i
Experience.com
Filter interviews by
On average, I handle around 15-20 cases per day.
I prioritize cases based on urgency and complexity
I aim to provide timely and effective solutions to each case
Examples: troubleshooting network issues, resolving software errors, assisting with hardware installations
Prioritize based on urgency, impact, and complexity.
Assess urgency of each case - prioritize critical issues first
Consider impact on customers or business operations
Evaluate complexity of each case - tackle simpler cases first if possible
Communicate with stakeholders to set expectations and manage workload
Regularly review and adjust priorities as needed
I would listen to their concerns, empathize with them, offer solutions, and follow up to ensure their satisfaction.
Listen actively to understand the customer's concerns
Empathize with the customer and acknowledge their feelings
Offer solutions or alternatives to address their disappointment
Follow up with the customer to ensure their satisfaction
Maintain a positive and professional attitude throughout the interaction
I successfully resolved a customer's anger by listening to their concerns, offering solutions, and providing exceptional customer service.
Listened actively to the customer's complaints and empathized with their frustration.
Apologized sincerely for the inconvenience caused and took ownership of the issue.
Offered a solution that addressed the customer's specific concerns and needs.
Provided exceptional customer service by...
posted on 6 Jul 2024
The test is about grammatical knowledge.
Ethernet is a networking technology commonly used for connecting devices in a local area network (LAN).
Ethernet is a system for connecting a number of computer systems to form a local area network (LAN).
It uses a protocol called CSMA/CD (Carrier Sense Multiple Access with Collision Detection) to manage traffic on the network.
Ethernet cables are commonly used to physically connect devices to a network switch or router.
E...
A network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another to share data and resources.
Networks can be wired or wireless
Common types of networks include LAN (Local Area Network) and WAN (Wide Area Network)
Networks can be private (intranet) or public (internet)
Examples of network devices include routers, switches, and modems
I applied via LinkedIn and was interviewed in Sep 2024. There was 1 interview round.
I applied via Walk-in and was interviewed in Dec 2023. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in Nov 2023. There was 1 interview round.
HDFC Bank recently announced a partnership with Mastercard to launch a co-branded credit card.
HDFC Bank partnered with Mastercard to launch a co-branded credit card
The new credit card offers exclusive benefits and rewards for customers
This partnership aims to enhance customer experience and loyalty
posted on 28 Jul 2023
I applied via Job Portal and was interviewed in Jan 2023. There were 2 interview rounds.
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language
It is used to communicate with databases to retrieve, insert, update, and delete data
Some subtypes of SQL include MySQL, PostgreSQL, Oracle SQL, and Microsoft SQL Server
sed command is a stream editor for filtering and transforming text, while find command is used to search for files in a directory hierarchy.
sed command is used to perform text transformations on an input stream or file
find command is used to search for files in a directory hierarchy based on various criteria
sed command can be used to replace text, delete lines, or perform other text manipulations
find command can search...
PK is Primary Key which uniquely identifies a record in a table, while FK is Foreign Key which establishes a relationship between two tables.
PK ensures uniqueness of records in a table
FK establishes a relationship between tables
PK is used to enforce entity integrity, while FK is used to enforce referential integrity
Shell scraping is the process of extracting data from websites using automated tools or scripts.
Shell scraping involves writing scripts to automate the process of extracting data from websites
Tools like BeautifulSoup in Python or Scrapy can be used for shell scraping
Shell scraping is commonly used for web scraping and data mining purposes
The uptime command in Linux displays the current time, how long the system has been running, and the number of users currently logged in.
Displays the current time
Shows how long the system has been running
Indicates the number of users currently logged in
I applied via Recruitment Consulltant and was interviewed in Oct 2022. There were 3 interview rounds.
I applied via Company Website and was interviewed in Aug 2022. There were 3 interview rounds.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewalls can be hardware or software-based
They can be configured to block or allow traffic based on IP addresses, ports, protocols, and other criteria
Firewalls can also be used to create virtual private networks (VPNs) for secure remote access
IP binding is the process of associ...
I m best computer hadware and network troubleshooting team leader
Some of the top questions asked at the Experience.com Technical Support Specialist 2 interview -
Software Developer
7
salaries
| ₹2.5 L/yr - ₹12.2 L/yr |
Associate Product Manager
7
salaries
| ₹11 L/yr - ₹13 L/yr |
Customer Support Specialist
7
salaries
| ₹5 L/yr - ₹7.5 L/yr |
Data Engineer
6
salaries
| ₹4 L/yr - ₹14.2 L/yr |
Software Engineer
5
salaries
| ₹4 L/yr - ₹7.9 L/yr |
MakeMyTrip
Yatra
Cleartrip
Goibibo