Precision Infomatic M Pvt Ltd
50+ Paanduv Applications Interview Questions and Answers
Q1. Difference between HTTP and HTTPS, What is UDP and TCP, Port numbers of network protocols, What is Bitlocker , Outlook Configuration step by step etc
Questions related to networking and security protocols, Bitlocker and Outlook configuration.
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption
TCP is a connection-oriented protocol while UDP is connectionless
Common port numbers include 80 for HTTP, 443 for HTTPS, 25 for SMTP, and 110 for POP3
Bitlocker is a full disk encryption feature in Windows
Outlook configuration involves setting up email accounts, server settings, and security options
Q2. What is the difference between RAM and ROM?
RAM is volatile memory used for temporary storage while ROM is non-volatile memory used for permanent storage.
RAM stands for Random Access Memory while ROM stands for Read Only Memory.
RAM is used for temporary storage of data and program instructions while ROM is used for permanent storage of data and program instructions.
RAM is volatile memory which means it loses its contents when power is turned off while ROM is non-volatile memory which means it retains its contents even ...read more
Q3. What is BSOD? How do you troubleshoot it?
BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a system error occurs.
BSOD is caused by hardware or software issues
Troubleshoot by checking for recently installed hardware or software
Check for driver updates or rollbacks
Run system diagnostics or memory tests
Check for overheating or hardware failures
Collect error codes and search for solutions online
Q4. What does DHCP stand for and what is its purpose?
DHCP stands for Dynamic Host Configuration Protocol. It is used to automatically assign IP addresses to devices on a network.
DHCP is a network protocol that allows devices to obtain IP addresses automatically.
It eliminates the need for manual IP address configuration.
DHCP servers can also provide additional network configuration information, such as subnet mask and default gateway.
DHCP leases are temporary and must be renewed periodically.
Example: When a new device joins a ne...read more
Q5. What are the types of the operating system or O.S?
There are three types of operating systems: Batch Operating System, Time-Sharing Operating System, and Real-Time Operating System.
Batch Operating System: processes similar jobs in batches, without any user interaction. Example: COBOL
Time-Sharing Operating System: allows multiple users to access the computer simultaneously. Example: UNIX
Real-Time Operating System: processes data as it comes in, without any delay. Example: VxWorks
Q6. What is the SMTP server or POP server?
SMTP and POP are email protocols used for sending and receiving emails respectively.
SMTP stands for Simple Mail Transfer Protocol and is used for sending emails.
POP stands for Post Office Protocol and is used for receiving emails.
SMTP server is responsible for sending emails from one email client to another.
POP server is responsible for receiving emails from the email server and delivering them to the email client.
Examples of SMTP servers include Gmail's SMTP server smtp.gmai...read more
Q7. What is the ISP? Which ISP you use? Give some ISP name?
ISP stands for Internet Service Provider. It is a company that provides internet access to customers.
Some popular ISPs are Comcast, AT&T, Verizon, and Spectrum.
ISPs offer different types of internet connections such as DSL, cable, and fiber optic.
ISPs may also offer additional services such as email, web hosting, and virtual private networks (VPNs).
Q8. What will you check if your computer dont connect with intranet or internet?
I will check network connectivity, DNS settings, firewall, and proxy settings.
Check if other devices are able to connect to the network
Check if the network cable is properly connected
Check if the DNS settings are correct
Check if the firewall is blocking the connection
Check if the proxy settings are configured correctly
Q9. What is active directory?
Active Directory is a directory service developed by Microsoft for Windows domain networks.
It stores information about network resources and users in a centralized database.
It provides authentication and authorization services for Windows-based computers.
It allows administrators to manage and control access to network resources.
It uses a hierarchical structure of domains, trees, and forests to organize network resources.
It supports group policies, which allow administrators t...read more
Q10. Which is the latest OS today? Which is the latest application for office tools today?
The latest OS is Windows 11. The latest application for office tools is Microsoft Office 2021.
The latest OS released by Microsoft is Windows 11.
Windows 11 was released on October 5, 2021.
