Premium Employer

Precision Infomatic M Pvt Ltd

3.8
based on 724 Reviews
Filter interviews by

50+ Paanduv Applications Interview Questions and Answers

Updated 29 Nov 2024
Popular Designations

Q1. Difference between HTTP and HTTPS, What is UDP and TCP, Port numbers of network protocols, What is Bitlocker , Outlook Configuration step by step etc

Ans.

Questions related to networking and security protocols, Bitlocker and Outlook configuration.

  • HTTP is unsecured while HTTPS is secured with SSL/TLS encryption

  • TCP is a connection-oriented protocol while UDP is connectionless

  • Common port numbers include 80 for HTTP, 443 for HTTPS, 25 for SMTP, and 110 for POP3

  • Bitlocker is a full disk encryption feature in Windows

  • Outlook configuration involves setting up email accounts, server settings, and security options

View 1 answer

Q2. What is the difference between RAM and ROM?

Ans.

RAM is volatile memory used for temporary storage while ROM is non-volatile memory used for permanent storage.

  • RAM stands for Random Access Memory while ROM stands for Read Only Memory.

  • RAM is used for temporary storage of data and program instructions while ROM is used for permanent storage of data and program instructions.

  • RAM is volatile memory which means it loses its contents when power is turned off while ROM is non-volatile memory which means it retains its contents even ...read more

Add your answer

Q3. What is BSOD? How do you troubleshoot it?

Ans.

BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a system error occurs.

  • BSOD is caused by hardware or software issues

  • Troubleshoot by checking for recently installed hardware or software

  • Check for driver updates or rollbacks

  • Run system diagnostics or memory tests

  • Check for overheating or hardware failures

  • Collect error codes and search for solutions online

Add your answer

Q4. What does DHCP stand for and what is its purpose?

Ans.

DHCP stands for Dynamic Host Configuration Protocol. It is used to automatically assign IP addresses to devices on a network.

  • DHCP is a network protocol that allows devices to obtain IP addresses automatically.

  • It eliminates the need for manual IP address configuration.

  • DHCP servers can also provide additional network configuration information, such as subnet mask and default gateway.

  • DHCP leases are temporary and must be renewed periodically.

  • Example: When a new device joins a ne...read more

Add your answer
Discover Paanduv Applications interview dos and don'ts from real experiences

Q5. What are the types of the operating system or O.S?

Ans.

There are three types of operating systems: Batch Operating System, Time-Sharing Operating System, and Real-Time Operating System.

  • Batch Operating System: processes similar jobs in batches, without any user interaction. Example: COBOL

  • Time-Sharing Operating System: allows multiple users to access the computer simultaneously. Example: UNIX

  • Real-Time Operating System: processes data as it comes in, without any delay. Example: VxWorks

Add your answer

Q6. What is the SMTP server or POP server?

Ans.

SMTP and POP are email protocols used for sending and receiving emails respectively.

  • SMTP stands for Simple Mail Transfer Protocol and is used for sending emails.

  • POP stands for Post Office Protocol and is used for receiving emails.

  • SMTP server is responsible for sending emails from one email client to another.

  • POP server is responsible for receiving emails from the email server and delivering them to the email client.

  • Examples of SMTP servers include Gmail's SMTP server smtp.gmai...read more

Add your answer
Are these interview questions helpful?

Q7. What is the ISP? Which ISP you use? Give some ISP name?

Ans.

ISP stands for Internet Service Provider. It is a company that provides internet access to customers.

  • Some popular ISPs are Comcast, AT&T, Verizon, and Spectrum.

  • ISPs offer different types of internet connections such as DSL, cable, and fiber optic.

  • ISPs may also offer additional services such as email, web hosting, and virtual private networks (VPNs).

Add your answer

Q8. What will you check if your computer dont connect with intranet or internet?

Ans.

I will check network connectivity, DNS settings, firewall, and proxy settings.

