Filter interviews by
Check if the data source is accessible and refresh schedule is set up correctly.
Verify if the data source is accessible from the Power BI service.
Check if the refresh schedule is set up correctly.
Ensure that the credentials used for refreshing the report are correct.
Check if there are any errors or warnings in the refresh history.
Try refreshing the report manually from the Power BI service.
Check if there are any i...
Public and private keys are used for secure communication and encryption.
Public key is used for encryption and can be shared with anyone.
Private key is used for decryption and should be kept secret.
They are used in various security protocols like SSL, SSH, and PGP.
Example: When you visit a website with SSL, your browser uses the website's public key to encrypt data, which can only be decrypted by the website's pri...
Encoders and decoders are used to convert data from one format to another.
Encoders convert analog signals to digital signals.
Decoders convert digital signals to analog signals.
Encoders are used in devices like cameras, sensors, and audio equipment.
Decoders are used in devices like televisions, radios, and DVD players.
Code for creating a node in linked list
Create a struct for the node with data and pointer to next node
Allocate memory for the node using malloc()
Assign data to the node
Assign the next pointer to NULL or the next node in the list
What people are saying about Microsoft Corporation
Difference between #define and const
Both are used to define constants
#define is a preprocessor directive and replaces all occurrences of the defined identifier with the given value
const is a keyword and creates a read-only variable
const is type-safe and has better scope control than #define
Example: #define PI 3.14 vs const float PI = 3.14;
Example: #define MAX(a,b) ((a)>(b)?(a):(b)) vs const int MAX = (a)>(b)?(a):(...
Steps to follow when a customer reports inability to edit in Microsoft Word
Ask the customer if they are receiving any error messages
Check if the document is in read-only mode
Check if the customer has the necessary permissions to edit the document
Check if the customer's version of Microsoft Word is up to date
Try repairing or reinstalling Microsoft Word
If all else fails, escalate the issue to a higher level of suppo...
B-Tree is a self-balancing tree data structure with multiple child nodes and is used for efficient disk access.
B-Tree has a root node, internal nodes, and leaf nodes.
Each node can have multiple child nodes.
The number of child nodes is fixed for a given B-Tree.
B-Tree is self-balancing, which means that the height of the tree is minimized.
B-Tree is used for efficient disk access as it reduces the number of disk acce...
One cryptographic technique is RSA, which uses public and private keys to encrypt and decrypt data.
RSA stands for Rivest-Shamir-Adleman, named after its creators.
It is a widely used asymmetric encryption algorithm.
RSA uses a public key to encrypt data and a private key to decrypt it.
The security of RSA is based on the difficulty of factoring large prime numbers.
RSA is used in various applications such as secure co...
An IP address is a unique identifier for a device on a network, a server is a computer or software that provides services to other devices, troubleshooting involves identifying and resolving issues.
An IP address is a numerical label assigned to each device connected to a computer network, used for communication and identification.
A server is a computer or software that provides services to other devices on the net...
Mobile Device Management (MDM) is a system that allows organizations to manage and secure mobile devices used by employees.
MDM software enables remote management of devices, including configuration, security policies, and app distribution.
It helps ensure data security by enforcing encryption, passcode requirements, and remote wipe capabilities.
MDM solutions can also track device location, monitor usage, and provid...
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Managed Identity is a feature in Azure Active Directory that provides an identity for applications to use when connecting to resources.
Managed Identity eliminates the need to store credentials in code or configuration files.
It allows applications to authenticate to Azure services without needing to manage credentials.
Managed Identity can be assigned to Azure resources like Virtual Machines, App Services, and Functions.
...
I am a dedicated Technical Support Engineer with 5 years of experience in troubleshooting hardware and software issues.
5 years of experience in technical support
Proficient in troubleshooting hardware and software issues
Strong communication and problem-solving skills
Certified in IT support
Experience working with various operating systems such as Windows and Linux
Day to day activities of a Technical Support Engineer involve troubleshooting technical issues, providing customer support, and documenting solutions.
Troubleshooting technical issues reported by customers
Providing customer support via phone, email, or chat
Documenting solutions and creating knowledge base articles
Collaborating with other teams to resolve complex issues
Testing software updates and patches before deployme...
To deploy a Virtual Machine, you would need to use a virtualization platform and follow specific steps to create and configure the VM.
Choose a virtualization platform such as VMware, Hyper-V, or VirtualBox.
Create a new virtual machine and specify settings such as CPU, memory, storage, and network.
Install an operating system on the virtual machine.
Configure any additional settings or software needed for the VM to functi...
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is a decentralized system used to translate domain names to IP addresses
It helps users access websites using easy-to-remember domain names instead of complex IP addresses
DNS servers store records like A, CNAME, MX, and TXT to provide various types of information
DNS resolution process involves recursive and iterative queries to find the...
I would start by checking network connectivity, firewall settings, and remote desktop settings.
Check network connectivity to ensure the device is connected to the network
Verify firewall settings to ensure RDP traffic is allowed
Check remote desktop settings on the target device to ensure it is enabled
Verify if the target device is reachable and responding to ping requests
I applied via Job Portal and was interviewed before Nov 2023. There were 2 interview rounds.
Autodiscover is a feature in Microsoft Exchange that automatically configures user settings for email clients.
Automatically configures user settings for email clients
Uses a user's email address to find the appropriate Exchange server settings
Helps users easily set up their email accounts on various devices
Free busy in Outlook refers to the availability status of a user's calendar for scheduling meetings.
Free busy information is used to check when a user is available for a meeting.
Outlook uses this information to show when a user is busy or free during specific time slots.
Users can set their availability status as busy, free, tentative, or out of office.
Free busy information is crucial for scheduling meetings efficiently...
I appeared for an interview before May 2024, where I was asked the following questions.
I applied via Naukri.com and was interviewed before Feb 2023. There were 5 interview rounds.
Mobile Device Management (MDM) is a system that allows organizations to manage and secure mobile devices used by employees.
MDM software enables remote management of devices, including configuration, security policies, and app distribution.
It helps ensure data security by enforcing encryption, passcode requirements, and remote wipe capabilities.
MDM solutions can also track device location, monitor usage, and provide ins...
I applied via Referral and was interviewed before Mar 2023. There were 3 interview rounds.
An IP address is a unique identifier for a device on a network, a server is a computer or software that provides services to other devices, troubleshooting involves identifying and resolving issues.
An IP address is a numerical label assigned to each device connected to a computer network, used for communication and identification.
A server is a computer or software that provides services to other devices on the network,...
Explain importance of logs, offer alternative solutions, emphasize need for troubleshooting
Explain the importance of logs in diagnosing and resolving technical issues
Offer alternative solutions such as remote troubleshooting or guiding the customer through the process
Emphasize the need for collaboration and transparency to effectively resolve the issue
I appeared for an interview before May 2022.
Our favourite topic you have speak fluei for 5mins
Some of the top questions asked at the Microsoft Corporation Technical Support Engineer interview -
based on 11 interview experiences
Difficulty level
Duration
based on 36 reviews
Rating in categories
Software Engineer
2.5k
salaries
| ₹24.9 L/yr - ₹44 L/yr |
Senior Software Engineer
1.4k
salaries
| ₹37.5 L/yr - ₹75.7 L/yr |
Software Engineer2
1.2k
salaries
| ₹33 L/yr - ₹60 L/yr |
Software Developer
1.1k
salaries
| ₹23.9 L/yr - ₹40 L/yr |
Support Engineer
608
salaries
| ₹14.4 L/yr - ₹24.7 L/yr |
Amazon
Deloitte
TCS