Data Bridge Market Research
10+ Eshaan Logistics Interview Questions and Answers
Q1. Troubleshooting steps when pc not getting on
Troubleshooting steps for a PC that won't turn on
Check power source and cables
Check power supply unit
Check motherboard and CPU
Check RAM and other components
Check for any error messages or beeps
Try booting in safe mode
Try a different power outlet
Check for any loose connections
Q2. Troubleshooting steps when pc network not working
Troubleshooting steps for PC network issues
Check physical connections
Restart the router/modem
Check network settings
Run network troubleshooter
Check for malware/virus
Update network drivers
Reset network settings
Q3. Troubleshooting steps when pc get slow
Troubleshooting steps for a slow PC
Check for malware and viruses
Free up disk space
Uninstall unnecessary programs
Update drivers and software
Check for hardware issues
Q4. What is ticketing tool and encryption
A ticketing tool is a software used to manage and track customer support requests. Encryption is the process of converting data into a code to prevent unauthorized access.
Ticketing tools help IT engineers manage and prioritize support requests
Encryption is used to protect sensitive data from unauthorized access
Common encryption methods include AES, RSA, and SHA
Encryption is used in various applications such as online banking, email, and messaging services
Q5. How to take data backup of laptop/pc.
Data backup of laptop/pc can be done using external hard drives, cloud storage, or backup software.
Use an external hard drive to manually backup important files
Use cloud storage services like Google Drive or Dropbox to backup files online
Use backup software like Acronis True Image or EaseUS Todo Backup to automate the backup process
Create a backup schedule to ensure regular backups are performed
Test the backup to ensure it can be restored in case of data loss
Q6. What is virtulization
Virtualization is the creation of a virtual version of something, such as an operating system, a server, a storage device, or network resources.
Virtualization allows multiple operating systems to run on a single physical machine.
It enables better utilization of hardware resources and reduces costs.
Examples of virtualization technologies include VMware, Hyper-V, and VirtualBox.
Q7. How to configure outlook
Configuring Outlook involves setting up email accounts, adding contacts, and customizing settings.
Open Outlook and click on File
Click on Add Account and enter your email address and password
Follow the prompts to complete the setup process
To add contacts, click on People and then New Contact
To customize settings, click on File and then Options
Q8. Features of windows 10. Windows 10 vs 7
Windows 10 has improved features and performance compared to Windows 7.
Windows 10 has a more user-friendly interface
Windows 10 has better security features
Windows 10 has improved performance and faster boot times
Windows 10 has a virtual desktop feature
Windows 10 has a voice assistant, Cortana
Windows 10 has a built-in game mode
Windows 10 has a touch-friendly interface
Windows 10 has a new browser, Microsoft Edge
Q9. Use of ping and ipconfig command
Ping and ipconfig are two important commands used in networking to troubleshoot and diagnose network issues.
Ping is used to test the connectivity between two devices on a network by sending packets of data and receiving a response.
Ipconfig is used to view the IP address, subnet mask, and default gateway of a device on a network.
Ping can also be used to determine the response time of a device on a network.
Ipconfig can be used to release and renew IP addresses, flush DNS cache,...read more
Q10. Difference between pst and ost
PST is a personal storage table used by Outlook to store email data while OST is an offline storage table used for cached Exchange mode.
PST is a file format used by Microsoft Outlook to store email data on a local computer
OST is an offline storage table used for cached Exchange mode in Outlook
PST files can be imported and exported while OST files cannot
PST files can be accessed even without an internet connection while OST files require a connection to the Exchange server
PST ...read more
Q11. difference between workgroup and domain
Workgroup is a peer-to-peer network where each computer has its own security settings. Domain is a centralized network managed by a server.
Workgroup is suitable for small networks with few computers
Domain is suitable for large networks with many computers
In a workgroup, each computer has its own user accounts and passwords
In a domain, user accounts and passwords are managed centrally by a server
Workgroup does not have a centralized authentication system
Domain has a centralize...read more
Q12. What is firewall
A firewall is a network security system that monitors and controls incoming and outgoing network traffic.
It acts as a barrier between a trusted internal network and an untrusted external network.
It can be hardware, software, or a combination of both.
It can be configured to block or allow traffic based on predefined rules.
Examples include Cisco ASA, Fortinet FortiGate, and pfSense.
Reviews
Interviews
Salaries
Users/Month