3i Infotech
100+ Zoryboard Software Solutions Interview Questions and Answers
Q1. What is active directory ? Role of DNS server ? Difference between RAM & ROM ? Knowledge on installation of various softwares and Drivers ? Layers of OSI model ? TCP/IP Configuration ? Knowledge on various type...
read moreThe interview questions cover a wide range of topics including Active Directory, DNS, RAM, ROM, OSI model, networking devices, LAN/WAN/MAN/PAN troubleshooting, Outlook and Lotus Notes configuration, data backup and recovery, BSOD troubleshooting, and command prompt basics.
Active Directory is a Microsoft service that manages network resources and user accounts.
DNS server translates domain names into IP addresses.
RAM is volatile memory used for temporary storage while ROM is no...read more
Q2. What is BSOD error in windows?
BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a fatal system error occurs.
BSOD is a critical error that causes the computer to crash and display a blue screen with error codes.
It is usually caused by hardware or software issues, such as faulty drivers, incompatible software, or hardware failures.
BSOD can prevent the computer from booting up properly and may require troubleshooting or repair.
Common BSOD error codes incl...read more
Q3. What is Domain and how System is added to domain
A domain is a network of computers and devices that are managed as a single entity.
A domain is a collection of computers and devices that share a common security and administration policy.
A domain controller is a server that manages the security and authentication of users and computers in the domain.
To add a system to a domain, the system must be configured to use the domain controller as its primary DNS server and then joined to the domain using valid credentials.
Once a sys...read more
Q4. How to install operating system?
To install an operating system, you need to boot from a bootable media and follow the installation wizard.
Create a bootable media (USB, DVD, etc.) with the operating system image
Insert the bootable media into the computer and restart it
Press the key to enter the boot menu (usually F12 or Del)
Select the bootable media from the list of boot devices
Follow the installation wizard and choose the installation options (language, partition, etc.)
Wait for the installation to complete ...read more
Q5. what is AD ,Tell me about iso layers,what is tcp/ip.
AD is Active Directory, a directory service developed by Microsoft. ISO layers refer to the OSI model, and TCP/IP is a protocol suite.
Active Directory is a directory service used to manage resources in a network.
ISO layers refer to the Open Systems Interconnection model, which is a conceptual model used to describe network communication.
TCP/IP is a protocol suite used for communication between devices on a network.
TCP/IP consists of four layers: application, transport, intern...read more
Q6. What is is the chance in SNR with negative feed back?
Negative feedback improves SNR by reducing noise and distortion.
Negative feedback reduces the gain of the amplifier, which reduces the noise and distortion.
The reduction in gain also reduces the output signal level, but the noise reduction is greater, resulting in an improved SNR.
Negative feedback is commonly used in audio amplifiers and other electronic circuits to improve performance.
The amount of negative feedback used must be carefully chosen to balance the trade-off betw...read more
Q7. What is the effect of bandwidth of an amplifier with negative feed back?
Bandwidth of an amplifier with negative feedback affects its gain and stability.
Increasing bandwidth increases gain but decreases stability.
Decreasing bandwidth decreases gain but increases stability.
Bandwidth is the range of frequencies over which the amplifier can operate effectively.
Negative feedback reduces distortion and noise in the amplifier.
Bandwidth can be adjusted by changing the feedback network or the gain of the amplifier.
Q8. what is sdlc?the steps involved in the same your strengths and weaknesses justification for the same
SDLC stands for Software Development Life Cycle, which is a process used to design, develop, and test software.
The steps involved in SDLC are planning, analysis, design, development, testing, deployment, and maintenance.
Strengths of SDLC include a structured approach to software development, clear communication between team members, and a focus on quality assurance.
Weaknesses of SDLC include a potential for delays due to the structured approach, difficulty adapting to changin...read more
Q9. How many directors and reflectors in Yagi Uda antenna?
A Yagi Uda antenna typically has one director and one reflector element.
A Yagi Uda antenna is a directional antenna used for communication purposes.
The director element is placed in front of the driven element and the reflector element is placed behind it.
The director element helps in focusing the radiation pattern in the forward direction while the reflector element helps in increasing the gain of the antenna.
The number of directors can be increased to increase the gain of t...read more
Q10. Explain What is domain ?
A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.
A domain is a logical grouping of network resources such as computers, printers, and servers.
It allows for centralized management of users, computers, and security policies.
Domains are typically used in business environments to provide a secure and organized network infrastructure.
An example of a domain name is google.com, which represents a group of serv...read more
Q11. What is the following step after an interrupt comes to a microprocessor?
The microprocessor saves the current state, jumps to the interrupt service routine, and executes it.
The microprocessor saves the current state of the program being executed
It jumps to the interrupt service routine (ISR) specified by the interrupt vector table
The ISR executes and handles the interrupt
After the ISR is complete, the microprocessor returns to the saved state and continues executing the program
Examples of interrupts include timer interrupts, keyboard interrupts, a...read more
Q12. What material is used for the manufacturing of GATE in MOSFETS
The material used for manufacturing GATE in MOSFETS is usually silicon dioxide.
Silicon dioxide is a common material used for the gate dielectric layer in MOSFETs.
Other materials such as hafnium oxide and aluminum oxide may also be used.
The choice of material depends on factors such as performance requirements and manufacturing process.
The gate material itself is usually made of doped polysilicon or metal.
The gate oxide thickness is a critical parameter that affects MOSFET per...read more
Q13. How do you trouble shoot when the user is not able to take the Remote access of a server?
To troubleshoot when a user is unable to take remote access of a server, check network connectivity, firewall settings, user permissions, and remote desktop services.
Check network connectivity to ensure the user can reach the server.
Verify firewall settings to ensure the necessary ports are open for remote access.
Check user permissions on the server to ensure the user has the necessary access rights.
Verify the status of remote desktop services on the server.
Restart the remote...read more
Q14. How to assign Ip address, Outlook Configuration, Data Back up, DHCP,... Package is Very Low 1.8 - 2Lakhs
Assigning IP address, Outlook configuration, data backup, and DHCP for a low budget package.
Use automated tools for IP address assignment like DHCP
Configure Outlook manually or using group policy settings
Implement regular data backup schedules using built-in or third-party tools
Consider open-source solutions to keep costs low
Q15. What are the differences between .Net and .Net Core?
The main difference is that .NET Core is open-source and cross-platform while .NET Framework is Windows-only.
Both are used for building Windows applications, but .NET Core can also be used for web and cloud applications.
.NET Core has a smaller runtime and can be deployed as a single executable file.
.NET Core supports Docker containers and can be used on Linux and macOS.
.NET Framework has a larger runtime and requires installation on the target machine.
Some libraries and APIs ...read more
Q16. What is the difference between Incremental and Differential Backup?
Incremental backup only backs up data that has changed since the last backup, while differential backup backs up all changes since the last full backup.
Incremental backup only backs up data that has changed since the last backup
Differential backup backs up all changes since the last full backup
Incremental backups are faster and require less storage space than differential backups
Differential backups are easier to restore from compared to incremental backups
Example: If a full ...read more
Q17. 1. What is IP ?
IP stands for Internet Protocol. It is a set of rules that governs the format of data packets sent over the internet.
IP is a fundamental protocol in computer networking.
It provides the addressing scheme used to identify devices on a network.
IP packets contain both the source and destination IP addresses.
IPv4 and IPv6 are the two main versions of IP.
Example: 192.168.0.1 is an IPv4 address.
Q18. What is the difference between an MSI and an .EXE File
MSI files are Windows Installer packages used for installation, while .EXE files are executable files that can perform various tasks.
MSI files are used for installing software on Windows systems, while .EXE files can be used for a variety of tasks such as running programs or scripts.
MSI files are typically larger in size compared to .EXE files.
MSI files can be installed silently using command line options, while .EXE files may require manual intervention during installation.
E...read more
Q19. How to take data backup?
Data backup can be taken using various methods depending on the type of data and storage medium.
Identify the type of data and storage medium
Choose a backup method such as full, incremental or differential
Select a backup location such as external hard drive, cloud storage or tape drive
Schedule regular backups to ensure data is up-to-date
Test the backup to ensure it can be restored in case of data loss
Q20. What is the difference of OS and Device manager.
OS manages the overall operation of a computer system, while Device Manager manages hardware devices connected to the system.
OS controls the overall operation of a computer system, including managing resources, running applications, and providing user interface.
Device Manager is a component of the OS that manages hardware devices connected to the system, allowing users to view and control device settings.
Examples: Windows OS manages the overall operation of a computer system,...read more
Q21. Have you worked on Agile methodology?
Yes, I have worked on Agile methodology.
I have experience working in Agile teams and following Agile principles.
I have participated in Agile ceremonies such as daily stand-ups, sprint planning, and retrospectives.
I have used Agile tools like Jira or Trello to manage and track project tasks.
I have worked closely with product owners and stakeholders to prioritize and deliver user stories.
I have adapted to changing requirements and embraced the iterative nature of Agile developm...read more
Q22. How to add endpoint asset in domain. How to add Printer. How to resolve paper jam in Printer Basic knowledge of IP and network Basic knowledge of networking
To add an endpoint asset in a domain, add it to the Active Directory. To add a printer, connect it to the network and install the drivers. To resolve a paper jam, follow the printer's manual. Basic knowledge of IP and networking is required.
