is a Network Interface Card. Usually a card that is plugged into a computer's expansion slot.

12 :: The Central Processing Unit is an embedded chip that acts as the 'brains' of a computer. What Intel chip was used in the Altair (the first real personal computer)?

8080.
The Intel 8080 was a jazzed-up calculator chip. It was included in microcomputer kits which were little more than demonstration tools and did little except blink lights. Besides the 8080 chip, the Altair included a power supply, a front panel with a large number of lights and 256 bytes (not kilobytes) of memory. The kit sold for {$395} and had to be assembled.

13 :: Define URL?

The address of a document or "page" on the World Wide Web.
URL stands for Uniform Resource Locator. It is an address for a specific document found on the Web.

14 :: What does SSL stand for?

Secure Socket Layer.
A protocol developed by Netscape to allow secure connections over the net.

15 :: What does ECP stand for?

Extended Capabilities Port.
An Extended Capabilities Port is about 10 times faster than the old standard one, but it is used the same way a regular parallel port is.

16 :: Which Intel chip was the first to support a 32-bit bus architecture?

386DX.
The 386 chip was the first to offer a possible 32- or 64-bit access to data. OS-2 2.x or higher and Windows 95 required at least a 386 CPU while Windows NT 4.x required at least a 486 CPU to run.

18 :: A program that neither replicates or copies itself, but does damage or compromises the security of the computer. Which 'Computer Virus' it is?

Trojan.
Typically it relies on someone emailing it to you, it does not email itself, it may arrive in the form of a joke program or software of some sort.

20 :: Which is documented hoax virus?

McDonalds screensaver.
A virus hoax is usually an email that gets mailed in chain letter fashion describing some devastating highly unlikely type of virus, you can usually spot a hoax because there's no file attachment, no reference to a third party who can validate the claim and the general 'tone' of the message.

21 :: What is FMD?

Fluorescent Multi-Layer Disc.
A new type of disc developed by Constellation 3D Inc. These discs can hold up to to 140 GB of data.

22 :: What does ICMP stand for?

Internet Control Message Protocol.
ICMP Packets are used to send control messages including errors.

23 :: What is RISC?

Reduced Instruction Set Computer.
Reduced Instruction Set Computer - a type of microprocessor that relies on simple instructions which can be used to build more complicated ones.

25 :: What is a MAC?

Media Access Control.
MAC is short for Media Access Control address, an address unique to every piece of network hardware.
Information Technology Interview Questions and Answers
180 Information Technology Interview Questions and Answers