Filter interviews by
I applied via Referral and was interviewed in Oct 2021. There were 3 interview rounds.
DORA process is a framework for measuring and improving software delivery performance.
DORA stands for DevOps Research and Assessment
It involves collecting data on key performance indicators (KPIs) related to software delivery
The data is used to assess the organization's performance and identify areas for improvement
Examples of KPIs include deployment frequency, lead time for changes, and time to restore service
The proc...
To recover data from a virus-infected HDD, isolate the HDD, scan it with antivirus software, and use data recovery tools if necessary.
Disconnect the infected HDD from the computer to prevent further spread of the virus
Connect the HDD to a clean and secure computer as a secondary drive
Run a thorough antivirus scan on the infected HDD to remove the virus
If the antivirus scan doesn't recover the data, use data recovery so...
Technical support refers to providing assistance and troubleshooting for technical issues related to hardware, software, or other technology.
Assisting users with hardware and software issues
Troubleshooting technical problems
Providing guidance on how to use technology effectively
Resolving network connectivity issues
Offering support for system upgrades and installations
Troubleshooting is the process of identifying, diagnosing, and resolving technical issues or problems.
Identifying the issue or problem
Gathering information and data related to the issue
Analyzing the information to determine possible causes
Testing and implementing solutions to resolve the issue
Verifying that the issue has been resolved
Troubleshooting steps involve identifying the issue, gathering information, isolating the problem, implementing a solution, and testing the solution.
Identify the issue reported by the user
Gather information about the issue such as error messages or recent changes
Isolate the problem by narrowing down possible causes
Implement a solution based on the identified cause
Test the solution to ensure the issue is resolved
The aim of an organization is to achieve its goals and objectives, fulfill its mission, and provide value to its stakeholders.
To achieve its goals and objectives
To fulfill its mission
To provide value to its stakeholders
I applied via Naukri.com and was interviewed in Jan 2023. There were 4 interview rounds.
All about profit, percentages,desicion making, English grammar etc
I was interviewed in Oct 2022.
RAM is a volatile memory used for temporary storage while EEPROM is a non-volatile memory used for permanent storage.
RAM stands for Random Access Memory and is used for temporary storage of data and instructions while the computer is running.
EEPROM stands for Electrically Erasable Programmable Read-Only Memory and is used for permanent storage of data that needs to be retained even when the power is turned off.
RAM is v...
To resolve system slow issue, check for malware, clear cache, update drivers, and increase RAM.
Scan for malware and viruses using antivirus software
Clear cache and temporary files
Update drivers for hardware components
Increase RAM if possible
Disable unnecessary startup programs
Defragment hard drive
Check for overheating and clean the system if necessary
VGA stands for Video Graphics Array.
VGA is a standard video connection used to connect a computer to a monitor or display.
It is an analog video signal that carries red, green, and blue color information.
VGA cables have 15 pins and are commonly used for older computer systems.
VGA cables are gradually being replaced by digital connections like HDMI and DisplayPort.
CMOS stands for Complementary Metal-Oxide-Semiconductor.
CMOS is a type of semiconductor technology used in microprocessors, microcontrollers, and other digital logic circuits.
It is known for its low power consumption and high noise immunity.
CMOS is commonly used in devices such as computers, smartphones, and digital cameras.
The CMOS battery on a computer motherboard is responsible for maintaining the system clock and o...
CMOS is a type of semiconductor technology.
CMOS stands for Complementary Metal-Oxide-Semiconductor.
It is widely used in digital circuits and microprocessors.
It consumes very low power and generates less heat compared to other technologies.
Examples of CMOS-based devices include smartphones, laptops, and digital cameras.
BIOS stands for Basic Input/Output System. It is a firmware that initializes hardware components during boot-up and provides a runtime interface for operating systems.
BIOS is responsible for performing a Power-On Self Test (POST) to check if all hardware components are functioning properly.
It provides a runtime interface for the operating system to communicate with the hardware components.
BIOS settings can be accessed ...
CPU stands for Central Processing Unit, which is the primary component of a computer that performs most of the processing.
CPU is also known as the brain of the computer
It is responsible for executing instructions and performing calculations
CPU speed is measured in GHz
Examples of popular CPU brands include Intel and AMD
I applied via Company Website and was interviewed in Dec 2021. There were 5 interview rounds.
Active Directory is a directory service developed by Microsoft for Windows domain networks.
It stores information about network resources such as computers, users, and groups.
It provides authentication and authorization services for Windows-based computers.
It allows administrators to manage network resources from a central location.
It uses a hierarchical structure of domains, trees, and forests to organize network resou...
To judge RAM faulty, run memory diagnostics and check for errors.
Run memory diagnostics software like Memtest86+ or Windows Memory Diagnostic
Check for errors in the diagnostic report
Test each RAM module individually to identify the faulty one
Look for symptoms like frequent crashes, blue screens, and system freezes
Ad work refers to the process of creating and managing advertisements for a company or product.
Ad work involves researching target audiences and creating compelling ad copy and visuals.
It also includes selecting the appropriate advertising channels, such as social media or print media.
Ad work requires analyzing the effectiveness of ads and making adjustments as needed.
Examples of ad work include creating a TV commercia...
A hub is a simple device that connects multiple devices in a network. A switch is a more advanced device that directs data to specific devices. A router connects multiple networks and directs data between them.
A hub operates at the physical layer of the OSI model, while a switch operates at the data link layer.
A hub broadcasts data to all devices connected to it, while a switch sends data only to the device it is inten...
VPN is a secure way to access a private network remotely over the internet.
VPN stands for Virtual Private Network
It encrypts the data transmitted over the internet
It allows remote access to a private network
It provides security and privacy to the users
Examples of VPNs are OpenVPN, Cisco AnyConnect, etc.
The default size of a PST file varies depending on the version of Outlook.
In Outlook 2003 and earlier, the default size limit is 2GB.
In Outlook 2007 and 2010, the default size limit is 20GB.
In Outlook 2013 and later, the default size limit is 50GB.
The size limit can be changed by modifying the registry or using third-party tools.
DNS resolves domain names to IP addresses, while DHCP assigns IP addresses to devices on a network.
DNS stands for Domain Name System and is responsible for translating domain names into IP addresses.
DHCP stands for Dynamic Host Configuration Protocol and is responsible for assigning IP addresses to devices on a network.
DNS is used to locate resources on a network, while DHCP is used to manage IP addresses and network c...
IP range refers to a set of IP addresses that fall within a specific numerical range.
IP range is defined by a starting IP address and an ending IP address
It is used to identify a group of devices on a network
CIDR notation is commonly used to represent IP ranges, such as 192.168.0.0/24
IP ranges can be used for security purposes, such as firewall rules or access control lists
There are 7 layers in the OSI model. Layer names are Physical, Data Link, Network, Transport, Session, Presentation, and Application.
The OSI model has 7 layers.
The layers are Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with adjacent layers.
The layers are organized in a hierarchical manner.
Examples of protocols at each layer include ...
I applied via Naukri.com and was interviewed in Jun 2021. There was 1 interview round.
I applied via Walk-in and was interviewed before Jul 2021. There were 3 interview rounds.
There were few questions logical and reasoning
I applied via Recruitment Consulltant and was interviewed before Oct 2023. There were 2 interview rounds.
OST is an offline Outlook data file used by Exchange Server, while PST is a personal storage file used by Outlook for POP3, IMAP, and web-based mail accounts.
OST is used by Exchange Server to store a copy of mailbox data on the local computer.
PST is used by Outlook to store emails, contacts, calendar items, and other data for POP3, IMAP, and web-based mail accounts.
OST files are synchronized with the Exchange Server wh...
OS manages the overall operation of a computer system, while Device Manager manages hardware devices connected to the system.
OS controls the overall operation of a computer system, including managing resources, running applications, and providing user interface.
Device Manager is a component of the OS that manages hardware devices connected to the system, allowing users to view and control device settings.
Examples: Wind...
I have a Bachelor's degree in Computer Science and 3 years of experience in desktop support.
Bachelor's degree in Computer Science
3 years of experience in desktop support
I have 5 years of experience in Desktop Support roles.
5 years of experience in providing technical support for desktop systems
Proficient in troubleshooting hardware and software issues
Experience in setting up and configuring computer systems
Familiarity with operating systems such as Windows and macOS
Strong communication and customer service skills
My preferred salary is negotiable based on the responsibilities and benefits offered.
Salary expectations are based on industry standards and cost of living in the area
Consider the benefits package offered in addition to base salary
Open to discussing salary range based on responsibilities and growth opportunities
posted on 14 Feb 2024
A bad IP address is an IP address that is either invalid, reserved, or blacklisted.
Invalid IP addresses include those that are not in the correct format (e.g. 256.0.0.1)
Reserved IP addresses are those that are not meant to be used on the public internet (e.g. 192.168.0.1)
Blacklisted IP addresses are those that have been identified as sources of malicious activity and are blocked by security measures
based on 3 reviews
Rating in categories
Software Engineer
3.2k
salaries
| ₹3.2 L/yr - ₹12.4 L/yr |
Senior Software Engineer
2k
salaries
| ₹8 L/yr - ₹19.1 L/yr |
QA Engineer
1.1k
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior QA Engineer
809
salaries
| ₹6 L/yr - ₹14.2 L/yr |
System Analyst
738
salaries
| ₹9.6 L/yr - ₹25 L/yr |
TCS
Infosys
Wipro
Tech Mahindra