i
Progressive
Infotech
Filter interviews by
The colour coding of a cross cable is different on each end to allow for direct connection between two devices.
The colour coding on one end of the cross cable follows the T568A standard, while the other end follows the T568B standard
This allows for the direct connection of two devices without the need for a switch or hub in between
Commonly used for connecting two computers directly or connecting a computer to a pr...
Default gateway is a network device that connects different networks together, allowing devices on one network to communicate with devices on another network.
Default gateway is usually the IP address of the router that connects a local network to the internet.
It acts as an entry and exit point for network traffic between different networks.
Without a default gateway, devices on a network would not be able to commun...
To install a proxy certificate in a user's machine, you need to import the certificate into the user's browser or operating system.
Export the proxy certificate from the source (e.g. email, website)
Import the certificate into the user's browser or operating system settings
Verify the installation by accessing a website that requires the proxy certificate
IP address is a unique numerical label assigned to each device connected to a computer network.
Identifies devices on a network
Facilitates communication between devices
Allows devices to send and receive data packets
Can be IPv4 (e.g. 192.168.1.1) or IPv6 (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
VPN is a technology that allows users to securely connect to a private network over the internet.
VPN encrypts data to ensure privacy and security
It allows users to access resources on a private network remotely
Commonly used for remote work, accessing geo-restricted content, and enhancing online security
Examples include NordVPN, ExpressVPN, and Cisco AnyConnect
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP server assigns IP addresses to devices on a network
Helps in reducing manual configuration of IP addresses
DHCP lease time determines how long an IP address is valid for
DHCP Discover, Offer, Request, Acknowledge (DORA) process
Example: When a device connects to a network, ...
Blue Screen of Death (BSOD) is a Windows operating system error screen that appears when a system encounters a critical error.
BSOD is a stop error screen that appears when the Windows operating system encounters a critical error that it cannot recover from.
Common causes of BSOD include hardware failures, driver issues, software conflicts, and corrupt system files.
To fix BSOD, you can try restarting the computer, c...
DNS is a system that translates domain names to IP addresses, allowing users to access websites using human-readable names.
DNS stands for Domain Name System
It helps in translating domain names (like www.google.com) to IP addresses (like 172.217.3.206)
DNS is crucial for internet functionality as it allows users to access websites using easy-to-remember names
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows administrators to control access and permissions
Facilitates single sign-on for users across network services
Enables group policy management for network-wide settings
I applied via Naukri.com and was interviewed before Jul 2022. There were 3 interview rounds.
I am an experienced L2 Desktop Support Engineer with a strong background in troubleshooting and customer service.
Technical Expertise: I have hands-on experience with Windows and Mac operating systems, ensuring smooth user experiences.
Problem-Solving Skills: I successfully resolved a critical network issue for a client, restoring connectivity within an hour.
Customer Service: I prioritize user satisfaction, often receivi...
I have over 5 years of experience in desktop support, focusing on troubleshooting, user training, and system maintenance.
Extensive Troubleshooting: I have resolved hardware and software issues for various operating systems, including Windows and macOS.
User Training: I have conducted training sessions for end-users on software applications, enhancing their productivity and reducing support requests.
System Maintenance: I...
I currently reside in [Your Current Location] but am open to relocating to Mumbai for this opportunity.
I have researched Mumbai and am excited about the vibrant tech scene.
Relocating to Mumbai would allow me to be closer to major clients and support teams.
I have a flexible timeline for relocation and can start as soon as needed.
I am familiar with the cost of living in Mumbai and have planned accordingly.
I am a dedicated L2 Desktop Support Engineer with extensive experience in troubleshooting and resolving technical issues for users.
Technical Expertise: Proficient in diagnosing hardware and software issues, such as resolving network connectivity problems or software installation errors.
Customer Service: Strong focus on user satisfaction, demonstrated by consistently receiving positive feedback from users after resolvin...
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP server assigns IP addresses to devices on a network
Helps in reducing manual configuration of IP addresses
DHCP lease time determines how long an IP address is valid for
DHCP Discover, Offer, Request, Acknowledge (DORA) process
Example: When a device connects to a network, it se...
IP address is a unique numerical label assigned to each device connected to a computer network.
Identifies devices on a network
Facilitates communication between devices
Allows devices to send and receive data packets
Can be IPv4 (e.g. 192.168.1.1) or IPv6 (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
DNS is a system that translates domain names to IP addresses, allowing users to access websites using human-readable names.
DNS stands for Domain Name System
It helps in translating domain names (like www.google.com) to IP addresses (like 172.217.3.206)
DNS is crucial for internet functionality as it allows users to access websites using easy-to-remember names
Default gateway is a network device that connects different networks together, allowing devices on one network to communicate with devices on another network.
Default gateway is usually the IP address of the router that connects a local network to the internet.
It acts as an entry and exit point for network traffic between different networks.
Without a default gateway, devices on a network would not be able to communicate...