  • Check if other devices are able to connect to the network

  • Check if the network cable is properly connected

  • Check if the DNS settings are correct

  • Check if the firewall is blocking the connection

  • Check if the proxy settings are configured correctly

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is active directory?

Ans.

Active Directory is a directory service developed by Microsoft for Windows domain networks.

  • It stores information about network resources and users in a centralized database.

  • It provides authentication and authorization services for Windows-based computers.

  • It allows administrators to manage and control access to network resources.

  • It uses a hierarchical structure of domains, trees, and forests to organize network resources.

  • It supports group policies, which allow administrators t...read more

Add your answer

Q10. Which is the latest OS today? Which is the latest application for office tools today?

Ans.

The latest OS is Windows 11. The latest application for office tools is Microsoft Office 2021.

  • The latest OS released by Microsoft is Windows 11.

  • Windows 11 was released on October 5, 2021.

  • The latest application for office tools is Microsoft Office 2021.

  • Microsoft Office 2021 was released on October 5, 2021.

  • Microsoft Office 2021 includes updated versions of Word, Excel, PowerPoint, and Outlook.

Add your answer

Q11. How to configure the network printer

Ans.

Configuring a network printer involves connecting it to the network and installing the necessary drivers.

  • Connect the printer to the network using an Ethernet cable or Wi-Fi.

  • Install the printer drivers on the computer(s) that will be using the printer.

  • Assign a static IP address to the printer to ensure it remains accessible on the network.

  • Test the printer by printing a test page or document.

  • Configure any additional settings, such as paper size or duplex printing, as needed.

Add your answer

Q12. What is the difference between MS 365 MS Office 2016?

Ans.

MS 365 is a cloud-based subscription service while MS Office 2016 is a one-time purchase software.

  • MS 365 includes cloud-based services such as OneDrive, SharePoint, and Teams

  • MS Office 2016 is a standalone software with no cloud-based services

  • MS 365 offers regular updates and new features while MS Office 2016 does not

  • MS 365 requires a monthly or yearly subscription fee while MS Office 2016 is a one-time purchase

  • MS 365 allows access to the latest versions of Office applications...read more

Add your answer

Q13. How to join the system into the domain

Ans.

To join a system into a domain, follow these steps:

  • Ensure the system is connected to the network

  • Open System Properties and click on 'Change'

  • Select 'Domain' and enter the domain name

  • Enter domain credentials when prompted

  • Restart the system for changes to take effect

Add your answer

Q14. What DHCP ? What is active Directory ? Explain DNS ? How it Work Service Now ?

Ans.

DHCP is a network protocol that assigns IP addresses to devices on a network. Active Directory is a directory service used to manage network resources. DNS translates domain names to IP addresses. Service Now is a cloud-based platform for IT service management.

  • DHCP assigns IP addresses dynamically to devices on a network

  • Active Directory is a directory service used to manage users, computers, and other network resources

  • DNS translates domain names to IP addresses to enable comm...read more

Add your answer

Q15. How to resolve dot matrix printer ribbon not rotate issue

Ans.

To resolve the dot matrix printer ribbon not rotate issue, check for mechanical issues, ensure proper installation, clean the printer, and replace the ribbon if necessary.

  • Check for any mechanical issues such as jammed or misaligned parts

  • Ensure that the ribbon is properly installed and aligned with the printer

  • Clean the printer, including the ribbon cartridge and print head, to remove any dirt or debris that may be causing the issue

  • If the ribbon is worn out or damaged, replace ...read more

View 1 answer

Q16. what about Carrer growth

Ans.

Career growth is important to me and I believe in continuous learning and development.

  • I am always looking for opportunities to learn new skills and take on new challenges

  • I am open to taking on additional responsibilities and leadership roles

  • I believe in networking and building relationships with colleagues and industry professionals

  • I am willing to pursue additional education or certifications to enhance my skills and knowledge

View 2 more answers

Q17. What is the OSI Model ?

Ans.

The OSI Model is a conceptual framework that standardizes the functions of a communication system into seven layers.

  • The OSI Model stands for Open Systems Interconnection Model.

  • It was developed by the International Organization for Standardization (ISO) in the 1980s.

  • The model divides the communication process into seven layers, each with its own specific functions.

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer interac...read more

View 1 answer

Q18. Colour code for crimping RJ 45 connection?

Ans.

The colour code for crimping RJ45 connection is T-568A or T-568B.

  • T-568A and T-568B are the two commonly used standards for RJ45 wiring.

  • T-568A uses green and orange wires for transmitting data, while T-568B uses orange and green wires.

  • The order of the wires in the connector is important and must follow the correct sequence.

  • A wiring diagram or guide can be helpful in ensuring the correct colour code is used.

Add your answer

Q19. How to configure the outlook

Ans.

Configuring Outlook involves adding email accounts, setting up signatures, and customizing settings.

  • Open Outlook and click on File

  • Click on Add Account to add email accounts

  • Go to Options to customize settings and set up signatures

  • Configure server settings for incoming and outgoing mail

  • Set up rules to manage incoming emails

Add your answer

Q20. What is the full form of NIC?

Ans.

NIC stands for Network Interface Card.

  • NIC is a hardware component that connects a computer to a network.

  • It allows the computer to communicate with other devices on the network.

  • NICs can be wired or wireless, and can have different speeds and protocols.

  • Examples of NIC manufacturers include Intel, Broadcom, and Realtek.

Add your answer

Q21. whats is AD server and how its work?

Ans.

AD server is a server that runs Active Directory, a directory service that manages network resources and user accounts.

  • AD server is used to manage network resources and user accounts

  • It allows for centralized authentication and authorization

  • It uses a hierarchical structure of domains, trees, and forests

  • It can be used to manage access to resources such as files, printers, and applications

  • Examples of AD servers include Microsoft Active Directory and OpenLDAP

Add your answer

Q22. How to add or remove software

Ans.

To add or remove software, use package management tools like apt-get or yum.

  • For Linux systems, use package managers like apt-get (Debian-based) or yum (Red Hat-based)

  • For Windows systems, use the Control Panel or the Settings app to uninstall software

  • For macOS systems, use the Launchpad or the Applications folder to uninstall software

  • Consider dependencies and conflicts when adding or removing software

View 1 answer

Q23. Windows troubleshooting techniques

Ans.

Windows troubleshooting techniques involve identifying and resolving issues with the operating system.

  • Start by checking for error messages or codes

  • Use Windows Event Viewer to identify potential issues

  • Check for software conflicts or driver issues

  • Run Windows Update to ensure system is up to date

  • Perform system restore or reset as a last resort

Add your answer

Q24. What are protocol used for Storage?

Ans.

Protocols used for Storage include iSCSI, Fibre Channel, NFS, and SMB.

  • iSCSI (Internet Small Computer System Interface)

  • Fibre Channel

  • NFS (Network File System)

  • SMB (Server Message Block)

Add your answer

Q25. How to find harddisk failure

Ans.

To find hard disk failure, check for unusual noises, slow performance, frequent crashes, and run diagnostic tools.

  • Listen for clicking, grinding, or whirring sounds

  • Monitor for slow file access or system boot

  • Look for frequent system crashes or blue screens

  • Use diagnostic software like SMART to check disk health

View 1 answer

Q26. Tell me your printer hardware experience

Ans.

I have extensive experience with various printer hardware including installation, maintenance, and troubleshooting.

  • Installed and configured printers for network and standalone use

  • Performed routine maintenance such as replacing ink cartridges and cleaning print heads

  • Diagnosed and resolved hardware issues such as paper jams and connectivity problems

  • Worked with a variety of printer brands including HP, Canon, Epson, and Brother

Add your answer

Q27. different between VSS and Distributed Switch?

Ans.