To add an endpoint asset in a domain, go to Active Directory Users and Computers, right-click on the domain, and select 'New Computer'.
To add a printer, connect it to the network and install the drivers on the computer. Then, go to 'Device...read more
Q23. What is domain?
A domain is a group of computers, devices, or resources that share a common network identity.
Domains are used in computer networking to organize and manage resources.
A domain can be a local network or a larger network like the internet.
Domains are often used in conjunction with domain name systems (DNS) to assign unique names to resources.
Domains can also be used to manage security and access control for resources.
Examples of domains include Microsoft Active Directory domains...read more
Q24. How much year of experience in computer hardware & software installation
I have 5 years of experience in computer hardware & software installation.
5 years of hands-on experience in installing computer hardware components such as RAM, hard drives, and graphics cards
Proficient in installing operating systems like Windows, Linux, and macOS
Experience in troubleshooting hardware and software issues during installation
Familiarity with software deployment tools and techniques
Certifications in hardware and software installation may be beneficial
Q25. Why is Maxwell's loop law is used in networks?
Maxwell's loop law is used in networks to calculate the current flowing through a closed loop.
Maxwell's loop law is a fundamental law of electromagnetism.
It states that the sum of the electromotive forces (EMFs) around a closed loop is equal to the sum of the changes in magnetic flux through the loop.
This law is used in networks to calculate the current flowing through a closed loop.
It is particularly useful in analyzing complex circuits with multiple loops and sources.
For ex...read more
Q26. What WAIT states are used in Microcontrollers?
WAIT states are used in microcontrollers to synchronize with slower peripherals or memory.
WAIT states are used to delay the microcontroller's operation until a slower peripheral or memory operation is complete.
They are commonly used in memory-mapped I/O operations.
The number of WAIT states required depends on the speed of the peripheral or memory being accessed.
Some microcontrollers have configurable WAIT states to optimize performance.
Examples of WAIT state instructions incl...read more
Q27. What is sdlc?the steps involved in the same
SDLC stands for Software Development Life Cycle, which is a process used to design, develop, and test software.
The steps involved in SDLC are planning, analysis, design, implementation, and maintenance.
During planning, the project scope, objectives, and requirements are defined.
In analysis, the requirements are analyzed and documented.
Design involves creating a blueprint for the software.
Implementation is the actual coding and testing of the software.
Maintenance involves fixi...read more
Q28. What domain, how to configuration outlook,
To configure Outlook, you need to know the domain name and server settings.
Open Outlook and go to File > Account Settings > Account Settings
Click on New to add a new email account
Enter your name, email address, and password
Select the account type (POP or IMAP) and enter the incoming and outgoing server settings
Click on Test Account Settings to ensure everything is working properly
Click on Finish to complete the setup process
Q29. What is the meaning of technical support
Technical support refers to providing assistance and troubleshooting for technical issues related to hardware, software, or other technology.
Assisting users with hardware and software issues
Troubleshooting technical problems
Providing guidance on how to use technology effectively
Resolving network connectivity issues
Offering support for system upgrades and installations
Q30. Explain what are the aim of organisation
The aim of an organization is to achieve its goals and objectives, fulfill its mission, and provide value to its stakeholders.
To achieve its goals and objectives
To fulfill its mission
To provide value to its stakeholders
Q31. 3. How can configure Static Routing ?
Static routing can be configured by manually adding routes to the routing table.
Identify the destination network and subnet mask
Identify the next-hop router or exit interface
Add the route to the routing table using the 'ip route' command
Verify the routing table using the 'show ip route' command
Q32. What is the difference of OST and PST.
OST is an offline Outlook data file used by Exchange Server, while PST is a personal storage file used by Outlook for POP3, IMAP, and web-based mail accounts.
OST is used by Exchange Server to store a copy of mailbox data on the local computer.
PST is used by Outlook to store emails, contacts, calendar items, and other data for POP3, IMAP, and web-based mail accounts.
OST files are synchronized with the Exchange Server when connected to the internet, while PST files are stored l...read more
Q33. What is sales and how to converting coustomer
Sales is the process of persuading customers to purchase a product or service. Converting customers involves building relationships and addressing their needs.
Sales is about understanding customer needs and offering solutions
Building relationships and trust is crucial in sales
Effective communication and negotiation skills are important
Providing excellent customer service can lead to repeat sales
Using persuasive techniques like storytelling or demonstrating value can help in c...read more
Q34. What are the port numbers for DNS, RDP and DHCP.?
DNS - 53, RDP - 3389, DHCP - 67/68
DNS uses port 53 for both TCP and UDP communication
RDP uses port 3389 for TCP communication
DHCP uses ports 67 and 68 for UDP communication
Q35. Which Documents are Required to Fulfill the Claim?
Documents required for claim fulfillment include proof of loss, policy details, claim form, and supporting documents.
Proof of loss (e.g. police report, photos)
Policy details (e.g. insurance policy)
Claim form (e.g. filled out and signed)
Supporting documents (e.g. receipts, invoices)
Q36. What do you mean by BSOD (Blue Screen Of Death)?
BSOD stands for Blue Screen Of Death, a Windows error screen that appears when the system encounters a critical error.
BSOD is a stop error screen that appears on Windows operating systems when a fatal system error occurs.
It is often caused by hardware failures, driver issues, or software problems.
The screen is blue with white text, hence the name Blue Screen Of Death.
BSOD usually includes an error code and a message indicating the cause of the crash.
Users are typically requir...read more
Q37. What is Active Directory
Active Directory is a Microsoft service that manages network resources and user accounts.
It is used to authenticate and authorize users and computers in a Windows domain network.
It stores information about users, groups, computers, and other network objects.
It provides a centralized location for managing network resources and security policies.
It allows administrators to delegate administrative tasks to specific users or groups.
It can be used to manage access to network resou...read more
Q38. Different types of RAM.
Different types of RAM include DDR, DDR2, DDR3, DDR4, and SDRAM.
DDR (Double Data Rate) RAM is the most common type used in desktop computers.
DDR2 RAM is an older version with slower speeds compared to DDR3 and DDR4.
DDR3 RAM is faster and more power-efficient than DDR2.
DDR4 RAM is the latest standard, offering higher speeds and larger capacities.
SDRAM (Synchronous Dynamic Random Access Memory) is an older type used in older systems.
Q39. What is Digital Image Processing?
Digital Image Processing is the manipulation of digital images using algorithms to enhance, analyze, or extract information.
It involves techniques like image enhancement, restoration, segmentation, and compression.
Common applications include medical imaging, satellite imaging, facial recognition, and object detection.
Algorithms like edge detection, noise reduction, and image stitching are used in digital image processing.
It plays a crucial role in fields like computer vision,...read more
Q40. In which demodulators PLL is used?
PLL is used in demodulators for FM and PM signals.
PLL demodulators are used in FM and PM receivers.
PLL demodulators are used to recover the original signal from the modulated signal.
PLL demodulators are used in communication systems and radar systems.
Examples of PLL demodulators include Foster-Seeley discriminator and ratio detector.
Q41. Whar are you sellery expectations?
My salary expectations are based on my qualifications, experience, and the industry standards.
Consider my qualifications and experience when determining salary
Take into account the industry standards for Junior Associates
Open to negotiation based on the overall compensation package
Q42. how to retrieve set of data in a database?
To retrieve a set of data in a database, you can use SQL queries to specify the data you want to retrieve.
Use SELECT statement to specify the columns you want to retrieve
Use FROM clause to specify the table where the data is stored
Use WHERE clause to specify any conditions for filtering the data
Use ORDER BY clause to specify the order in which the data should be returned
Use LIMIT clause to specify the maximum number of rows to return
Q43. how to know the disk utilization in linux?
To know disk utilization in Linux, use commands like df, du, and iostat.
Use 'df' command to display disk space usage on Linux filesystems.
Use 'du' command to estimate file space usage.
Use 'iostat' command to monitor system input/output device loading.
Check disk utilization with tools like 'iotop' and 'atop'.
Q44. How to backup in outlook ?
To backup in Outlook, go to File > Open & Export > Import/Export > Export to a file > Outlook Data File (.pst)
Open Outlook and click on File
Select Open & Export and then click on Import/Export
Choose Export to a file and click on Next
Select Outlook Data File (.pst) and click on Next
Choose the folder you want to backup and click on Next
Select a location to save the backup file and click on Finish
Q45. 2. What is ACTIVE DIRECTORY ?
Active Directory is a directory service developed by Microsoft for Windows domain networks.
It stores information about network resources such as computers, users, and groups.
It provides authentication and authorization services for Windows-based computers.
It allows administrators to manage network resources from a central location.
It uses a hierarchical structure of domains and organizational units (OUs) to organize resources.
Examples of tasks that can be performed with Activ...read more
Q46. What is SIT and UAT testing
SIT is System Integration Testing and UAT is User Acceptance Testing.
SIT is performed to verify the integration of different modules or systems.
UAT is performed by end-users to ensure the system meets their requirements.
SIT is usually done by developers or testers, while UAT is done by end-users.
SIT is done before UAT.
SIT focuses on technical aspects, while UAT focuses on business requirements.
Q47. What is regression and retesting
Regression is testing the existing functionality after making changes to the software. Retesting is testing the same functionality again after fixing the defects found in the previous testing.
Regression testing ensures that changes made to the software do not affect the existing functionality.
Retesting ensures that the defects found in the previous testing have been fixed.
Regression testing is done after every change in the software.
Retesting is done after fixing the defects ...read more
Q48. Tell me one quality
Adaptability
Ability to quickly adjust to new situations
Flexibility in handling changing priorities
Openness to learning and acquiring new skills
Capacity to work effectively in diverse teams
Example: Successfully adapting to a new software system at a previous job
Q49. Full form of ETP, SMTP
ETP - Effluent Treatment Plant, SMTP - Simple Mail Transfer Protocol
ETP is a wastewater treatment plant used to treat industrial effluent before releasing it into the environment
SMTP is a protocol used for sending and receiving email messages on the internet
ETP involves physical, chemical, and biological processes to remove pollutants from wastewater
SMTP uses port 25 to send messages and port 587 for secure transmission
Q50. How to configuration outlook
Configuring Outlook involves setting up email accounts, server settings, and personal preferences.
Open Outlook and click on 'File' in the top left corner.
Select 'Add Account' to add a new email account.
Enter your email address and password, then follow the prompts to complete the setup.
To configure server settings, go to 'File' > 'Account Settings' > 'Account Settings' again.
Select your email account and click on 'Change'. Here you can modify incoming and outgoing server sett...read more
Q51. How do you Decommission a server?
Decommissioning a server involves several steps to safely remove it from service.
Backup any necessary data or configurations before proceeding.
Notify stakeholders and users of the server's decommissioning.
Remove the server from any load balancers or DNS records.
Power off the server and physically disconnect it from the network.
Document the decommissioning process for future reference.
Q52. What is e-commerce testing
E-commerce testing is the process of testing online shopping websites or applications to ensure they function properly.
Testing the functionality of the shopping cart
Testing the payment gateway integration
Testing the security of the website
Testing the performance of the website during high traffic
Testing the compatibility of the website with different browsers and devices
Q53. Steps that involves during troubleshooting
Troubleshooting steps involve identifying the issue, gathering information, isolating the problem, implementing a solution, and testing the solution.
Identify the issue reported by the user
Gather information about the issue such as error messages or recent changes
Isolate the problem by narrowing down possible causes
Implement a solution based on the identified cause
Test the solution to ensure the issue is resolved
Q54. What is IT according to you?
IT stands for Information Technology and refers to the use of computers and software to manage, process, and communicate information.
IT involves the use of hardware, software, and networks to store, process, and transmit data
IT professionals design, develop, and maintain computer systems and software applications
Examples of IT include computer programming, database management, and network administration
Q55. A program for prime number with using module.
A program to find prime numbers using modules.
Import the math module
Create a function to check if a number is prime
Loop through a range of numbers and check if each is prime
Print the prime numbers found
Q56. How to create file Server
To create a file server, you need to set up a dedicated computer or network-attached storage (NAS) device to store and share files.
Choose a computer or NAS device with enough storage capacity for your needs
Install a file server software such as Windows Server or Linux-based Samba
Configure the software to create shared folders and set access permissions
Connect clients to the file server using network protocols such as SMB or NFS
Regularly back up the files on the server to prev...read more
Q57. What is LAN?
LAN stands for Local Area Network. It is a computer network that connects devices within a limited area such as a home, office, or building.
LAN is a type of network that is used to connect devices within a limited area.
It is commonly used in homes, offices, and buildings.
LAN can be wired or wireless.
It allows devices to share resources such as printers, files, and internet access.
Examples of LAN technologies include Ethernet, Wi-Fi, and Bluetooth.
Q58. What is troubleshooting
Troubleshooting is the process of identifying, diagnosing, and resolving technical issues or problems.
Identifying the issue or problem
Gathering information and data related to the issue
Analyzing the information to determine possible causes
Testing and implementing solutions to resolve the issue
Verifying that the issue has been resolved
Q59. How to use Vlookup in Excel
Vlookup is a function in Excel used to search for a specific value in a table and return a corresponding value from another column.
Select the cell where you want to enter the formula
Type =VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])
lookup_value is the value you want to search for
table_array is the range of cells containing the table
col_index_num is the column number from which you want to return the value
range_lookup is an optional argument that specifies...read more
Q60. what is MySQL? why it is popular?
MySQL is an open-source relational database management system that is popular for its ease of use, flexibility, and scalability.
MySQL is an open-source RDBMS, allowing users to freely use, modify, and distribute the software.
It is known for its ease of use, making it accessible for beginners and experts alike.
MySQL is highly flexible, supporting various data types and storage engines.
It is popular for its scalability, allowing users to easily handle large amounts of data.
MySQ...read more
Q61. What is DHCP?
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automating the IP address assignment process.
It allows devices to join a network and obtain an IP address without manual configuration.
DHCP servers can also provide additional network configuration information, such as DNS and gateway settings.
DHCP leases are temporary and must be renewed periodical...read more
Q62. What is black box testing
Black box testing is a software testing technique where the internal workings of the system are not known to the tester.
Tests the functionality of the system without knowledge of its internal structure
Focuses on inputs and outputs of the system
Tests are based on requirements and specifications
Commonly used for system and acceptance testing
Examples include boundary value analysis and equivalence partitioning
Q63. What is quality management, why it's necessary
Q64. How do you resolve the BSOD?
BSOD can be resolved by identifying the root cause, checking for hardware/software issues, updating drivers, and performing system restore.
Identify the error code displayed on the BSOD screen to determine the root cause.
Check for hardware issues such as faulty RAM or hard drive.
Update drivers for hardware components like graphics card or network adapter.
Perform a system restore to revert back to a stable state before the BSOD occurred.
Q65. What is extension outlook ?
Extension Outlook refers to the file extension used by Microsoft Outlook to save email messages and other data.
Extension Outlook is commonly used for saving email messages, contacts, calendar entries, and other data in Microsoft Outlook.
The file extension for Outlook data files is .pst (Personal Storage Table) for Outlook data files and .ost (Offline Storage Table) for offline data files.
Outlook also uses other file extensions such as .msg for individual email messages and .o...read more
Q66. How to troubleshoot printer
To troubleshoot a printer, start by checking the connections and drivers, then run diagnostic tests and clean the printer.
Check the printer connections and make sure it is properly plugged in
Ensure the printer drivers are up to date and installed correctly
Run diagnostic tests to identify any issues with the printer hardware or software
Clean the printer, including the print head and rollers, to improve print quality
Check for any error messages or codes on the printer display o...read more
Q67. Can you handle computer technical issue
Yes, I have experience handling computer technical issues.
I have experience troubleshooting hardware and software issues
I am familiar with operating systems like Windows, Linux, and MacOS
I have resolved network connectivity problems
I have experience with system backups and data recovery
I am skilled in diagnosing and fixing computer viruses and malware
Q68. What is Dependency Injection?
Dependency Injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
DI is a way to achieve loose coupling between objects
It helps in creating more testable and maintainable code
DI can be implemented using constructor injection, property injection, or method injection
Example: Instead of creating a database connection object inside a class, we can inject it from outside
Example: ASP.NET Core uses DI to inject services into co...read more
Q69. What are the Design patterns?
Design patterns are reusable solutions to common software development problems.
Design patterns provide proven solutions to recurring problems in software development.
They help in creating code that is more flexible, reusable, and maintainable.
Some common design patterns include Singleton, Factory, Observer, and Decorator.
Design patterns can be categorized into three types: Creational, Structural, and Behavioral.
Q70. How to data backup
Data backup can be done through various methods.
Use cloud storage services like Google Drive, Dropbox, or OneDrive.
Use external hard drives or USB drives to store data.
Use backup software like Acronis True Image or EaseUS Todo Backup.
Create a backup schedule to ensure regular backups.
Test backups regularly to ensure data can be restored.
Consider offsite backups for added security.
Encrypt sensitive data before backing up to prevent unauthorized access.
Q71. Whow you distribute your salery
I distribute my salary by allocating a portion for savings, expenses, investments, and personal needs.
Allocate a percentage for savings to build a financial cushion
Set aside a portion for monthly expenses such as rent, bills, and groceries
Invest a percentage in long-term investments like stocks or retirement accounts
Keep some for personal needs and leisure activities
Q72. Difference between 2016 and 2019 server?
Windows Server 2019 has more advanced features and improvements compared to Windows Server 2016.
Windows Server 2019 has improved security features such as Windows Defender Advanced Threat Protection (ATP) and Windows Defender Exploit Guard.
Windows Server 2019 includes enhancements in virtualization with features like Shielded Virtual Machines and Encrypted Networks.
Windows Server 2019 has improved support for Linux virtual machines and containers.
Windows Server 2019 has bette...read more
Q73. What is domain and how it's working
A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.
A domain allows for centralized management of users, computers, and resources.
Domains use a hierarchical structure with a domain controller at the top.
Domain controllers authenticate and authorize all users and computers in the domain.
Examples of domains include Microsoft Active Directory domains and DNS domains.
Q74. What is the Expected CTC?
Expected CTC depends on various factors such as experience, skills, location, and company policies.
Expected CTC can vary based on the candidate's experience and skills.
Location can also play a role in determining the Expected CTC.
Company policies and budget can also impact the Expected CTC.
It is important to research industry standards and negotiate based on market rates.
Providing a specific number may limit negotiation opportunities.
Q75. What are IMAP and SMTP?
IMAP and SMTP are protocols used for sending and receiving emails.
IMAP (Internet Message Access Protocol) is used for receiving emails from a mail server.
SMTP (Simple Mail Transfer Protocol) is used for sending emails to a mail server.
IMAP allows users to access their emails from multiple devices while keeping them synchronized.
SMTP is responsible for the transmission of emails between the sender's and recipient's mail servers.
Q76. How to secure data
Data can be secured through encryption, access control, backups, and regular updates.
Use strong encryption algorithms to protect data in transit and at rest
Implement access control measures to restrict unauthorized access to data
Regularly backup data to prevent loss in case of a security breach
Keep software and systems up-to-date with security patches and updates
Q77. What is motor insurance?
Motor insurance is a policy that provides financial protection against damage or theft of a vehicle.
It covers the cost of repairs or replacement of the insured vehicle in case of an accident or theft.
It also provides liability coverage for any damage or injury caused to third parties.
Premiums are based on factors such as the type of vehicle, age of the driver, and driving history.
Optional add-ons such as personal accident cover, roadside assistance, and engine protection can ...read more
Q78. What is the ASp.net mean for ?
ASP.NET stands for Active Server Pages .NET, a web application framework developed by Microsoft.
ASP.NET is a server-side web application framework used for building dynamic web pages and web applications.
It allows developers to create web applications using languages like C# or VB.NET.
ASP.NET provides tools and libraries for building web forms, MVC (Model-View-Controller) applications, and Web API services.
It is part of the .NET framework and integrates with other Microsoft t...read more
Q79. what is the typical day of BA
A typical day of a Business Analyst involves gathering requirements, analyzing data, creating reports, and collaborating with stakeholders.
Gathering requirements from stakeholders
Analyzing data to identify trends and insights
Creating reports and presentations to communicate findings
Collaborating with stakeholders to ensure project success
Q80. How to install os
To install an OS, you need to create a bootable media and follow the installation process.
Create a bootable media such as a USB drive or DVD
Insert the media into the computer and restart it
Press the key to enter the boot menu and select the media
Follow the on-screen instructions to install the OS
Configure the settings and install drivers and updates
Q81. Explain OOP in Python
OOP in Python is a programming paradigm where objects are created that contain data and methods to manipulate that data.
Classes are used to create objects in Python
Objects have attributes (data) and methods (functions)
Inheritance allows classes to inherit attributes and methods from other classes
Encapsulation allows data to be hidden and only accessed through methods
Polymorphism allows objects to be treated as instances of their parent class
Q82. SDLC life cycle and efforts spent in each phase
Q83. What is Life Insurance
Life insurance is a financial product that provides a lump sum payment to beneficiaries upon the insured's death.
Provides financial protection for loved ones in case of the insured's death
Premiums are paid regularly to maintain coverage
Can also include additional benefits like critical illness or disability coverage
Types include term life, whole life, and universal life insurance
Q84. What is SDLC and STLC
SDLC stands for Software Development Life Cycle, which is a process used by software development teams to design, develop, and test high-quality software products. STLC stands for Software Testing Life Cycle, which is a subset of SDLC focused on testing activities.
SDLC involves phases like planning, analysis, design, implementation, and maintenance.
STLC involves phases like test planning, test design, test execution, and test closure.
SDLC is focused on the overall development...read more
Q85. What is sdlc
SDLC stands for Software Development Life Cycle.
It is a process used to design, develop, and test software.
It consists of several phases such as planning, analysis, design, implementation, and maintenance.
It helps to ensure that software is developed efficiently and meets the requirements of the stakeholders.
Examples of SDLC models include Waterfall, Agile, and DevOps.
Q86. What is insurance?
Insurance is a contract between an individual and an insurance company to protect against financial loss.
Insurance provides financial protection against unexpected events
Individuals pay premiums to an insurance company in exchange for coverage
Types of insurance include health, auto, home, and life insurance
Insurance policies have terms and conditions that outline what is covered and what is not
Insurance helps individuals and businesses manage risk
Q87. What is Window server
Windows Server is a brand name for a group of server operating systems released by Microsoft.
Windows Server is designed to provide services such as user authentication, file sharing, web services, and more.
It allows multiple users to access shared resources on a network.
Examples of Windows Server operating systems include Windows Server 2016, Windows Server 2019, etc.
Q88. Name and address currently location
I am currently located at 123 Main Street, Anytown, USA.
Current location is 123 Main Street
Located in Anytown, USA
Full address is available upon request
Q89. Isolation level in DB
Isolation level determines how transactions interact with each other in a database.
Isolation levels include Read Uncommitted, Read Committed, Repeatable Read, Serializable.
Higher isolation levels provide more data consistency but may lead to more locking and potential performance issues.
Example: Using Read Uncommitted isolation level allows reading uncommitted data, while Serializable ensures data integrity but may lead to more blocking.
Understanding isolation levels is cruci...read more
Q90. What is Networking
Networking is the practice of connecting computers and other devices to share resources and communicate with each other.
Networking involves the use of hardware devices like routers, switches, and cables to create a network.
It also includes the use of software protocols like TCP/IP to enable communication between devices.
Networking allows for sharing resources such as files, printers, and internet connections among connected devices.
Examples of networking technologies include ...read more
Q91. what is database?
A database is a structured collection of data that is organized in a way that allows for easy access, management, and retrieval.
A database is used to store and organize data in a structured format.
It allows for efficient retrieval and manipulation of data.
Examples of databases include MySQL, Oracle, SQL Server, and MongoDB.
Q92. How to handle situation
Handling situations involves assessing the problem, communicating effectively, making decisions, and taking action.
Stay calm and assess the situation before reacting.
Communicate clearly with all parties involved to gather information and perspectives.
Make a decision based on the information gathered and take appropriate action.
Follow up to ensure the situation is resolved and learn from the experience for future situations.
Q93. explain datawindow in powerbuilder
DataWindow is a GUI control in PowerBuilder used to display and manipulate data from a database.
DataWindow can be used to retrieve data from a database, display it in a tabular format, and allow users to edit the data.
It supports various data sources such as SQL, ODBC, and XML.
DataWindow can also be used to create reports and graphs.
It provides various features such as sorting, filtering, grouping, and computed columns.
DataWindow can be customized using various properties and...read more
Q94. oops concept with use of it
Oops concepts are fundamental principles of object-oriented programming that help in organizing and designing code efficiently.
Encapsulation: bundling data and methods that operate on the data into a single unit (class)
Inheritance: allowing a class to inherit properties and behavior from another class
Polymorphism: ability of objects to take on multiple forms or have multiple behaviors
Abstraction: hiding the complex implementation details and showing only the necessary feature...read more
Q95. What is OS
OS stands for Operating System. It is a software that manages computer hardware and software resources.
OS acts as an interface between the user and the computer hardware.
It manages memory, processes, and input/output devices.
Examples of OS include Windows, macOS, Linux, and Android.
Q96. What is firewall
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and untrusted external network.
It can be implemented in hardware, software, or a combination of both.
Firewalls can filter traffic based on IP addresses, port numbers, protocols, and other criteria.
Examples of firewalls include Cisco ASA, Palo Alto Networks, and pfSense.
Q97. What is the Use ofAD
Active Directory (AD) is a directory service used by organizations to manage and secure resources such as computers, users, and groups.
Centralized management of network resources
Authentication and authorization of users and computers
Group policy management for enforcing security settings
Single sign-on for users to access multiple resources
Integration with other services like DNS and DHCP
Example: Creating user accounts, assigning permissions, managing group policies
Q98. What is Hardware
Hardware refers to the physical components of a computer system that can be touched and seen.
Includes components like CPU, motherboard, RAM, hard drive, graphics card, etc.
Responsible for processing data and executing instructions.
Examples: keyboard, mouse, monitor, printer.
Q99. What is SDLC process
SDLC process is a structured approach to software development that defines tasks performed at each stage of the software development life cycle.
SDLC stands for Software Development Life Cycle
It includes stages like planning, analysis, design, implementation, testing, and maintenance
Each stage has specific goals and deliverables to ensure the quality and success of the software project
Q100. Bug life cycle in details
Bug life cycle involves identification, reporting, fixing, retesting, and closing of a software bug.
Bug identification by testers
Bug reporting with detailed steps to reproduce
Bug fixing by developers
Bug retesting by testers to verify the fix
Bug closing after confirmation of resolution
Top HR Questions asked in Zoryboard Software Solutions
Interview Process at Zoryboard Software Solutions
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month