Blue Screen of Death (BSOD) is a Windows operating system error screen that appears when a system encounters a critical error.
BSOD is a stop error screen that appears when the Windows operating system encounters a critical error that it cannot recover from.
Common causes of BSOD include hardware failures, driver issues, software conflicts, and corrupt system files.
To fix BSOD, you can try restarting the computer, checki...
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows administrators to control access and permissions
Facilitates single sign-on for users across network services
Enables group policy management for network-wide settings
The colour coding of a cross cable is different on each end to allow for direct connection between two devices.
The colour coding on one end of the cross cable follows the T568A standard, while the other end follows the T568B standard
This allows for the direct connection of two devices without the need for a switch or hub in between
Commonly used for connecting two computers directly or connecting a computer to a printer
To install a proxy certificate in a user's machine, you need to import the certificate into the user's browser or operating system.
Export the proxy certificate from the source (e.g. email, website)
Import the certificate into the user's browser or operating system settings
Verify the installation by accessing a website that requires the proxy certificate
VPN is a technology that allows users to securely connect to a private network over the internet.
VPN encrypts data to ensure privacy and security
It allows users to access resources on a private network remotely
Commonly used for remote work, accessing geo-restricted content, and enhancing online security
Examples include NordVPN, ExpressVPN, and Cisco AnyConnect
I applied via Naukri.com and was interviewed in Dec 2021. There were 4 interview rounds.
I am seeking a change to further my career, embrace new challenges, and enhance my skills in a dynamic environment.
Career Growth: I feel that my current role has limited opportunities for advancement, and I am eager to take on more responsibilities and grow professionally.
Skill Development: I want to work with new technologies and tools that can enhance my technical skills, such as cloud computing or advanced troublesh...
Salary expectations for a Desktop Support Engineer L2 depend on experience, location, and industry standards.
Market Research: Based on industry standards, salaries for L2 Desktop Support Engineers typically range from $50,000 to $70,000 annually.
Experience Level: With over 5 years of experience, I would expect a salary towards the higher end of that range, around $65,000.
Location Impact: Salaries can vary significantly...
I am a dedicated Desktop Support Engineer with extensive experience in troubleshooting and resolving technical issues for end-users.
Technical Expertise: Proficient in diagnosing hardware and software issues, such as resolving network connectivity problems and software installation errors.
Customer Service Skills: I prioritize user satisfaction, often going the extra mile to ensure that users feel supported and their iss...
I applied via Naukri.com and was interviewed in Oct 2020. There were 3 interview rounds.
Top trending discussions
I applied via Naukri.com
I applied via Referral and was interviewed before May 2023. There was 1 interview round.
Identifying strengths and weaknesses helps in personal growth and improving performance in a Desktop Support Engineer role.
Strength: Strong problem-solving skills. For example, I once resolved a complex network issue that was affecting multiple users by systematically isolating the problem.
Strength: Excellent communication skills. I ensure that technical information is conveyed clearly to non-technical users, which enh...
I applied via Naukri.com and was interviewed in Jan 2023. There were 4 interview rounds.
All about profit, percentages,desicion making, English grammar etc
posted on 22 Nov 2021
I applied via Walk-in and was interviewed before Nov 2020. There was 1 interview round.
I applied via Naukri.com and was interviewed before Mar 2020. There were 4 interview rounds.
Hashtable is synchronized while hashmap is not.
Hashtable is thread-safe while hashmap is not.
Hashtable does not allow null keys or values while hashmap allows one null key and multiple null values.
Hashtable is slower than hashmap due to synchronization.
Hashtable is a legacy class while hashmap is a newer implementation.
Hashmap is not thread-safe while Concurrent Hashmap is thread-safe.
Hashmap is not suitable for multi-threaded environments as it can lead to race conditions and data inconsistencies.
Concurrent Hashmap allows multiple threads to access and modify the map concurrently without any data inconsistencies.
Concurrent Hashmap uses a technique called lock striping to achieve thread-safety.
Concurrent Hashmap is slower than Hashma...
posted on 11 Mar 2022
I appeared for an interview before Mar 2021.
Round duration - 60 minutes
Round difficulty - Medium
21 students were shortlisted from the 1st MCQ round and in this round we were asked to write the codes (function only) of 3 questions in 1 hour time.
You are given a grid containing oranges where each cell of the grid can contain one of the three integer values:
Find the minimum time required to rot all fresh oranges in a grid.
Use Breadth First Search (BFS) to simulate the rotting process
Track the time taken to rot all oranges and return -1 if any fresh oranges remain
Handle edge cases like no fresh oranges or all oranges already rotten
Consider using a queue to efficiently process adjacent oranges
Given an array/list 'ARR' consisting of 'N' integers, your task is to find the majority element in the array. If there is no majority element present, return -1.
Find the majority element in an array, return -1 if no majority element exists.
Iterate through the array and keep track of the count of each element using a hashmap.
Check if any element's count is greater than floor(N/2) to determine the majority element.
Return the majority element or -1 if no majority element exists.
You are provided with a non-empty binary tree in which each node contains a non-negative integer value. Your task is to find and return the maximum ...
Find the maximum path sum between two leaf nodes in a binary tree.
Traverse the tree to find the maximum path sum between two leaf nodes.
Keep track of the maximum sum found so far.
Consider all possible paths between leaf nodes.
Handle cases where the tree has only a single leaf node.
Implement a recursive function to calculate the maximum path sum.
Round duration - 60 minutes
Round difficulty - Medium
This was a technical round with DSA based questions.
You are given a Singly Linked List of integers. The task is to find the N-th node from the end of the list.
If the given list is (1 -> -2 -&g...
Find the N-th node from the end of a Singly Linked List of integers.
Traverse the list to find the length L of the list.
Calculate the position of the N-th node from the beginning as L - N + 1.
Traverse the list again to reach the calculated position and return the node's value.
You are given a binary tree consisting of distinct integers and two nodes, X
and Y
. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes...
Find the Lowest Common Ancestor (LCA) of two nodes in a binary tree.
Traverse the binary tree to find the paths from the root to nodes X and Y.
Compare the paths to find the last common node, which is the LCA.
Handle cases where one node is an ancestor of the other or when one node is the LCA itself.
You are given a string of length N
. Your task is to reverse the string word by word. The input may contain multiple spaces between words and may have leading o...
Reverse words in a string while handling leading/trailing spaces and multiple spaces between words.
Split the input string by spaces to get individual words
Reverse the list of words
Join the reversed words with a single space in between
Handle leading/trailing spaces by stripping them before and after reversing
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions based on DSA
Given 'N' subjects, each containing a certain number of problems, and 'K' friends, assign subjects to friends such that each subject goes to exactly one friend, maintain...
Assign subjects to friends to minimize maximum workload, find minimum time for most loaded friend.
Sort subjects in descending order
Assign subjects to friends one by one until all subjects are assigned
The maximum workload will be the sum of problems assigned to the friend with the most problems
Return the maximum workload as the minimum time required
Grammar in compiler design defines the syntax and structure of a programming language.
Grammar specifies the rules for forming valid statements in a programming language.
It consists of a set of production rules that define how valid programs can be constructed.
There are different types of grammars such as context-free grammar, regular grammar, etc.
Example: In C programming language, the grammar specifies that a for loop...
A token in compiler design is a basic unit of syntax that the compiler can understand and process.
Tokens are the smallest units of a program that are meaningful to the compiler.
Examples of tokens include keywords, identifiers, operators, and punctuation symbols.
Tokens are generated by the lexical analysis phase of the compiler.
Tokens are used by the parser to build the abstract syntax tree of the program.
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DSA and Compiler Design mainly. He told me that you’ll be having your final HR round in some time. I knew that I was going well because he seemed to be quite satisfied with my answers.
You are given an arbitrary binary tree consisting of N nodes, each associated with an integer value from 1 to 9. Each root-to-leaf path can be considered a number formed by concat...
Find the total sum of all root to leaf paths in a binary tree formed by concatenating node values.
Traverse the binary tree from root to leaf nodes, keeping track of the current path sum
Add the current path sum to the total sum when reaching a leaf node
Use modulo (10^9 + 7) to handle large outputs
A regular language is a language that can be recognized by a finite automaton.
Regular languages can be described by regular expressions.
Regular languages are closed under union, concatenation, and Kleene star operations.
Examples of regular languages include the set of all strings over an alphabet that contain an even number of 'a's.
NP problems are decision problems that can be verified in polynomial time, while NP-Hard problems are at least as hard as the hardest problems in NP.
NP problems can be verified in polynomial time but not necessarily solved in polynomial time.
NP-Hard problems are at least as hard as the hardest problems in NP, but may not be in NP themselves.
Examples of NP problems include the subset sum problem and the traveling salesm...
Round duration - 30 minutes
Round difficulty - Easy
That was the round for which I’ve been waiting for hours
She was very friendly and nice to talk to. It didn’t seem that I was talking to the HR. It was more like talking to a friend. Finally we discussed about the pay-scale and work culture in Accolite.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Recruitment Consultant and was interviewed in Mar 2018. There was 1 interview round.
based on 1 interview experience
Difficulty level
Duration
based on 11 reviews
Rating in categories
Desktop Support Engineer
219
salaries
| ₹1.7 L/yr - ₹4.5 L/yr |
Technical Analyst
179
salaries
| ₹1.6 L/yr - ₹4 L/yr |
Senior Technical Analyst
146
salaries
| ₹2 L/yr - ₹6 L/yr |
Technical Support Engineer
71
salaries
| ₹1.5 L/yr - ₹4.1 L/yr |
Desktop Support Engineer L2
51
salaries
| ₹1.8 L/yr - ₹3.3 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant