i
Data Bridge Market Research
Filter interviews by
I applied via Naukri.com and was interviewed in Oct 2021. There were 3 interview rounds.
PST is a personal storage table used by Outlook to store email data while OST is an offline storage table used for cached Exchange mode.
PST is a file format used by Microsoft Outlook to store email data on a local computer
OST is an offline storage table used for cached Exchange mode in Outlook
PST files can be imported and exported while OST files cannot
PST files can be accessed even without an internet connection while...
Workgroup is a peer-to-peer network where each computer has its own security settings. Domain is a centralized network managed by a server.
Workgroup is suitable for small networks with few computers
Domain is suitable for large networks with many computers
In a workgroup, each computer has its own user accounts and passwords
In a domain, user accounts and passwords are managed centrally by a server
Workgroup does not have ...
Troubleshooting steps for a slow PC
Check for malware and viruses
Free up disk space
Uninstall unnecessary programs
Update drivers and software
Check for hardware issues
Troubleshooting steps for a PC that won't turn on
Check power source and cables
Check power supply unit
Check motherboard and CPU
Check RAM and other components
Check for any error messages or beeps
Try booting in safe mode
Try a different power outlet
Check for any loose connections
A server is a computer or system that provides resources, services, or functionality to other computers or clients.
A server is a computer or system that hosts and manages data, applications, or services.
Servers can provide various types of services such as file sharing, email, web hosting, database management, etc.
Servers are designed to be reliable, secure, and scalable to handle multiple client requests.
Examples of s...
Troubleshooting steps for PC network issues
Check physical connections
Restart the router/modem
Check network settings
Run network troubleshooter
Check for malware/virus
Update network drivers
Reset network settings
A ticketing tool is a software used to manage and track customer support requests. Encryption is the process of converting data into a code to prevent unauthorized access.
Ticketing tools help IT engineers manage and prioritize support requests
Encryption is used to protect sensitive data from unauthorized access
Common encryption methods include AES, RSA, and SHA
Encryption is used in various applications such as online b
Configuring Outlook involves setting up email accounts, adding contacts, and customizing settings.
Open Outlook and click on File
Click on Add Account and enter your email address and password
Follow the prompts to complete the setup process
To add contacts, click on People and then New Contact
To customize settings, click on File and then Options
Data backup of laptop/pc can be done using external hard drives, cloud storage, or backup software.
Use an external hard drive to manually backup important files
Use cloud storage services like Google Drive or Dropbox to backup files online
Use backup software like Acronis True Image or EaseUS Todo Backup to automate the backup process
Create a backup schedule to ensure regular backups are performed
Test the backup to ensur
Windows 10 has improved features and performance compared to Windows 7.
Windows 10 has a more user-friendly interface
Windows 10 has better security features
Windows 10 has improved performance and faster boot times
Windows 10 has a virtual desktop feature
Windows 10 has a voice assistant, Cortana
Windows 10 has a built-in game mode
Windows 10 has a touch-friendly interface
Windows 10 has a new browser, Microsoft Edge
Virtualization is the creation of a virtual version of something, such as an operating system, a server, a storage device, or network resources.
Virtualization allows multiple operating systems to run on a single physical machine.
It enables better utilization of hardware resources and reduces costs.
Examples of virtualization technologies include VMware, Hyper-V, and VirtualBox.
Ping and ipconfig are two important commands used in networking to troubleshoot and diagnose network issues.
Ping is used to test the connectivity between two devices on a network by sending packets of data and receiving a response.
Ipconfig is used to view the IP address, subnet mask, and default gateway of a device on a network.
Ping can also be used to determine the response time of a device on a network.
Ipconfig can b...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic.
It acts as a barrier between a trusted internal network and an untrusted external network.
It can be hardware, software, or a combination of both.
It can be configured to block or allow traffic based on predefined rules.
Examples include Cisco ASA, Fortinet FortiGate, and pfSense.
Top trending discussions
based on 1 review
Rating in categories
Research Analyst
74
salaries
| ₹3 L/yr - ₹6.5 L/yr |
Web Marketing Executive
40
salaries
| ₹2 L/yr - ₹4.2 L/yr |
Senior Research Analyst
16
salaries
| ₹4.8 L/yr - ₹8 L/yr |
Research Associate
12
salaries
| ₹3 L/yr - ₹3.5 L/yr |
Market Research Analyst
12
salaries
| ₹3.4 L/yr - ₹6 L/yr |
Frost & Sullivan
International Data Corporation
Gartner
Nielsen