Filter interviews by
I applied via Naukri.com and was interviewed before Mar 2022. There were 4 interview rounds.
Group Policy is a feature in Windows that allows administrators to manage user and computer settings centrally.
Group Policy is used to enforce security policies, software installation policies, and other settings across a network.
It allows administrators to control user access to certain features and applications.
Group Policy settings can be applied to individual users, groups, or entire domains.
Examples of Group Polic...
POP3 and IMAP are two different protocols used for email retrieval.
POP3 downloads emails from the server to the local device and deletes them from the server, while IMAP keeps the emails on the server and syncs changes between the server and local device.
POP3 is a one-way communication protocol, while IMAP is a two-way communication protocol.
IMAP allows for multiple devices to access the same email account and keeps th...
Tell about your technical skills and older company work out also tell your goal.
Top trending discussions
posted on 28 Dec 2024
The latest version of antivirus is typically the most up-to-date version released by the antivirus software provider.
Regularly check for updates on the antivirus software's official website or through the software itself
Ensure automatic updates are enabled to receive the latest protection against new threats
The version and edition of Ms. Office in our company is Office 365 ProPlus.
Office 365 ProPlus is the version and edition of Ms. Office used in our company.
It includes applications like Word, Excel, PowerPoint, Outlook, and more.
Regular updates and cloud services are included in Office 365 ProPlus.
posted on 14 Oct 2021
I applied via Naukri.com and was interviewed in Sep 2021. There was 1 interview round.
IMAP and POP3 are email protocols used for retrieving emails from a mail server.
IMAP stands for Internet Message Access Protocol and allows users to access and manage their emails on a remote server.
POP3 stands for Post Office Protocol version 3 and downloads emails from a mail server to a local device.
IMAP allows for multiple devices to access and sync emails, while POP3 only allows for one device to download emails.
I...
Outlook is a personal information manager developed by Microsoft.
It is used for email communication, managing contacts, scheduling appointments, and organizing tasks.
It integrates with other Microsoft Office applications such as Word, Excel, and PowerPoint.
It allows users to create and manage multiple email accounts and folders.
It has features such as email filtering, automatic replies, and calendar sharing.
It can be a...
Safe mode is a diagnostic mode in which a computer's operating system starts with only basic functions.
Safe mode is used to troubleshoot and fix issues with the operating system or software.
In safe mode, only essential drivers and services are loaded, which can help identify and resolve problems.
Safe mode can be accessed by pressing a key during startup, such as F8 for Windows.
In safe mode, the screen resolution may be...
PST files are created to store Outlook data locally on a computer.
PST files allow users to access their Outlook data even when not connected to the internet.
They can be used to backup important emails, contacts, and calendar events.
PST files can also be used to transfer Outlook data from one computer to another.
They have a maximum size limit of 50GB in Outlook 2010 and later versions.
PST files can be password protected
TCP and UDP are protocols used for communication between devices on a network.
TCP stands for Transmission Control Protocol and is a connection-oriented protocol used for reliable data transfer.
UDP stands for User Datagram Protocol and is a connectionless protocol used for fast data transfer.
TCP is used for applications that require reliable data transfer, such as email and file transfer.
UDP is used for applications tha...
To install an operating system, you need to create a bootable media and follow the installation wizard.
Create a bootable media (USB, DVD, etc.) with the operating system image
Insert the bootable media into the computer and restart it
Follow the installation wizard and select the desired options (language, partition, etc.)
Wait for the installation to complete and restart the computer
posted on 27 Dec 2024
I would be able to take security measures by staying updated on security best practices, implementing security protocols, and regularly monitoring systems for vulnerabilities.
Stay updated on security best practices through training and certifications
Implement security protocols such as firewalls, antivirus software, and encryption
Regularly monitor systems for vulnerabilities and apply patches and updates
Educate users o...
My notice period is currently one month.
Notice period is one month
I am required to give one month's notice before leaving my current position
I can start a new role after serving my notice period
posted on 27 Aug 2021
I applied via Referral
posted on 28 Dec 2024
posted on 16 Nov 2019
I applied via Naukri.com and was interviewed in Oct 2019. There were 5 interview rounds.
posted on 14 Dec 2024
I applied via AmbitionBox and was interviewed in Nov 2024. There was 1 interview round.
posted on 16 Nov 2019
I applied via Naukri.com and was interviewed in Oct 2019. There were 5 interview rounds.
posted on 25 Dec 2024
Desktop Support Engineer
12
salaries
| ₹1.5 L/yr - ₹4.2 L/yr |
Executive Accountant
6
salaries
| ₹1.6 L/yr - ₹3.4 L/yr |
Technical Support Engineer
4
salaries
| ₹1.5 L/yr - ₹2.2 L/yr |
Senior Software Developer
4
salaries
| ₹11 L/yr - ₹16 L/yr |
System Administrator
3
salaries
| ₹3.1 L/yr - ₹3.1 L/yr |
Marpu Foundation
Huawei Technologies
HCL Infosystems
Z X Learning