Filter interviews by
A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.
A domain is a logical grouping of network resources such as computers, printers, and servers.
It allows for centralized management of users, computers, and security policies.
Domains are commonly used in Windows environments, with Active Directory being the most popular domain service.
Domains can hav...
AADS stands for Apple Advanced Directory Services. Group Policy Management is a feature of Windows Server 2012.
AADS is a set of tools and services that allow Mac computers to integrate with Microsoft Active Directory.
Group Policy Management is used to manage and enforce group policies across a network of computers.
Server 2012 includes new features for Group Policy Management, such as the ability to manage policies for ...
MBR and GPT are partitioning schemes used on hard drives. DHCP server assigns IP addresses to devices on a network.
MBR (Master Boot Record) and GPT (GUID Partition Table) are two different partitioning schemes used on hard drives.
MBR is an older partitioning scheme that has limitations on the number and size of partitions that can be created.
GPT is a newer partitioning scheme that allows for larger partitions and more ...
A domain controller is a server that manages network security and authentication. To configure, install Active Directory Domain Services and promote server to domain controller. To add client machine, join it to the domain.
Domain controller manages network security and authentication
Install Active Directory Domain Services and promote server to domain controller
Add client machine to the domain by joining it
Use domain a...
VMware is a software that allows you to create and run virtual machines on a physical computer.
VMware is a virtualization software that creates a virtual environment on a physical computer.
It allows you to run multiple operating systems on a single machine.
VMware creates a virtual machine that acts like a real computer with its own CPU, memory, and storage.
It is commonly used in data centers to consolidate servers and ...
Cloud refers to the delivery of computing services over the internet.
Cloud computing allows users to access data and applications from anywhere with an internet connection.
It eliminates the need for physical hardware and allows for scalability and flexibility.
Examples of cloud services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
To configure a router, access its web interface and enter the necessary settings.
Connect to the router via Ethernet or Wi-Fi
Open a web browser and enter the router's IP address
Enter the login credentials (usually admin/admin)
Navigate to the settings page and configure as needed
Save the changes and reboot the router
To install Server 2012 R2, you need to have the installation media and follow the steps provided in the setup wizard.
Insert the installation media (DVD or USB) into the server.
Boot the server from the installation media.
Follow the prompts in the setup wizard to select language, time zone, and keyboard layout.
Select the edition of Server 2012 R2 you want to install.
Choose the installation type (custom or upgrade).
Select...
DNS is a system that translates domain names to IP addresses. DNS server is a computer that stores DNS records.
DNS stands for Domain Name System
DNS server stores DNS records which contain information about domain names and their corresponding IP addresses
DNS resolution process involves querying DNS servers to find the IP address of a domain name
DNS can be configured on a local network or on a public network
DNS can be c...
Configuration of Outlook involves setting up email accounts, creating rules, and managing contacts and calendars.
To configure Outlook, go to File > Account Settings > Account Settings
Add email account by entering email address and password
Create rules to automatically sort and manage emails
Manage contacts and calendars by adding, editing, and deleting entries
Set up signatures and automatic replies
Incoming mail server is a computer that receives emails from other servers and delivers them to the recipient's mailbox.
It is also known as POP3 or IMAP server.
It uses protocols like POP3, IMAP, or Exchange to receive emails.
Examples of incoming mail servers are mail.example.com, pop.example.com, imap.example.com.
It is configured in email clients like Outlook, Gmail, or Thunderbird.
Outgoing mail server is responsible for sending emails from your email client to the recipient's email server.
Outgoing mail server is also known as SMTP server.
It uses SMTP (Simple Mail Transfer Protocol) to send emails.
The outgoing mail server settings can be configured in your email client.
Examples of outgoing mail servers include smtp.gmail.com, smtp.yahoo.com, etc.
Top trending discussions
posted on 14 Oct 2021
I applied via Naukri.com and was interviewed in Sep 2021. There was 1 interview round.
IMAP and POP3 are email protocols used for retrieving emails from a mail server.
IMAP stands for Internet Message Access Protocol and allows users to access and manage their emails on a remote server.
POP3 stands for Post Office Protocol version 3 and downloads emails from a mail server to a local device.
IMAP allows for multiple devices to access and sync emails, while POP3 only allows for one device to download emails.
I...
Outlook is a personal information manager developed by Microsoft.
It is used for email communication, managing contacts, scheduling appointments, and organizing tasks.
It integrates with other Microsoft Office applications such as Word, Excel, and PowerPoint.
It allows users to create and manage multiple email accounts and folders.
It has features such as email filtering, automatic replies, and calendar sharing.
It can be a...
Safe mode is a diagnostic mode in which a computer's operating system starts with only basic functions.
Safe mode is used to troubleshoot and fix issues with the operating system or software.
In safe mode, only essential drivers and services are loaded, which can help identify and resolve problems.
Safe mode can be accessed by pressing a key during startup, such as F8 for Windows.
In safe mode, the screen resolution may be...
PST files are created to store Outlook data locally on a computer.
PST files allow users to access their Outlook data even when not connected to the internet.
They can be used to backup important emails, contacts, and calendar events.
PST files can also be used to transfer Outlook data from one computer to another.
They have a maximum size limit of 50GB in Outlook 2010 and later versions.
PST files can be password protected
TCP and UDP are protocols used for communication between devices on a network.
TCP stands for Transmission Control Protocol and is a connection-oriented protocol used for reliable data transfer.
UDP stands for User Datagram Protocol and is a connectionless protocol used for fast data transfer.
TCP is used for applications that require reliable data transfer, such as email and file transfer.
UDP is used for applications tha...
To install an operating system, you need to create a bootable media and follow the installation wizard.
Create a bootable media (USB, DVD, etc.) with the operating system image
Insert the bootable media into the computer and restart it
Follow the installation wizard and select the desired options (language, partition, etc.)
Wait for the installation to complete and restart the computer
posted on 27 Aug 2021
I applied via Referral
posted on 14 Oct 2021
I applied via Naukri.com and was interviewed in Sep 2021. There was 1 interview round.
IMAP and POP3 are email protocols used for retrieving emails from a mail server.
IMAP stands for Internet Message Access Protocol and allows users to access and manage their emails on a remote server.
POP3 stands for Post Office Protocol version 3 and downloads emails from a mail server to a local device.
IMAP allows for multiple devices to access and sync emails, while POP3 only allows for one device to download emails.
I...
Outlook is a personal information manager developed by Microsoft.
It is used for email communication, managing contacts, scheduling appointments, and organizing tasks.
It integrates with other Microsoft Office applications such as Word, Excel, and PowerPoint.
It allows users to create and manage multiple email accounts and folders.
It has features such as email filtering, automatic replies, and calendar sharing.
It can be a...
Safe mode is a diagnostic mode in which a computer's operating system starts with only basic functions.
Safe mode is used to troubleshoot and fix issues with the operating system or software.
In safe mode, only essential drivers and services are loaded, which can help identify and resolve problems.
Safe mode can be accessed by pressing a key during startup, such as F8 for Windows.
In safe mode, the screen resolution may be...
PST files are created to store Outlook data locally on a computer.
PST files allow users to access their Outlook data even when not connected to the internet.
They can be used to backup important emails, contacts, and calendar events.
PST files can also be used to transfer Outlook data from one computer to another.
They have a maximum size limit of 50GB in Outlook 2010 and later versions.
PST files can be password protected
TCP and UDP are protocols used for communication between devices on a network.
TCP stands for Transmission Control Protocol and is a connection-oriented protocol used for reliable data transfer.
UDP stands for User Datagram Protocol and is a connectionless protocol used for fast data transfer.
TCP is used for applications that require reliable data transfer, such as email and file transfer.
UDP is used for applications tha...
To install an operating system, you need to create a bootable media and follow the installation wizard.
Create a bootable media (USB, DVD, etc.) with the operating system image
Insert the bootable media into the computer and restart it
Follow the installation wizard and select the desired options (language, partition, etc.)
Wait for the installation to complete and restart the computer
posted on 27 Aug 2021
I applied via Referral
Some of the top questions asked at the Sujata Computer's Pvt.ltd Desktop Support Engineer interview -
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Network Engineer
8
salaries
| ₹1.5 L/yr - ₹7.8 L/yr |
Technical Support Engineer
7
salaries
| ₹1.8 L/yr - ₹7.2 L/yr |
Desktop Support Engineer
6
salaries
| ₹1.8 L/yr - ₹3 L/yr |
Engineer- Customer Support
5
salaries
| ₹1.9 L/yr - ₹3 L/yr |
Graphic Designer
3
salaries
| ₹3 L/yr - ₹4.2 L/yr |
Wipro
HCLTech
TCS
Infosys