Filter interviews by
I applied via Referral and was interviewed in Aug 2021. There were 3 interview rounds.
Top trending discussions
posted on 1 Dec 2022
I applied via Naukri.com and was interviewed in Nov 2022. There were 2 interview rounds.
Hostfile is a plain text file that maps hostnames to IP addresses.
Hostfile is used by the operating system to resolve domain names to IP addresses.
It can be edited manually to add or remove entries.
It can also be used to block access to certain websites by redirecting them to a different IP address.
Hostfile is located in different directories depending on the operating system. For example, in Windows it is located in C...
The process of migrating to Office 365 involves planning, preparation, and execution.
Assess current infrastructure and identify migration goals
Prepare for migration by ensuring compatibility and setting up necessary accounts
Execute migration by transferring data and configuring settings
Test and verify successful migration
Train users on new system and provide ongoing support
Examples of migration tools include Microsoft'...
posted on 15 Oct 2024
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There were 3 interview rounds.
My future goal is to become a senior Desktop Support Engineer and achieve industry certifications.
Obtain industry certifications such as CompTIA A+ and Microsoft Certified Desktop Support Technician (MCDST)
Gain experience in troubleshooting complex technical issues
Lead projects to improve efficiency and productivity in the IT department
DHCP stands for Dynamic Host Configuration Protocol. It is a network management protocol used to automatically assign IP addresses to devices on a network.
DHCP assigns IP addresses to devices on a network
It also provides other network configuration information such as subnet mask and default gateway
DHCP servers lease IP addresses to devices for a specific period of time
DHCP helps in reducing manual configuration errors
To boot a new laptop, you need to press the power button and wait for the operating system to load.
Press the power button to turn on the laptop
Wait for the manufacturer's logo to appear on the screen
The operating system will start loading
Enter any necessary login credentials if prompted
I applied via campus placement at Veer Bahadur Singh Purvanchal University (VBSPU) and was interviewed in Sep 2024. There was 1 interview round.
I applied via LinkedIn and was interviewed in May 2024. There was 1 interview round.
posted on 14 Nov 2024
I applied via Naukri.com and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated and experienced Desktop Support Engineer with a strong background in troubleshooting and resolving technical issues.
Over 5 years of experience in providing desktop support to end users
Proficient in diagnosing and resolving hardware and software issues
Skilled in setting up and configuring desktops, laptops, and peripherals
Excellent customer service and communication skills
Certified in CompTIA A+ and Mic...
The DORA process stands for Discover, Offer, Request, and Acknowledge. It is a method used in DHCP to assign IP addresses to devices.
Discover: Device sends a broadcast message to discover DHCP servers on the network
Offer: DHCP server responds with an IP address offer to the device
Request: Device requests the offered IP address from the DHCP server
Acknowledge: DHCP server acknowledges the request and assigns the IP addr
An incident is an unplanned interruption to an IT service or reduction in the quality of an IT service. A service request is a formal request from a user for something to be provided.
An incident is a disruption to normal operation that requires immediate attention to restore service.
A service request is a formal request from a user for information, advice, a standard change, or access to a service.
Examples: Incident -
The outlook file responsible for taking backup is the PST file.
PST file stores emails, contacts, calendar events, and other data in Outlook.
Users can manually backup their PST file by exporting it from Outlook.
Third-party backup software can also be used to automatically backup the PST file.
SMTP - 25, POP - 110, IMAP - 143
SMTP uses port 25 for sending emails
POP uses port 110 for receiving emails
IMAP uses port 143 for accessing emails
posted on 30 Dec 2024
I was interviewed in Oct 2022.
RAM is a volatile memory used for temporary storage while EEPROM is a non-volatile memory used for permanent storage.
RAM stands for Random Access Memory and is used for temporary storage of data and instructions while the computer is running.
EEPROM stands for Electrically Erasable Programmable Read-Only Memory and is used for permanent storage of data that needs to be retained even when the power is turned off.
RAM is v...
To resolve system slow issue, check for malware, clear cache, update drivers, and increase RAM.
Scan for malware and viruses using antivirus software
Clear cache and temporary files
Update drivers for hardware components
Increase RAM if possible
Disable unnecessary startup programs
Defragment hard drive
Check for overheating and clean the system if necessary
VGA stands for Video Graphics Array.
VGA is a standard video connection used to connect a computer to a monitor or display.
It is an analog video signal that carries red, green, and blue color information.
VGA cables have 15 pins and are commonly used for older computer systems.
VGA cables are gradually being replaced by digital connections like HDMI and DisplayPort.
CMOS stands for Complementary Metal-Oxide-Semiconductor.
CMOS is a type of semiconductor technology used in microprocessors, microcontrollers, and other digital logic circuits.
It is known for its low power consumption and high noise immunity.
CMOS is commonly used in devices such as computers, smartphones, and digital cameras.
The CMOS battery on a computer motherboard is responsible for maintaining the system clock and o...
CMOS is a type of semiconductor technology.
CMOS stands for Complementary Metal-Oxide-Semiconductor.
It is widely used in digital circuits and microprocessors.
It consumes very low power and generates less heat compared to other technologies.
Examples of CMOS-based devices include smartphones, laptops, and digital cameras.
BIOS stands for Basic Input/Output System. It is a firmware that initializes hardware components during boot-up and provides a runtime interface for operating systems.
BIOS is responsible for performing a Power-On Self Test (POST) to check if all hardware components are functioning properly.
It provides a runtime interface for the operating system to communicate with the hardware components.
BIOS settings can be accessed ...
CPU stands for Central Processing Unit, which is the primary component of a computer that performs most of the processing.
CPU is also known as the brain of the computer
It is responsible for executing instructions and performing calculations
CPU speed is measured in GHz
Examples of popular CPU brands include Intel and AMD
I applied via Company Website and was interviewed in Dec 2021. There were 5 interview rounds.
Active Directory is a directory service developed by Microsoft for Windows domain networks.
It stores information about network resources such as computers, users, and groups.
It provides authentication and authorization services for Windows-based computers.
It allows administrators to manage network resources from a central location.
It uses a hierarchical structure of domains, trees, and forests to organize network resou...
To judge RAM faulty, run memory diagnostics and check for errors.
Run memory diagnostics software like Memtest86+ or Windows Memory Diagnostic
Check for errors in the diagnostic report
Test each RAM module individually to identify the faulty one
Look for symptoms like frequent crashes, blue screens, and system freezes
Ad work refers to the process of creating and managing advertisements for a company or product.
Ad work involves researching target audiences and creating compelling ad copy and visuals.
It also includes selecting the appropriate advertising channels, such as social media or print media.
Ad work requires analyzing the effectiveness of ads and making adjustments as needed.
Examples of ad work include creating a TV commercia...
A hub is a simple device that connects multiple devices in a network. A switch is a more advanced device that directs data to specific devices. A router connects multiple networks and directs data between them.
A hub operates at the physical layer of the OSI model, while a switch operates at the data link layer.
A hub broadcasts data to all devices connected to it, while a switch sends data only to the device it is inten...
VPN is a secure way to access a private network remotely over the internet.
VPN stands for Virtual Private Network
It encrypts the data transmitted over the internet
It allows remote access to a private network
It provides security and privacy to the users
Examples of VPNs are OpenVPN, Cisco AnyConnect, etc.
The default size of a PST file varies depending on the version of Outlook.
In Outlook 2003 and earlier, the default size limit is 2GB.
In Outlook 2007 and 2010, the default size limit is 20GB.
In Outlook 2013 and later, the default size limit is 50GB.
The size limit can be changed by modifying the registry or using third-party tools.
DNS resolves domain names to IP addresses, while DHCP assigns IP addresses to devices on a network.
DNS stands for Domain Name System and is responsible for translating domain names into IP addresses.
DHCP stands for Dynamic Host Configuration Protocol and is responsible for assigning IP addresses to devices on a network.
DNS is used to locate resources on a network, while DHCP is used to manage IP addresses and network c...
IP range refers to a set of IP addresses that fall within a specific numerical range.
IP range is defined by a starting IP address and an ending IP address
It is used to identify a group of devices on a network
CIDR notation is commonly used to represent IP ranges, such as 192.168.0.0/24
IP ranges can be used for security purposes, such as firewall rules or access control lists
There are 7 layers in the OSI model. Layer names are Physical, Data Link, Network, Transport, Session, Presentation, and Application.
The OSI model has 7 layers.
The layers are Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with adjacent layers.
The layers are organized in a hierarchical manner.
Examples of protocols at each layer include ...
I applied via Referral and was interviewed in Aug 2021. There were 2 interview rounds.
Senior Software Engineer
1.7k
salaries
| ₹6.7 L/yr - ₹28 L/yr |
Consultant Specialist
1.1k
salaries
| ₹9.9 L/yr - ₹32 L/yr |
Software Engineer
930
salaries
| ₹4.5 L/yr - ₹14 L/yr |
Senior Consultant Specialist
589
salaries
| ₹13 L/yr - ₹44 L/yr |
Lead Business Analyst
143
salaries
| ₹18 L/yr - ₹40 L/yr |
Accenture
Capgemini
HCLTech
Teleperformance