The latest application for office tools is Microsoft Office 2021.
Microsoft Office 2021 was released on October 5, 2021.
Microsoft Office 2021 includes updated versions of Word, Excel, PowerPoint, and Outlook.
Q11. How to configure the network printer
Configuring a network printer involves connecting it to the network and installing the necessary drivers.
Connect the printer to the network using an Ethernet cable or Wi-Fi.
Install the printer drivers on the computer(s) that will be using the printer.
Assign a static IP address to the printer to ensure it remains accessible on the network.
Test the printer by printing a test page or document.
Configure any additional settings, such as paper size or duplex printing, as needed.
Q12. What is the difference between MS 365 MS Office 2016?
MS 365 is a cloud-based subscription service while MS Office 2016 is a one-time purchase software.
MS 365 includes cloud-based services such as OneDrive, SharePoint, and Teams
MS Office 2016 is a standalone software with no cloud-based services
MS 365 offers regular updates and new features while MS Office 2016 does not
MS 365 requires a monthly or yearly subscription fee while MS Office 2016 is a one-time purchase
MS 365 allows access to the latest versions of Office applications...read more
Q13. How to join the system into the domain
To join a system into a domain, follow these steps:
Ensure the system is connected to the network
Open System Properties and click on 'Change'
Select 'Domain' and enter the domain name
Enter domain credentials when prompted
Restart the system for changes to take effect
Q14. What DHCP ? What is active Directory ? Explain DNS ? How it Work Service Now ?
DHCP is a network protocol that assigns IP addresses to devices on a network. Active Directory is a directory service used to manage network resources. DNS translates domain names to IP addresses. Service Now is a cloud-based platform for IT service management.
DHCP assigns IP addresses dynamically to devices on a network
Active Directory is a directory service used to manage users, computers, and other network resources
DNS translates domain names to IP addresses to enable comm...read more
Q15. How to resolve dot matrix printer ribbon not rotate issue
To resolve the dot matrix printer ribbon not rotate issue, check for mechanical issues, ensure proper installation, clean the printer, and replace the ribbon if necessary.
Check for any mechanical issues such as jammed or misaligned parts
Ensure that the ribbon is properly installed and aligned with the printer
Clean the printer, including the ribbon cartridge and print head, to remove any dirt or debris that may be causing the issue
If the ribbon is worn out or damaged, replace ...read more
Q16. what about Carrer growth
Career growth is important to me and I believe in continuous learning and development.
I am always looking for opportunities to learn new skills and take on new challenges
I am open to taking on additional responsibilities and leadership roles
I believe in networking and building relationships with colleagues and industry professionals
I am willing to pursue additional education or certifications to enhance my skills and knowledge
Q17. What is the OSI Model ?
The OSI Model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It was developed by the International Organization for Standardization (ISO) in the 1980s.
The model divides the communication process into seven layers, each with its own specific functions.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer interac...read more
Q18. Colour code for crimping RJ 45 connection?
The colour code for crimping RJ45 connection is T-568A or T-568B.
T-568A and T-568B are the two commonly used standards for RJ45 wiring.
T-568A uses green and orange wires for transmitting data, while T-568B uses orange and green wires.
The order of the wires in the connector is important and must follow the correct sequence.
A wiring diagram or guide can be helpful in ensuring the correct colour code is used.
Q19. How to configure the outlook
Configuring Outlook involves adding email accounts, setting up signatures, and customizing settings.
Open Outlook and click on File
Click on Add Account to add email accounts
Go to Options to customize settings and set up signatures
Configure server settings for incoming and outgoing mail
Set up rules to manage incoming emails
Q20. What is the full form of NIC?
NIC stands for Network Interface Card.
NIC is a hardware component that connects a computer to a network.
It allows the computer to communicate with other devices on the network.
NICs can be wired or wireless, and can have different speeds and protocols.
Examples of NIC manufacturers include Intel, Broadcom, and Realtek.
Q21. whats is AD server and how its work?
AD server is a server that runs Active Directory, a directory service that manages network resources and user accounts.
AD server is used to manage network resources and user accounts
It allows for centralized authentication and authorization
It uses a hierarchical structure of domains, trees, and forests
It can be used to manage access to resources such as files, printers, and applications
Examples of AD servers include Microsoft Active Directory and OpenLDAP
Q22. How to add or remove software
To add or remove software, use package management tools like apt-get or yum.
For Linux systems, use package managers like apt-get (Debian-based) or yum (Red Hat-based)
For Windows systems, use the Control Panel or the Settings app to uninstall software
For macOS systems, use the Launchpad or the Applications folder to uninstall software
Consider dependencies and conflicts when adding or removing software
Q23. Windows troubleshooting techniques
Windows troubleshooting techniques involve identifying and resolving issues with the operating system.
Start by checking for error messages or codes
Use Windows Event Viewer to identify potential issues
Check for software conflicts or driver issues
Run Windows Update to ensure system is up to date
Perform system restore or reset as a last resort
Q24. What are protocol used for Storage?
Protocols used for Storage include iSCSI, Fibre Channel, NFS, and SMB.
iSCSI (Internet Small Computer System Interface)
Fibre Channel
NFS (Network File System)
SMB (Server Message Block)
Q25. How to find harddisk failure
To find hard disk failure, check for unusual noises, slow performance, frequent crashes, and run diagnostic tools.
Listen for clicking, grinding, or whirring sounds
Monitor for slow file access or system boot
Look for frequent system crashes or blue screens
Use diagnostic software like SMART to check disk health
Q26. Tell me your printer hardware experience
I have extensive experience with various printer hardware including installation, maintenance, and troubleshooting.
Installed and configured printers for network and standalone use
Performed routine maintenance such as replacing ink cartridges and cleaning print heads
Diagnosed and resolved hardware issues such as paper jams and connectivity problems
Worked with a variety of printer brands including HP, Canon, Epson, and Brother
Q27. different between VSS and Distributed Switch?
VSS is a virtual switch that operates at the host level, while Distributed Switch is a single switch that spans multiple hosts.
VSS is specific to each host, while Distributed Switch is shared across multiple hosts.
VSS is managed at the host level, while Distributed Switch is managed centrally.
Distributed Switch allows for centralized network configuration and monitoring.
VSS is limited to the host's physical NICs, while Distributed Switch can utilize multiple physical NICs acr...read more
Q28. How to resolve blue screen
To resolve a blue screen, start by identifying the error message and researching its cause. Update drivers, check hardware, and run diagnostic tests.
Identify the error message displayed on the blue screen
Research the error message to understand its cause
Update drivers for hardware components
Check hardware for any issues or conflicts
Run diagnostic tests to identify any underlying problems
Q29. Cluster is Down ? How to fix
Check for underlying issues, restart services, verify network connectivity, review logs, escalate if necessary.
Check for any underlying issues that may have caused the cluster to go down
Restart the necessary services related to the cluster
Verify network connectivity between the cluster nodes
Review logs for any error messages or warnings
Escalate the issue to higher level support if necessary
Q30. What is Gateway?
A gateway is a network node that connects two networks using different protocols.
It acts as an entry or exit point for a network
It translates protocols between networks
It can be hardware or software-based
Examples include routers, firewalls, and proxy servers
Q31. PSOD Issues ? How to fix?
PSOD stands for Purple Screen of Death. It is a critical error in VMware that requires troubleshooting to fix.
Check for hardware issues such as faulty memory or CPU
Review system logs for any error messages leading up to the PSOD
Update VMware ESXi to the latest version
Check for compatibility issues with hardware or software
Contact VMware support for further assistance
Q32. How to repair your c drive of computer?
To repair the C drive of a computer, you can use the built-in Windows tools like Check Disk or System File Checker.
Run Check Disk utility to scan and fix errors on the C drive
Use System File Checker tool to repair corrupted system files
Perform a System Restore to revert the system back to a previous working state
Reinstall Windows operating system if the above steps do not work
Q33. how to configure outlook?
Configuring Outlook involves setting up email accounts, adding contacts, and customizing settings.
Open Outlook and click on File
Click on Add Account and enter your email address and password
Follow the prompts to complete the setup process
To add contacts, click on People and click on New Contact
To customize settings, click on File and select Options
Q34. what is Memory ballooning?
Memory ballooning is a memory reclamation technique used in virtualization to reclaim memory from virtual machines.
Memory ballooning is a technique used by hypervisors to reclaim memory from virtual machines by inflating or 'ballooning' a balloon driver inside the guest OS.
The hypervisor can then allocate this reclaimed memory to other virtual machines that need it more.
Memory ballooning is typically used when the host is under memory pressure and needs to reclaim memory from...read more
Q35. what is TPM and explain?
TPM stands for Trusted Platform Module, a hardware-based security feature that stores cryptographic keys and provides secure boot capabilities.
TPM is a microchip that is typically installed on the motherboard of a computer or server.
It provides hardware-based security functions such as secure boot, key storage, and encryption.
TPM helps ensure the integrity of the system by verifying that it has not been tampered with.
It is commonly used in conjunction with encryption software...read more
Q36. what is admission control ?
Admission control is a feature in Vmware that ensures resources are available for virtual machines during failover or migration.
Admission control prevents virtual machines from being powered on if it would violate resource constraints
It helps maintain high availability by ensuring that there are enough resources available for failover
Admission control policies include slot policy, dedicated failover hosts, and resource pools
Q37. How to take data backup of server
To take data backup of a server, you can use backup software or built-in tools to create regular backups of important data.
Use backup software like Veeam, Acronis, or Backup Exec to schedule regular backups
Utilize built-in tools like Windows Server Backup or Time Machine for Mac servers
Store backups on external hard drives, network-attached storage (NAS), or cloud storage for redundancy
Test backups regularly to ensure data integrity and accessibility in case of emergencies
Q38. Explain Thin and Thick provisioning?
Thin provisioning allocates storage space on demand, while thick provisioning allocates all space upfront.
Thin provisioning only uses space as data is written, maximizing storage efficiency.
Thick provisioning allocates all space upfront, ensuring immediate availability but potentially wasting space.
Thin provisioning is more flexible and allows for overcommitting storage resources.
Thick provisioning is more suitable for performance-sensitive applications.
Example: Thin provisio...read more
Q39. Different between Template and Clone?
Template is a master copy used to create multiple identical VMs, while Clone is a copy of an existing VM.
Template is a blueprint for creating VMs, while Clone is a duplicate of an existing VM.
Templates are used for deploying multiple VMs with the same configuration, while Clones are used for creating copies of specific VMs.
Templates are typically read-only, while Clones can be modified independently.
Clones retain the same configuration and settings as the original VM, while T...read more
Q40. virtual machine is orphaned Status?
Orphaned status means the virtual machine is no longer associated with its parent resource pool or host.
Orphaned virtual machines can occur when a host fails or when a VM is manually removed from a resource pool.
Orphaned VMs can still consume resources and may need to be manually removed from the inventory.
To resolve orphaned status, the VM can be re-registered with a host or resource pool.
Q41. How To data backup of outlook?
To backup Outlook data, you can use the built-in export feature to save emails, contacts, and calendar items to a PST file.
Open Outlook and go to File > Open & Export > Import/Export.
Select 'Export to a file' and click Next.
Choose 'Outlook Data File (.pst)' and select the items you want to backup.
Specify the location and name for the backup file, then click Finish.
You can also set up automatic backups using third-party tools like Backupify or CodeTwo Backup.
Q42. What is Vm kernel?
The Vm kernel is a Unix-like operating system that runs on the physical hardware and manages the virtual machines on a VMware host.
It is a thin layer of software that runs directly on the host hardware to enable multiple operating systems to run on a single physical server.
It is responsible for managing the physical resources of the host machine and providing a platform for virtual machines to run.
The Vm kernel is highly optimized for virtualization and provides features like...read more
Q43. how to handle escalated issue with customer
Escalated customer issues require active listening, empathy, and a solution-oriented approach.
Listen actively to the customer's concerns and acknowledge their frustration.
Express empathy and apologize for any inconvenience caused.
Offer a solution or escalate the issue to a higher authority if necessary.
Follow up with the customer to ensure their issue has been resolved to their satisfaction.
Document the issue and any actions taken for future reference.
Q44. What is working of Firewall?
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and untrusted external network.
It inspects all incoming and outgoing traffic and decides whether to allow or block specific traffic based on a set of security rules.
Firewalls can be hardware-based or software-based, and can be configured to filter traffic based on IP addresses...read more
Q45. Virtual machine inaccessible?
Virtual machine may be inaccessible due to various reasons such as network issues, configuration errors, or resource constraints.
Check network connectivity to the virtual machine
Verify that the virtual machine is powered on
Ensure that the virtual machine's configuration is correct
Check for resource constraints such as CPU or memory usage
Review logs for any error messages or warnings
Q46. What is a Forest ?
A forest is a large area covered chiefly with trees and undergrowth.
A forest is a complex ecosystem with various plant and animal species.
Forests play a crucial role in maintaining biodiversity and regulating climate.
Examples of forests include rainforests, deciduous forests, and coniferous forests.
Q47. What is a Topology ?
Topology refers to the arrangement of nodes and connections in a network.
Topology defines how devices are connected in a network
Common topologies include bus, star, ring, mesh, and hybrid
Each topology has its own advantages and disadvantages
Topology affects network performance, scalability, and fault tolerance
Q48. What is MAC address?
MAC address is a unique identifier assigned to network interfaces for communications on a network.
MAC address stands for Media Access Control address.
It is a 12-digit hexadecimal number typically written in the format XX:XX:XX:XX:XX:XX.
MAC addresses are used to uniquely identify devices on a network.
They are assigned by the manufacturer and are hardcoded into the network interface card.
MAC addresses are used in Ethernet networks to control the flow of data.
Q49. What is Internet?
The Internet is a global network of interconnected computers that allows for communication, information sharing, and access to resources.
Global network of interconnected computers
Allows for communication, information sharing, and resource access
Uses protocols like TCP/IP for data transmission
Q50. Vm Migration issue?
Vm migration issue can occur due to compatibility issues, network problems, or insufficient resources.
Check for compatibility issues between source and target environments
Ensure network connectivity and bandwidth are sufficient for migration
Verify that there are enough resources (CPU, memory, storage) available for the migration
Consider using migration tools like VMware vMotion or Storage vMotion
Troubleshoot any errors or warnings during the migration process
Q51. Error OF outlook
Error OF outlook
Check internet connection
Restart Outlook
Update Outlook to latest version
Check for any conflicting add-ins
Repair Outlook data file
Q52. What is computer. What is system
A computer is an electronic device that can perform various tasks by executing instructions given to it. A system is a collection of hardware, software, and data that work together to perform a specific task.
A computer is made up of hardware components such as the CPU, memory, and storage devices.
Software programs are installed on a computer to perform specific tasks.
A system can refer to a computer system, an operating system, or a software system.
Examples of computer system...read more
Q53. What is system What is computer
A system is a set of interconnected components that work together to achieve a common goal. A computer is an electronic device that can perform various tasks by executing instructions.
A system can be physical or abstract
A computer is a type of system that consists of hardware and software components
Examples of systems include transportation systems, communication systems, and information systems
Examples of computers include desktops, laptops, tablets, and smartphones
Q54. Cnc Machine long form
CNC Machine stands for Computer Numerical Control Machine, which is a computer-controlled machine tool used for cutting and shaping various materials.
CNC Machines are used in manufacturing industries for tasks such as drilling, milling, turning, and grinding.
They are programmed using computer-aided design (CAD) software to create precise and complex shapes.
CNC Machine Operators are responsible for setting up, operating, and maintaining these machines to ensure accurate and ef...read more
Top HR Questions asked in Paanduv Applications
Interview Process at Paanduv Applications
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month