VSS is a virtual switch that operates at the host level, while Distributed Switch is a single switch that spans multiple hosts.

  • VSS is specific to each host, while Distributed Switch is shared across multiple hosts.

  • VSS is managed at the host level, while Distributed Switch is managed centrally.

  • Distributed Switch allows for centralized network configuration and monitoring.

  • VSS is limited to the host's physical NICs, while Distributed Switch can utilize multiple physical NICs acr...read more

Add your answer

Q28. How to resolve blue screen

Ans.

To resolve a blue screen, start by identifying the error message and researching its cause. Update drivers, check hardware, and run diagnostic tests.

  • Identify the error message displayed on the blue screen

  • Research the error message to understand its cause

  • Update drivers for hardware components

  • Check hardware for any issues or conflicts

  • Run diagnostic tests to identify any underlying problems

View 1 answer

Q29. Cluster is Down ? How to fix

Ans.

Check for underlying issues, restart services, verify network connectivity, review logs, escalate if necessary.

  • Check for any underlying issues that may have caused the cluster to go down

  • Restart the necessary services related to the cluster

  • Verify network connectivity between the cluster nodes

  • Review logs for any error messages or warnings

  • Escalate the issue to higher level support if necessary

Add your answer

Q30. What is Gateway?

Ans.

A gateway is a network node that connects two networks using different protocols.

  • It acts as an entry or exit point for a network

  • It translates protocols between networks

  • It can be hardware or software-based

  • Examples include routers, firewalls, and proxy servers

Add your answer

Q31. PSOD Issues ? How to fix?

Ans.

PSOD stands for Purple Screen of Death. It is a critical error in VMware that requires troubleshooting to fix.

  • Check for hardware issues such as faulty memory or CPU

  • Review system logs for any error messages leading up to the PSOD

  • Update VMware ESXi to the latest version

  • Check for compatibility issues with hardware or software

  • Contact VMware support for further assistance

Add your answer

Q32. How to repair your c drive of computer?

Ans.

To repair the C drive of a computer, you can use the built-in Windows tools like Check Disk or System File Checker.

  • Run Check Disk utility to scan and fix errors on the C drive

  • Use System File Checker tool to repair corrupted system files

  • Perform a System Restore to revert the system back to a previous working state

  • Reinstall Windows operating system if the above steps do not work

Add your answer

Q33. how to configure outlook?

Ans.

Configuring Outlook involves setting up email accounts, adding contacts, and customizing settings.

  • Open Outlook and click on File

  • Click on Add Account and enter your email address and password

  • Follow the prompts to complete the setup process

  • To add contacts, click on People and click on New Contact

  • To customize settings, click on File and select Options

Add your answer

Q34. what is Memory ballooning?

Ans.

Memory ballooning is a memory reclamation technique used in virtualization to reclaim memory from virtual machines.

  • Memory ballooning is a technique used by hypervisors to reclaim memory from virtual machines by inflating or 'ballooning' a balloon driver inside the guest OS.

  • The hypervisor can then allocate this reclaimed memory to other virtual machines that need it more.

  • Memory ballooning is typically used when the host is under memory pressure and needs to reclaim memory from...read more

Add your answer

Q35. what is TPM and explain?

Ans.

TPM stands for Trusted Platform Module, a hardware-based security feature that stores cryptographic keys and provides secure boot capabilities.

  • TPM is a microchip that is typically installed on the motherboard of a computer or server.

  • It provides hardware-based security functions such as secure boot, key storage, and encryption.

  • TPM helps ensure the integrity of the system by verifying that it has not been tampered with.

  • It is commonly used in conjunction with encryption software...read more

Add your answer

Q36. what is admission control ?

Ans.

Admission control is a feature in Vmware that ensures resources are available for virtual machines during failover or migration.

  • Admission control prevents virtual machines from being powered on if it would violate resource constraints

  • It helps maintain high availability by ensuring that there are enough resources available for failover

  • Admission control policies include slot policy, dedicated failover hosts, and resource pools

Add your answer

Q37. How to take data backup of server

Ans.

To take data backup of a server, you can use backup software or built-in tools to create regular backups of important data.

  • Use backup software like Veeam, Acronis, or Backup Exec to schedule regular backups

  • Utilize built-in tools like Windows Server Backup or Time Machine for Mac servers

  • Store backups on external hard drives, network-attached storage (NAS), or cloud storage for redundancy

  • Test backups regularly to ensure data integrity and accessibility in case of emergencies

Add your answer

Q38. Explain Thin and Thick provisioning?

Ans.

Thin provisioning allocates storage space on demand, while thick provisioning allocates all space upfront.

  • Thin provisioning only uses space as data is written, maximizing storage efficiency.

  • Thick provisioning allocates all space upfront, ensuring immediate availability but potentially wasting space.

  • Thin provisioning is more flexible and allows for overcommitting storage resources.

  • Thick provisioning is more suitable for performance-sensitive applications.

  • Example: Thin provisio...read more

Add your answer

Q39. Different between Template and Clone?

Ans.

Template is a master copy used to create multiple identical VMs, while Clone is a copy of an existing VM.

  • Template is a blueprint for creating VMs, while Clone is a duplicate of an existing VM.

  • Templates are used for deploying multiple VMs with the same configuration, while Clones are used for creating copies of specific VMs.

  • Templates are typically read-only, while Clones can be modified independently.

  • Clones retain the same configuration and settings as the original VM, while T...read more

Add your answer

Q40. virtual machine is orphaned Status?

Ans.

Orphaned status means the virtual machine is no longer associated with its parent resource pool or host.

  • Orphaned virtual machines can occur when a host fails or when a VM is manually removed from a resource pool.

  • Orphaned VMs can still consume resources and may need to be manually removed from the inventory.

  • To resolve orphaned status, the VM can be re-registered with a host or resource pool.

Add your answer

Q41. How To data backup of outlook?

Ans.

To backup Outlook data, you can use the built-in export feature to save emails, contacts, and calendar items to a PST file.

  • Open Outlook and go to File > Open & Export > Import/Export.

  • Select 'Export to a file' and click Next.

  • Choose 'Outlook Data File (.pst)' and select the items you want to backup.

  • Specify the location and name for the backup file, then click Finish.

  • You can also set up automatic backups using third-party tools like Backupify or CodeTwo Backup.

Add your answer

Q42. What is Vm kernel?

Ans.

The Vm kernel is a Unix-like operating system that runs on the physical hardware and manages the virtual machines on a VMware host.

  • It is a thin layer of software that runs directly on the host hardware to enable multiple operating systems to run on a single physical server.

  • It is responsible for managing the physical resources of the host machine and providing a platform for virtual machines to run.

  • The Vm kernel is highly optimized for virtualization and provides features like...read more

Add your answer

Q43. how to handle escalated issue with customer

Ans.

Escalated customer issues require active listening, empathy, and a solution-oriented approach.

  • Listen actively to the customer's concerns and acknowledge their frustration.

  • Express empathy and apologize for any inconvenience caused.

  • Offer a solution or escalate the issue to a higher authority if necessary.

  • Follow up with the customer to ensure their issue has been resolved to their satisfaction.

  • Document the issue and any actions taken for future reference.

Add your answer

Q44. What is working of Firewall?

Ans.

Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Firewall acts as a barrier between a trusted internal network and untrusted external network.

  • It inspects all incoming and outgoing traffic and decides whether to allow or block specific traffic based on a set of security rules.

  • Firewalls can be hardware-based or software-based, and can be configured to filter traffic based on IP addresses...read more

Add your answer

Q45. Virtual machine inaccessible?

Ans.

Virtual machine may be inaccessible due to various reasons such as network issues, configuration errors, or resource constraints.

  • Check network connectivity to the virtual machine

  • Verify that the virtual machine is powered on

  • Ensure that the virtual machine's configuration is correct

  • Check for resource constraints such as CPU or memory usage

  • Review logs for any error messages or warnings

Add your answer

Q46. What is a Forest ?

Ans.

A forest is a large area covered chiefly with trees and undergrowth.

  • A forest is a complex ecosystem with various plant and animal species.

  • Forests play a crucial role in maintaining biodiversity and regulating climate.

  • Examples of forests include rainforests, deciduous forests, and coniferous forests.

Add your answer

Q47. What is a Topology ?

Ans.

Topology refers to the arrangement of nodes and connections in a network.

  • Topology defines how devices are connected in a network

  • Common topologies include bus, star, ring, mesh, and hybrid

  • Each topology has its own advantages and disadvantages

  • Topology affects network performance, scalability, and fault tolerance

Add your answer

Q48. What is MAC address?

Ans.

MAC address is a unique identifier assigned to network interfaces for communications on a network.

  • MAC address stands for Media Access Control address.

  • It is a 12-digit hexadecimal number typically written in the format XX:XX:XX:XX:XX:XX.

  • MAC addresses are used to uniquely identify devices on a network.

  • They are assigned by the manufacturer and are hardcoded into the network interface card.

  • MAC addresses are used in Ethernet networks to control the flow of data.

Add your answer

Q49. What is Internet?

Ans.

The Internet is a global network of interconnected computers that allows for communication, information sharing, and access to resources.

  • Global network of interconnected computers

  • Allows for communication, information sharing, and resource access

  • Uses protocols like TCP/IP for data transmission

Add your answer

Q50. Vm Migration issue?

Ans.

Vm migration issue can occur due to compatibility issues, network problems, or insufficient resources.

  • Check for compatibility issues between source and target environments

  • Ensure network connectivity and bandwidth are sufficient for migration

  • Verify that there are enough resources (CPU, memory, storage) available for the migration

  • Consider using migration tools like VMware vMotion or Storage vMotion

  • Troubleshoot any errors or warnings during the migration process

Add your answer

Q51. Error OF outlook

Ans.

Error OF outlook

  • Check internet connection

  • Restart Outlook

  • Update Outlook to latest version

  • Check for any conflicting add-ins

  • Repair Outlook data file

Add your answer

Q52. What is computer. What is system

Ans.

A computer is an electronic device that can perform various tasks by executing instructions given to it. A system is a collection of hardware, software, and data that work together to perform a specific task.

  • A computer is made up of hardware components such as the CPU, memory, and storage devices.

  • Software programs are installed on a computer to perform specific tasks.

  • A system can refer to a computer system, an operating system, or a software system.

  • Examples of computer system...read more

Add your answer

Q53. What is system What is computer

Ans.

A system is a set of interconnected components that work together to achieve a common goal. A computer is an electronic device that can perform various tasks by executing instructions.

  • A system can be physical or abstract

  • A computer is a type of system that consists of hardware and software components

  • Examples of systems include transportation systems, communication systems, and information systems

  • Examples of computers include desktops, laptops, tablets, and smartphones

Add your answer

Q54. Cnc Machine long form

Ans.

CNC Machine stands for Computer Numerical Control Machine, which is a computer-controlled machine tool used for cutting and shaping various materials.

  • CNC Machines are used in manufacturing industries for tasks such as drilling, milling, turning, and grinding.

  • They are programmed using computer-aided design (CAD) software to create precise and complex shapes.

  • CNC Machine Operators are responsible for setting up, operating, and maintaining these machines to ensure accurate and ef...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Paanduv Applications

based on 36 interviews
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 1.2k Interview Questions
3.8
 • 302 Interview Questions
3.9
 • 214 Interview Questions
3.7
 • 142 Interview Questions
3.7
 • 140 Interview Questions
4.0
 • 136 Interview Questions
View all
Top Precision Infomatic M Pvt Ltd Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter