Add office photos
Engaged Employer

3i Infotech

3.5
based on 1.9k Reviews
Filter interviews by

100+ Zoryboard Software Solutions Interview Questions and Answers

Updated 14 Nov 2024
Popular Designations

Q1. What is active directory ? Role of DNS server ? Difference between RAM & ROM ? Knowledge on installation of various softwares and Drivers ? Layers of OSI model ? TCP/IP Configuration ? Knowledge on various type...

read more
Ans.

The interview questions cover a wide range of topics including Active Directory, DNS, RAM, ROM, OSI model, networking devices, LAN/WAN/MAN/PAN troubleshooting, Outlook and Lotus Notes configuration, data backup and recovery, BSOD troubleshooting, and command prompt basics.

  • Active Directory is a Microsoft service that manages network resources and user accounts.

  • DNS server translates domain names into IP addresses.

  • RAM is volatile memory used for temporary storage while ROM is no...read more

View 1 answer

Q2. What is BSOD error in windows?

Ans.

BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a fatal system error occurs.

  • BSOD is a critical error that causes the computer to crash and display a blue screen with error codes.

  • It is usually caused by hardware or software issues, such as faulty drivers, incompatible software, or hardware failures.

  • BSOD can prevent the computer from booting up properly and may require troubleshooting or repair.

  • Common BSOD error codes incl...read more

View 8 more answers

Q3. What is Domain and how System is added to domain

Ans.

A domain is a network of computers and devices that are managed as a single entity.

  • A domain is a collection of computers and devices that share a common security and administration policy.

  • A domain controller is a server that manages the security and authentication of users and computers in the domain.

  • To add a system to a domain, the system must be configured to use the domain controller as its primary DNS server and then joined to the domain using valid credentials.

  • Once a sys...read more

View 2 more answers

Q4. How to install operating system?

Ans.

To install an operating system, you need to boot from a bootable media and follow the installation wizard.

  • Create a bootable media (USB, DVD, etc.) with the operating system image

  • Insert the bootable media into the computer and restart it

  • Press the key to enter the boot menu (usually F12 or Del)

  • Select the bootable media from the list of boot devices

  • Follow the installation wizard and choose the installation options (language, partition, etc.)

  • Wait for the installation to complete ...read more

View 1 answer
Discover Zoryboard Software Solutions interview dos and don'ts from real experiences

Q5. what is AD ,Tell me about iso layers,what is tcp/ip.

Ans.

AD is Active Directory, a directory service developed by Microsoft. ISO layers refer to the OSI model, and TCP/IP is a protocol suite.

  • Active Directory is a directory service used to manage resources in a network.

  • ISO layers refer to the Open Systems Interconnection model, which is a conceptual model used to describe network communication.

  • TCP/IP is a protocol suite used for communication between devices on a network.

  • TCP/IP consists of four layers: application, transport, intern...read more

Add your answer

Q6. What is is the chance in SNR with negative feed back?

Ans.

Negative feedback improves SNR by reducing noise and distortion.

  • Negative feedback reduces the gain of the amplifier, which reduces the noise and distortion.

  • The reduction in gain also reduces the output signal level, but the noise reduction is greater, resulting in an improved SNR.

  • Negative feedback is commonly used in audio amplifiers and other electronic circuits to improve performance.

  • The amount of negative feedback used must be carefully chosen to balance the trade-off betw...read more

Add your answer
Are these interview questions helpful?

Q7. What is the effect of bandwidth of an amplifier with negative feed back?

Ans.

Bandwidth of an amplifier with negative feedback affects its gain and stability.

  • Increasing bandwidth increases gain but decreases stability.

  • Decreasing bandwidth decreases gain but increases stability.

  • Bandwidth is the range of frequencies over which the amplifier can operate effectively.

  • Negative feedback reduces distortion and noise in the amplifier.

  • Bandwidth can be adjusted by changing the feedback network or the gain of the amplifier.

Add your answer

Q8. what is sdlc?the steps involved in the same your strengths and weaknesses justification for the same

Ans.

SDLC stands for Software Development Life Cycle, which is a process used to design, develop, and test software.

  • The steps involved in SDLC are planning, analysis, design, development, testing, deployment, and maintenance.

  • Strengths of SDLC include a structured approach to software development, clear communication between team members, and a focus on quality assurance.

  • Weaknesses of SDLC include a potential for delays due to the structured approach, difficulty adapting to changin...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How many directors and reflectors in Yagi Uda antenna?

Ans.

A Yagi Uda antenna typically has one director and one reflector element.

  • A Yagi Uda antenna is a directional antenna used for communication purposes.

  • The director element is placed in front of the driven element and the reflector element is placed behind it.

  • The director element helps in focusing the radiation pattern in the forward direction while the reflector element helps in increasing the gain of the antenna.

  • The number of directors can be increased to increase the gain of t...read more

Add your answer

Q10. Explain What is domain ?

Ans.

A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.

  • A domain is a logical grouping of network resources such as computers, printers, and servers.

  • It allows for centralized management of users, computers, and security policies.

  • Domains are typically used in business environments to provide a secure and organized network infrastructure.

  • An example of a domain name is google.com, which represents a group of serv...read more

View 1 answer

Q11. What is the following step after an interrupt comes to a microprocessor?

Ans.

The microprocessor saves the current state, jumps to the interrupt service routine, and executes it.

  • The microprocessor saves the current state of the program being executed

  • It jumps to the interrupt service routine (ISR) specified by the interrupt vector table

  • The ISR executes and handles the interrupt

  • After the ISR is complete, the microprocessor returns to the saved state and continues executing the program

  • Examples of interrupts include timer interrupts, keyboard interrupts, a...read more

Add your answer

Q12. What material is used for the manufacturing of GATE in MOSFETS

Ans.

The material used for manufacturing GATE in MOSFETS is usually silicon dioxide.

  • Silicon dioxide is a common material used for the gate dielectric layer in MOSFETs.

  • Other materials such as hafnium oxide and aluminum oxide may also be used.

  • The choice of material depends on factors such as performance requirements and manufacturing process.

  • The gate material itself is usually made of doped polysilicon or metal.

  • The gate oxide thickness is a critical parameter that affects MOSFET per...read more

Add your answer

Q13. How do you trouble shoot when the user is not able to take the Remote access of a server?

Ans.

To troubleshoot when a user is unable to take remote access of a server, check network connectivity, firewall settings, user permissions, and remote desktop services.

  • Check network connectivity to ensure the user can reach the server.

  • Verify firewall settings to ensure the necessary ports are open for remote access.

  • Check user permissions on the server to ensure the user has the necessary access rights.

  • Verify the status of remote desktop services on the server.

  • Restart the remote...read more

Add your answer

Q14. How to assign Ip address, Outlook Configuration, Data Back up, DHCP,... Package is Very Low 1.8 - 2Lakhs

Ans.

Assigning IP address, Outlook configuration, data backup, and DHCP for a low budget package.

  • Use automated tools for IP address assignment like DHCP

  • Configure Outlook manually or using group policy settings

  • Implement regular data backup schedules using built-in or third-party tools

  • Consider open-source solutions to keep costs low

Add your answer

Q15. What are the differences between .Net and .Net Core?

Ans.

The main difference is that .NET Core is open-source and cross-platform while .NET Framework is Windows-only.

  • Both are used for building Windows applications, but .NET Core can also be used for web and cloud applications.

  • .NET Core has a smaller runtime and can be deployed as a single executable file.

  • .NET Core supports Docker containers and can be used on Linux and macOS.

  • .NET Framework has a larger runtime and requires installation on the target machine.

  • Some libraries and APIs ...read more

Add your answer

Q16. What is the difference between Incremental and Differential Backup?

Ans.

Incremental backup only backs up data that has changed since the last backup, while differential backup backs up all changes since the last full backup.

  • Incremental backup only backs up data that has changed since the last backup

  • Differential backup backs up all changes since the last full backup

  • Incremental backups are faster and require less storage space than differential backups

  • Differential backups are easier to restore from compared to incremental backups

  • Example: If a full ...read more

Add your answer
Ans.

IP stands for Internet Protocol. It is a set of rules that governs the format of data packets sent over the internet.

  • IP is a fundamental protocol in computer networking.

  • It provides the addressing scheme used to identify devices on a network.

  • IP packets contain both the source and destination IP addresses.

  • IPv4 and IPv6 are the two main versions of IP.

  • Example: 192.168.0.1 is an IPv4 address.

View 3 more answers

Q18. What is the difference between an MSI and an .EXE File

Ans.

MSI files are Windows Installer packages used for installation, while .EXE files are executable files that can perform various tasks.

  • MSI files are used for installing software on Windows systems, while .EXE files can be used for a variety of tasks such as running programs or scripts.

  • MSI files are typically larger in size compared to .EXE files.

  • MSI files can be installed silently using command line options, while .EXE files may require manual intervention during installation.

  • E...read more

Add your answer

Q19. How to take data backup?

Ans.

Data backup can be taken using various methods depending on the type of data and storage medium.

  • Identify the type of data and storage medium

  • Choose a backup method such as full, incremental or differential

  • Select a backup location such as external hard drive, cloud storage or tape drive

  • Schedule regular backups to ensure data is up-to-date

  • Test the backup to ensure it can be restored in case of data loss

Add your answer

Q20. What is the difference of OS and Device manager.

Ans.

OS manages the overall operation of a computer system, while Device Manager manages hardware devices connected to the system.

  • OS controls the overall operation of a computer system, including managing resources, running applications, and providing user interface.

  • Device Manager is a component of the OS that manages hardware devices connected to the system, allowing users to view and control device settings.

  • Examples: Windows OS manages the overall operation of a computer system,...read more

Add your answer

Q21. Have you worked on Agile methodology?

Ans.

Yes, I have worked on Agile methodology.

  • I have experience working in Agile teams and following Agile principles.

  • I have participated in Agile ceremonies such as daily stand-ups, sprint planning, and retrospectives.

  • I have used Agile tools like Jira or Trello to manage and track project tasks.

  • I have worked closely with product owners and stakeholders to prioritize and deliver user stories.

  • I have adapted to changing requirements and embraced the iterative nature of Agile developm...read more

View 1 answer

Q22. How to add endpoint asset in domain. How to add Printer. How to resolve paper jam in Printer Basic knowledge of IP and network Basic knowledge of networking

Ans.

To add an endpoint asset in a domain, add it to the Active Directory. To add a printer, connect it to the network and install the drivers. To resolve a paper jam, follow the printer's manual. Basic knowledge of IP and networking is required.

  • To add an endpoint asset in a domain, go to Active Directory Users and Computers, right-click on the domain, and select 'New Computer'.

  • To add a printer, connect it to the network and install the drivers on the computer. Then, go to 'Device...read more

Add your answer

Q23. What is domain?

Ans.

A domain is a group of computers, devices, or resources that share a common network identity.

  • Domains are used in computer networking to organize and manage resources.

  • A domain can be a local network or a larger network like the internet.

  • Domains are often used in conjunction with domain name systems (DNS) to assign unique names to resources.

  • Domains can also be used to manage security and access control for resources.

  • Examples of domains include Microsoft Active Directory domains...read more

Add your answer

Q24. How much year of experience in computer hardware & software installation

Ans.

I have 5 years of experience in computer hardware & software installation.

  • 5 years of hands-on experience in installing computer hardware components such as RAM, hard drives, and graphics cards

  • Proficient in installing operating systems like Windows, Linux, and macOS

  • Experience in troubleshooting hardware and software issues during installation

  • Familiarity with software deployment tools and techniques

  • Certifications in hardware and software installation may be beneficial

Add your answer

Q25. Why is Maxwell's loop law is used in networks?

Ans.

Maxwell's loop law is used in networks to calculate the current flowing through a closed loop.

  • Maxwell's loop law is a fundamental law of electromagnetism.

  • It states that the sum of the electromotive forces (EMFs) around a closed loop is equal to the sum of the changes in magnetic flux through the loop.

  • This law is used in networks to calculate the current flowing through a closed loop.

  • It is particularly useful in analyzing complex circuits with multiple loops and sources.

  • For ex...read more

Add your answer

Q26. What WAIT states are used in Microcontrollers?

Ans.

WAIT states are used in microcontrollers to synchronize with slower peripherals or memory.

  • WAIT states are used to delay the microcontroller's operation until a slower peripheral or memory operation is complete.

  • They are commonly used in memory-mapped I/O operations.

  • The number of WAIT states required depends on the speed of the peripheral or memory being accessed.

  • Some microcontrollers have configurable WAIT states to optimize performance.

  • Examples of WAIT state instructions incl...read more

Add your answer

Q27. What is sdlc?the steps involved in the same

Ans.

SDLC stands for Software Development Life Cycle, which is a process used to design, develop, and test software.

  • The steps involved in SDLC are planning, analysis, design, implementation, and maintenance.

  • During planning, the project scope, objectives, and requirements are defined.

  • In analysis, the requirements are analyzed and documented.

  • Design involves creating a blueprint for the software.

  • Implementation is the actual coding and testing of the software.

  • Maintenance involves fixi...read more

Add your answer

Q28. What domain, how to configuration outlook,

Ans.

To configure Outlook, you need to know the domain name and server settings.

  • Open Outlook and go to File > Account Settings > Account Settings

  • Click on New to add a new email account

  • Enter your name, email address, and password

  • Select the account type (POP or IMAP) and enter the incoming and outgoing server settings

  • Click on Test Account Settings to ensure everything is working properly

  • Click on Finish to complete the setup process

Add your answer

Q29. What is the meaning of technical support

Ans.

Technical support refers to providing assistance and troubleshooting for technical issues related to hardware, software, or other technology.

  • Assisting users with hardware and software issues

  • Troubleshooting technical problems

  • Providing guidance on how to use technology effectively

  • Resolving network connectivity issues

  • Offering support for system upgrades and installations

Add your answer

Q30. Explain what are the aim of organisation

Ans.

The aim of an organization is to achieve its goals and objectives, fulfill its mission, and provide value to its stakeholders.

  • To achieve its goals and objectives

  • To fulfill its mission

  • To provide value to its stakeholders

Add your answer

Q31. 3. How can configure Static Routing ?

Ans.

Static routing can be configured by manually adding routes to the routing table.

  • Identify the destination network and subnet mask

  • Identify the next-hop router or exit interface

  • Add the route to the routing table using the 'ip route' command

  • Verify the routing table using the 'show ip route' command

Add your answer

Q32. What is the difference of OST and PST.

Ans.

OST is an offline Outlook data file used by Exchange Server, while PST is a personal storage file used by Outlook for POP3, IMAP, and web-based mail accounts.

  • OST is used by Exchange Server to store a copy of mailbox data on the local computer.

  • PST is used by Outlook to store emails, contacts, calendar items, and other data for POP3, IMAP, and web-based mail accounts.

  • OST files are synchronized with the Exchange Server when connected to the internet, while PST files are stored l...read more

Add your answer

Q33. What is sales and how to converting coustomer

Ans.

Sales is the process of persuading customers to purchase a product or service. Converting customers involves building relationships and addressing their needs.

  • Sales is about understanding customer needs and offering solutions

  • Building relationships and trust is crucial in sales

  • Effective communication and negotiation skills are important

  • Providing excellent customer service can lead to repeat sales

  • Using persuasive techniques like storytelling or demonstrating value can help in c...read more

Add your answer

Q34. What are the port numbers for DNS, RDP and DHCP.?

Ans.

DNS - 53, RDP - 3389, DHCP - 67/68

  • DNS uses port 53 for both TCP and UDP communication

  • RDP uses port 3389 for TCP communication

  • DHCP uses ports 67 and 68 for UDP communication

Add your answer

Q35. Which Documents are Required to Fulfill the Claim?

Ans.

Documents required for claim fulfillment include proof of loss, policy details, claim form, and supporting documents.

  • Proof of loss (e.g. police report, photos)

  • Policy details (e.g. insurance policy)

  • Claim form (e.g. filled out and signed)

  • Supporting documents (e.g. receipts, invoices)

Add your answer

Q36. What do you mean by BSOD (Blue Screen Of Death)?

Ans.

BSOD stands for Blue Screen Of Death, a Windows error screen that appears when the system encounters a critical error.

  • BSOD is a stop error screen that appears on Windows operating systems when a fatal system error occurs.

  • It is often caused by hardware failures, driver issues, or software problems.

  • The screen is blue with white text, hence the name Blue Screen Of Death.

  • BSOD usually includes an error code and a message indicating the cause of the crash.

  • Users are typically requir...read more

Add your answer

Q37. What is Active Directory

Ans.

Active Directory is a Microsoft service that manages network resources and user accounts.

  • It is used to authenticate and authorize users and computers in a Windows domain network.

  • It stores information about users, groups, computers, and other network objects.

  • It provides a centralized location for managing network resources and security policies.

  • It allows administrators to delegate administrative tasks to specific users or groups.

  • It can be used to manage access to network resou...read more

Add your answer

Q38. Different types of RAM.

Ans.

Different types of RAM include DDR, DDR2, DDR3, DDR4, and SDRAM.

  • DDR (Double Data Rate) RAM is the most common type used in desktop computers.

  • DDR2 RAM is an older version with slower speeds compared to DDR3 and DDR4.

  • DDR3 RAM is faster and more power-efficient than DDR2.

  • DDR4 RAM is the latest standard, offering higher speeds and larger capacities.

  • SDRAM (Synchronous Dynamic Random Access Memory) is an older type used in older systems.

View 1 answer

Q39. What is Digital Image Processing?

Ans.

Digital Image Processing is the manipulation of digital images using algorithms to enhance, analyze, or extract information.

  • It involves techniques like image enhancement, restoration, segmentation, and compression.

  • Common applications include medical imaging, satellite imaging, facial recognition, and object detection.

  • Algorithms like edge detection, noise reduction, and image stitching are used in digital image processing.

  • It plays a crucial role in fields like computer vision,...read more

Add your answer

Q40. In which demodulators PLL is used?

Ans.

PLL is used in demodulators for FM and PM signals.

  • PLL demodulators are used in FM and PM receivers.

  • PLL demodulators are used to recover the original signal from the modulated signal.

  • PLL demodulators are used in communication systems and radar systems.

  • Examples of PLL demodulators include Foster-Seeley discriminator and ratio detector.

Add your answer

Q41. Whar are you sellery expectations?

Ans.

My salary expectations are based on my qualifications, experience, and the industry standards.

  • Consider my qualifications and experience when determining salary

  • Take into account the industry standards for Junior Associates

  • Open to negotiation based on the overall compensation package

View 3 more answers

Q42. how to retrieve set of data in a database?

Ans.

To retrieve a set of data in a database, you can use SQL queries to specify the data you want to retrieve.

  • Use SELECT statement to specify the columns you want to retrieve

  • Use FROM clause to specify the table where the data is stored

  • Use WHERE clause to specify any conditions for filtering the data

  • Use ORDER BY clause to specify the order in which the data should be returned

  • Use LIMIT clause to specify the maximum number of rows to return

Add your answer

Q43. how to know the disk utilization in linux?

Ans.

To know disk utilization in Linux, use commands like df, du, and iostat.

  • Use 'df' command to display disk space usage on Linux filesystems.

  • Use 'du' command to estimate file space usage.

  • Use 'iostat' command to monitor system input/output device loading.

  • Check disk utilization with tools like 'iotop' and 'atop'.

Add your answer

Q44. How to backup in outlook ?

Ans.

To backup in Outlook, go to File > Open & Export > Import/Export > Export to a file > Outlook Data File (.pst)

  • Open Outlook and click on File

  • Select Open & Export and then click on Import/Export

  • Choose Export to a file and click on Next

  • Select Outlook Data File (.pst) and click on Next

  • Choose the folder you want to backup and click on Next

  • Select a location to save the backup file and click on Finish

Add your answer

Q45. 2. What is ACTIVE DIRECTORY ?

Ans.

Active Directory is a directory service developed by Microsoft for Windows domain networks.

  • It stores information about network resources such as computers, users, and groups.

  • It provides authentication and authorization services for Windows-based computers.

  • It allows administrators to manage network resources from a central location.

  • It uses a hierarchical structure of domains and organizational units (OUs) to organize resources.

  • Examples of tasks that can be performed with Activ...read more

Add your answer

Q46. What is SIT and UAT testing

Ans.

SIT is System Integration Testing and UAT is User Acceptance Testing.

  • SIT is performed to verify the integration of different modules or systems.

  • UAT is performed by end-users to ensure the system meets their requirements.

  • SIT is usually done by developers or testers, while UAT is done by end-users.

  • SIT is done before UAT.

  • SIT focuses on technical aspects, while UAT focuses on business requirements.

Add your answer

Q47. What is regression and retesting

Ans.

Regression is testing the existing functionality after making changes to the software. Retesting is testing the same functionality again after fixing the defects found in the previous testing.

  • Regression testing ensures that changes made to the software do not affect the existing functionality.

  • Retesting ensures that the defects found in the previous testing have been fixed.

  • Regression testing is done after every change in the software.

  • Retesting is done after fixing the defects ...read more

Add your answer

Q48. Tell me one quality

Ans.

Adaptability

  • Ability to quickly adjust to new situations

  • Flexibility in handling changing priorities

  • Openness to learning and acquiring new skills

  • Capacity to work effectively in diverse teams

  • Example: Successfully adapting to a new software system at a previous job

View 2 more answers

Q49. Full form of ETP, SMTP

Ans.

ETP - Effluent Treatment Plant, SMTP - Simple Mail Transfer Protocol

  • ETP is a wastewater treatment plant used to treat industrial effluent before releasing it into the environment

  • SMTP is a protocol used for sending and receiving email messages on the internet

  • ETP involves physical, chemical, and biological processes to remove pollutants from wastewater

  • SMTP uses port 25 to send messages and port 587 for secure transmission

View 4 more answers

Q50. How to configuration outlook

Ans.

Configuring Outlook involves setting up email accounts, server settings, and personal preferences.

  • Open Outlook and click on 'File' in the top left corner.

  • Select 'Add Account' to add a new email account.

  • Enter your email address and password, then follow the prompts to complete the setup.

  • To configure server settings, go to 'File' > 'Account Settings' > 'Account Settings' again.

  • Select your email account and click on 'Change'. Here you can modify incoming and outgoing server sett...read more

View 1 answer

Q51. How do you Decommission a server?

Ans.

Decommissioning a server involves several steps to safely remove it from service.

  • Backup any necessary data or configurations before proceeding.

  • Notify stakeholders and users of the server's decommissioning.

  • Remove the server from any load balancers or DNS records.

  • Power off the server and physically disconnect it from the network.

  • Document the decommissioning process for future reference.

Add your answer

Q52. What is e-commerce testing

Ans.

E-commerce testing is the process of testing online shopping websites or applications to ensure they function properly.

  • Testing the functionality of the shopping cart

  • Testing the payment gateway integration

  • Testing the security of the website

  • Testing the performance of the website during high traffic

  • Testing the compatibility of the website with different browsers and devices

Add your answer

Q53. Steps that involves during troubleshooting

Ans.

Troubleshooting steps involve identifying the issue, gathering information, isolating the problem, implementing a solution, and testing the solution.

  • Identify the issue reported by the user

  • Gather information about the issue such as error messages or recent changes

  • Isolate the problem by narrowing down possible causes

  • Implement a solution based on the identified cause

  • Test the solution to ensure the issue is resolved

Add your answer

Q54. What is IT according to you?

Ans.

IT stands for Information Technology and refers to the use of computers and software to manage, process, and communicate information.

  • IT involves the use of hardware, software, and networks to store, process, and transmit data

  • IT professionals design, develop, and maintain computer systems and software applications

  • Examples of IT include computer programming, database management, and network administration

Add your answer

Q55. A program for prime number with using module.

Ans.

A program to find prime numbers using modules.

  • Import the math module

  • Create a function to check if a number is prime

  • Loop through a range of numbers and check if each is prime

  • Print the prime numbers found

Add your answer

Q56. How to create file Server

Ans.

To create a file server, you need to set up a dedicated computer or network-attached storage (NAS) device to store and share files.

  • Choose a computer or NAS device with enough storage capacity for your needs

  • Install a file server software such as Windows Server or Linux-based Samba

  • Configure the software to create shared folders and set access permissions

  • Connect clients to the file server using network protocols such as SMB or NFS

  • Regularly back up the files on the server to prev...read more

Add your answer

Q57. What is LAN?

Ans.

LAN stands for Local Area Network. It is a computer network that connects devices within a limited area such as a home, office, or building.

  • LAN is a type of network that is used to connect devices within a limited area.

  • It is commonly used in homes, offices, and buildings.

  • LAN can be wired or wireless.

  • It allows devices to share resources such as printers, files, and internet access.

  • Examples of LAN technologies include Ethernet, Wi-Fi, and Bluetooth.

Add your answer

Q58. What is troubleshooting

Ans.

Troubleshooting is the process of identifying, diagnosing, and resolving technical issues or problems.

  • Identifying the issue or problem

  • Gathering information and data related to the issue

  • Analyzing the information to determine possible causes

  • Testing and implementing solutions to resolve the issue

  • Verifying that the issue has been resolved

Add your answer

Q59. How to use Vlookup in Excel

Ans.

Vlookup is a function in Excel used to search for a specific value in a table and return a corresponding value from another column.

  • Select the cell where you want to enter the formula

  • Type =VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])

  • lookup_value is the value you want to search for

  • table_array is the range of cells containing the table

  • col_index_num is the column number from which you want to return the value

  • range_lookup is an optional argument that specifies...read more

Add your answer

Q60. what is MySQL? why it is popular?

Ans.

MySQL is an open-source relational database management system that is popular for its ease of use, flexibility, and scalability.

  • MySQL is an open-source RDBMS, allowing users to freely use, modify, and distribute the software.

  • It is known for its ease of use, making it accessible for beginners and experts alike.

  • MySQL is highly flexible, supporting various data types and storage engines.

  • It is popular for its scalability, allowing users to easily handle large amounts of data.

  • MySQ...read more

Add your answer

Q61. What is DHCP?

Ans.

DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.

  • DHCP is used to simplify network administration by automating the IP address assignment process.

  • It allows devices to join a network and obtain an IP address without manual configuration.

  • DHCP servers can also provide additional network configuration information, such as DNS and gateway settings.

  • DHCP leases are temporary and must be renewed periodical...read more

Add your answer

Q62. What is black box testing

Ans.

Black box testing is a software testing technique where the internal workings of the system are not known to the tester.

  • Tests the functionality of the system without knowledge of its internal structure

  • Focuses on inputs and outputs of the system

  • Tests are based on requirements and specifications

  • Commonly used for system and acceptance testing

  • Examples include boundary value analysis and equivalence partitioning

Add your answer

Q63. What is quality management, why it's necessary

Add your answer

Q64. How do you resolve the BSOD?

Ans.

BSOD can be resolved by identifying the root cause, checking for hardware/software issues, updating drivers, and performing system restore.

  • Identify the error code displayed on the BSOD screen to determine the root cause.

  • Check for hardware issues such as faulty RAM or hard drive.

  • Update drivers for hardware components like graphics card or network adapter.

  • Perform a system restore to revert back to a stable state before the BSOD occurred.

Add your answer

Q65. What is extension outlook ?

Ans.

Extension Outlook refers to the file extension used by Microsoft Outlook to save email messages and other data.

  • Extension Outlook is commonly used for saving email messages, contacts, calendar entries, and other data in Microsoft Outlook.

  • The file extension for Outlook data files is .pst (Personal Storage Table) for Outlook data files and .ost (Offline Storage Table) for offline data files.

  • Outlook also uses other file extensions such as .msg for individual email messages and .o...read more

Add your answer

Q66. How to troubleshoot printer

Ans.

To troubleshoot a printer, start by checking the connections and drivers, then run diagnostic tests and clean the printer.

  • Check the printer connections and make sure it is properly plugged in

  • Ensure the printer drivers are up to date and installed correctly

  • Run diagnostic tests to identify any issues with the printer hardware or software

  • Clean the printer, including the print head and rollers, to improve print quality

  • Check for any error messages or codes on the printer display o...read more

Add your answer

Q67. Can you handle computer technical issue

Ans.

Yes, I have experience handling computer technical issues.

  • I have experience troubleshooting hardware and software issues

  • I am familiar with operating systems like Windows, Linux, and MacOS

  • I have resolved network connectivity problems

  • I have experience with system backups and data recovery

  • I am skilled in diagnosing and fixing computer viruses and malware

Add your answer

Q68. What is Dependency Injection?

Ans.

Dependency Injection is a design pattern that allows objects to receive dependencies rather than creating them internally.

  • DI is a way to achieve loose coupling between objects

  • It helps in creating more testable and maintainable code

  • DI can be implemented using constructor injection, property injection, or method injection

  • Example: Instead of creating a database connection object inside a class, we can inject it from outside

  • Example: ASP.NET Core uses DI to inject services into co...read more

Add your answer

Q69. What are the Design patterns?

Ans.

Design patterns are reusable solutions to common software development problems.

  • Design patterns provide proven solutions to recurring problems in software development.

  • They help in creating code that is more flexible, reusable, and maintainable.

  • Some common design patterns include Singleton, Factory, Observer, and Decorator.

  • Design patterns can be categorized into three types: Creational, Structural, and Behavioral.

Add your answer

Q70. How to data backup

Ans.

Data backup can be done through various methods.

  • Use cloud storage services like Google Drive, Dropbox, or OneDrive.

  • Use external hard drives or USB drives to store data.

  • Use backup software like Acronis True Image or EaseUS Todo Backup.

  • Create a backup schedule to ensure regular backups.

  • Test backups regularly to ensure data can be restored.

  • Consider offsite backups for added security.

  • Encrypt sensitive data before backing up to prevent unauthorized access.

Add your answer

Q71. Whow you distribute your salery

Ans.

I distribute my salary by allocating a portion for savings, expenses, investments, and personal needs.

  • Allocate a percentage for savings to build a financial cushion

  • Set aside a portion for monthly expenses such as rent, bills, and groceries

  • Invest a percentage in long-term investments like stocks or retirement accounts

  • Keep some for personal needs and leisure activities

Add your answer

Q72. Difference between 2016 and 2019 server?

Ans.

Windows Server 2019 has more advanced features and improvements compared to Windows Server 2016.

  • Windows Server 2019 has improved security features such as Windows Defender Advanced Threat Protection (ATP) and Windows Defender Exploit Guard.

  • Windows Server 2019 includes enhancements in virtualization with features like Shielded Virtual Machines and Encrypted Networks.

  • Windows Server 2019 has improved support for Linux virtual machines and containers.

  • Windows Server 2019 has bette...read more

Add your answer

Q73. What is domain and how it's working

Ans.

A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.

  • A domain allows for centralized management of users, computers, and resources.

  • Domains use a hierarchical structure with a domain controller at the top.

  • Domain controllers authenticate and authorize all users and computers in the domain.

  • Examples of domains include Microsoft Active Directory domains and DNS domains.

Add your answer

Q74. What is the Expected CTC?

Ans.

Expected CTC depends on various factors such as experience, skills, location, and company policies.

  • Expected CTC can vary based on the candidate's experience and skills.

  • Location can also play a role in determining the Expected CTC.

  • Company policies and budget can also impact the Expected CTC.

  • It is important to research industry standards and negotiate based on market rates.

  • Providing a specific number may limit negotiation opportunities.

Add your answer

Q75. What are IMAP and SMTP?

Ans.

IMAP and SMTP are protocols used for sending and receiving emails.

  • IMAP (Internet Message Access Protocol) is used for receiving emails from a mail server.

  • SMTP (Simple Mail Transfer Protocol) is used for sending emails to a mail server.

  • IMAP allows users to access their emails from multiple devices while keeping them synchronized.

  • SMTP is responsible for the transmission of emails between the sender's and recipient's mail servers.

Add your answer

Q76. How to secure data

Ans.

Data can be secured through encryption, access control, backups, and regular updates.

  • Use strong encryption algorithms to protect data in transit and at rest

  • Implement access control measures to restrict unauthorized access to data

  • Regularly backup data to prevent loss in case of a security breach

  • Keep software and systems up-to-date with security patches and updates

Add your answer

Q77. What is motor insurance?

Ans.

Motor insurance is a policy that provides financial protection against damage or theft of a vehicle.

  • It covers the cost of repairs or replacement of the insured vehicle in case of an accident or theft.

  • It also provides liability coverage for any damage or injury caused to third parties.

  • Premiums are based on factors such as the type of vehicle, age of the driver, and driving history.

  • Optional add-ons such as personal accident cover, roadside assistance, and engine protection can ...read more

Add your answer

Q78. What is the ASp.net mean for ?

Ans.

ASP.NET stands for Active Server Pages .NET, a web application framework developed by Microsoft.

  • ASP.NET is a server-side web application framework used for building dynamic web pages and web applications.

  • It allows developers to create web applications using languages like C# or VB.NET.

  • ASP.NET provides tools and libraries for building web forms, MVC (Model-View-Controller) applications, and Web API services.

  • It is part of the .NET framework and integrates with other Microsoft t...read more

Add your answer

Q79. what is the typical day of BA

Ans.

A typical day of a Business Analyst involves gathering requirements, analyzing data, creating reports, and collaborating with stakeholders.

  • Gathering requirements from stakeholders

  • Analyzing data to identify trends and insights

  • Creating reports and presentations to communicate findings

  • Collaborating with stakeholders to ensure project success

Add your answer

Q80. How to install os

Ans.

To install an OS, you need to create a bootable media and follow the installation process.

  • Create a bootable media such as a USB drive or DVD

  • Insert the media into the computer and restart it

  • Press the key to enter the boot menu and select the media

  • Follow the on-screen instructions to install the OS

  • Configure the settings and install drivers and updates

Add your answer

Q81. Explain OOP in Python

Ans.

OOP in Python is a programming paradigm where objects are created that contain data and methods to manipulate that data.

  • Classes are used to create objects in Python

  • Objects have attributes (data) and methods (functions)

  • Inheritance allows classes to inherit attributes and methods from other classes

  • Encapsulation allows data to be hidden and only accessed through methods

  • Polymorphism allows objects to be treated as instances of their parent class

Add your answer

Q82. SDLC life cycle and efforts spent in each phase

Add your answer

Q83. What is Life Insurance

Ans.

Life insurance is a financial product that provides a lump sum payment to beneficiaries upon the insured's death.

  • Provides financial protection for loved ones in case of the insured's death

  • Premiums are paid regularly to maintain coverage

  • Can also include additional benefits like critical illness or disability coverage

  • Types include term life, whole life, and universal life insurance

Add your answer

Q84. What is SDLC and STLC

Ans.

SDLC stands for Software Development Life Cycle, which is a process used by software development teams to design, develop, and test high-quality software products. STLC stands for Software Testing Life Cycle, which is a subset of SDLC focused on testing activities.

  • SDLC involves phases like planning, analysis, design, implementation, and maintenance.

  • STLC involves phases like test planning, test design, test execution, and test closure.

  • SDLC is focused on the overall development...read more

Add your answer

Q85. What is sdlc

Ans.

SDLC stands for Software Development Life Cycle.

  • It is a process used to design, develop, and test software.

  • It consists of several phases such as planning, analysis, design, implementation, and maintenance.

  • It helps to ensure that software is developed efficiently and meets the requirements of the stakeholders.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

Add your answer
Ans.

Insurance is a contract between an individual and an insurance company to protect against financial loss.

  • Insurance provides financial protection against unexpected events

  • Individuals pay premiums to an insurance company in exchange for coverage

  • Types of insurance include health, auto, home, and life insurance

  • Insurance policies have terms and conditions that outline what is covered and what is not

  • Insurance helps individuals and businesses manage risk

Add your answer

Q87. What is Window server

Ans.

Windows Server is a brand name for a group of server operating systems released by Microsoft.

  • Windows Server is designed to provide services such as user authentication, file sharing, web services, and more.

  • It allows multiple users to access shared resources on a network.

  • Examples of Windows Server operating systems include Windows Server 2016, Windows Server 2019, etc.

Add your answer

Q88. Name and address currently location

Ans.

I am currently located at 123 Main Street, Anytown, USA.

  • Current location is 123 Main Street

  • Located in Anytown, USA

  • Full address is available upon request

Add your answer

Q89. Isolation level in DB

Ans.

Isolation level determines how transactions interact with each other in a database.

  • Isolation levels include Read Uncommitted, Read Committed, Repeatable Read, Serializable.

  • Higher isolation levels provide more data consistency but may lead to more locking and potential performance issues.

  • Example: Using Read Uncommitted isolation level allows reading uncommitted data, while Serializable ensures data integrity but may lead to more blocking.

  • Understanding isolation levels is cruci...read more

Add your answer

Q90. What is Networking

Ans.

Networking is the practice of connecting computers and other devices to share resources and communicate with each other.

  • Networking involves the use of hardware devices like routers, switches, and cables to create a network.

  • It also includes the use of software protocols like TCP/IP to enable communication between devices.

  • Networking allows for sharing resources such as files, printers, and internet connections among connected devices.

  • Examples of networking technologies include ...read more

View 1 answer

Q91. what is database?

Ans.

A database is a structured collection of data that is organized in a way that allows for easy access, management, and retrieval.

  • A database is used to store and organize data in a structured format.

  • It allows for efficient retrieval and manipulation of data.

  • Examples of databases include MySQL, Oracle, SQL Server, and MongoDB.

Add your answer

Q92. How to handle situation

Ans.

Handling situations involves assessing the problem, communicating effectively, making decisions, and taking action.

  • Stay calm and assess the situation before reacting.

  • Communicate clearly with all parties involved to gather information and perspectives.

  • Make a decision based on the information gathered and take appropriate action.

  • Follow up to ensure the situation is resolved and learn from the experience for future situations.

Add your answer

Q93. explain datawindow in powerbuilder

Ans.

DataWindow is a GUI control in PowerBuilder used to display and manipulate data from a database.

  • DataWindow can be used to retrieve data from a database, display it in a tabular format, and allow users to edit the data.

  • It supports various data sources such as SQL, ODBC, and XML.

  • DataWindow can also be used to create reports and graphs.

  • It provides various features such as sorting, filtering, grouping, and computed columns.

  • DataWindow can be customized using various properties and...read more

Add your answer

Q94. oops concept with use of it

Ans.

Oops concepts are fundamental principles of object-oriented programming that help in organizing and designing code efficiently.

  • Encapsulation: bundling data and methods that operate on the data into a single unit (class)

  • Inheritance: allowing a class to inherit properties and behavior from another class

  • Polymorphism: ability of objects to take on multiple forms or have multiple behaviors

  • Abstraction: hiding the complex implementation details and showing only the necessary feature...read more

Add your answer

Q95. What is OS

Ans.

OS stands for Operating System. It is a software that manages computer hardware and software resources.

  • OS acts as an interface between the user and the computer hardware.

  • It manages memory, processes, and input/output devices.

  • Examples of OS include Windows, macOS, Linux, and Android.

Add your answer

Q96. What is firewall

Ans.

Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Firewall acts as a barrier between a trusted internal network and untrusted external network.

  • It can be implemented in hardware, software, or a combination of both.

  • Firewalls can filter traffic based on IP addresses, port numbers, protocols, and other criteria.

  • Examples of firewalls include Cisco ASA, Palo Alto Networks, and pfSense.

Add your answer

Q97. What is the Use ofAD

Ans.

Active Directory (AD) is a directory service used by organizations to manage and secure resources such as computers, users, and groups.

  • Centralized management of network resources

  • Authentication and authorization of users and computers

  • Group policy management for enforcing security settings

  • Single sign-on for users to access multiple resources

  • Integration with other services like DNS and DHCP

  • Example: Creating user accounts, assigning permissions, managing group policies

Add your answer

Q98. What is Hardware

Ans.

Hardware refers to the physical components of a computer system that can be touched and seen.

  • Includes components like CPU, motherboard, RAM, hard drive, graphics card, etc.

  • Responsible for processing data and executing instructions.

  • Examples: keyboard, mouse, monitor, printer.

Add your answer

Q99. What is SDLC process

Ans.

SDLC process is a structured approach to software development that defines tasks performed at each stage of the software development life cycle.

  • SDLC stands for Software Development Life Cycle

  • It includes stages like planning, analysis, design, implementation, testing, and maintenance

  • Each stage has specific goals and deliverables to ensure the quality and success of the software project

Add your answer

Q100. Bug life cycle in details

Ans.

Bug life cycle involves identification, reporting, fixing, retesting, and closing of a software bug.

  • Bug identification by testers

  • Bug reporting with detailed steps to reproduce

  • Bug fixing by developers

  • Bug retesting by testers to verify the fix

  • Bug closing after confirmation of resolution

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Zoryboard Software Solutions

based on 40 interviews in the last 1 year
Interview experience
3.7
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 3.9k Interview Questions
3.8
 • 387 Interview Questions
4.2
 • 220 Interview Questions
3.9
 • 180 Interview Questions
4.2
 • 139 Interview Questions
4.1
 • 134 Interview Questions
View all
Top 3i Infotech Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter