Filter interviews by
An email client is a software application used to access and manage email messages.
Allows users to send, receive, and organize emails
Can be web-based (e.g. Gmail, Outlook.com) or desktop-based (e.g. Microsoft Outlook, Thunderbird)
Supports features like composing, forwarding, replying to emails, and managing contacts and calendars
To solve Bsod problem, check for hardware issues, update drivers, run system file checker, and check for malware.
Check for hardware issues such as faulty RAM or hard drive
Update drivers for all hardware components
Run system file checker to scan and repair corrupted system files
Check for malware using antivirus software
Top trending discussions
posted on 15 Oct 2024
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There were 3 interview rounds.
My future goal is to become a senior Desktop Support Engineer and achieve industry certifications.
Obtain industry certifications such as CompTIA A+ and Microsoft Certified Desktop Support Technician (MCDST)
Gain experience in troubleshooting complex technical issues
Lead projects to improve efficiency and productivity in the IT department
DHCP stands for Dynamic Host Configuration Protocol. It is a network management protocol used to automatically assign IP addresses to devices on a network.
DHCP assigns IP addresses to devices on a network
It also provides other network configuration information such as subnet mask and default gateway
DHCP servers lease IP addresses to devices for a specific period of time
DHCP helps in reducing manual configuration errors
To boot a new laptop, you need to press the power button and wait for the operating system to load.
Press the power button to turn on the laptop
Wait for the manufacturer's logo to appear on the screen
The operating system will start loading
Enter any necessary login credentials if prompted
I applied via campus placement at Veer Bahadur Singh Purvanchal University (VBSPU) and was interviewed in Sep 2024. There was 1 interview round.
posted on 14 Nov 2024
I applied via Naukri.com and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated and experienced Desktop Support Engineer with a strong background in troubleshooting and resolving technical issues.
Over 5 years of experience in providing desktop support to end users
Proficient in diagnosing and resolving hardware and software issues
Skilled in setting up and configuring desktops, laptops, and peripherals
Excellent customer service and communication skills
Certified in CompTIA A+ and Mic...
The DORA process stands for Discover, Offer, Request, and Acknowledge. It is a method used in DHCP to assign IP addresses to devices.
Discover: Device sends a broadcast message to discover DHCP servers on the network
Offer: DHCP server responds with an IP address offer to the device
Request: Device requests the offered IP address from the DHCP server
Acknowledge: DHCP server acknowledges the request and assigns the IP addr
An incident is an unplanned interruption to an IT service or reduction in the quality of an IT service. A service request is a formal request from a user for something to be provided.
An incident is a disruption to normal operation that requires immediate attention to restore service.
A service request is a formal request from a user for information, advice, a standard change, or access to a service.
Examples: Incident -
The outlook file responsible for taking backup is the PST file.
PST file stores emails, contacts, calendar events, and other data in Outlook.
Users can manually backup their PST file by exporting it from Outlook.
Third-party backup software can also be used to automatically backup the PST file.
SMTP - 25, POP - 110, IMAP - 143
SMTP uses port 25 for sending emails
POP uses port 110 for receiving emails
IMAP uses port 143 for accessing emails
posted on 30 Dec 2024
I applied via Company Website and was interviewed in Dec 2021. There were 5 interview rounds.
Active Directory is a directory service developed by Microsoft for Windows domain networks.
It stores information about network resources such as computers, users, and groups.
It provides authentication and authorization services for Windows-based computers.
It allows administrators to manage network resources from a central location.
It uses a hierarchical structure of domains, trees, and forests to organize network resou...
To judge RAM faulty, run memory diagnostics and check for errors.
Run memory diagnostics software like Memtest86+ or Windows Memory Diagnostic
Check for errors in the diagnostic report
Test each RAM module individually to identify the faulty one
Look for symptoms like frequent crashes, blue screens, and system freezes
Ad work refers to the process of creating and managing advertisements for a company or product.
Ad work involves researching target audiences and creating compelling ad copy and visuals.
It also includes selecting the appropriate advertising channels, such as social media or print media.
Ad work requires analyzing the effectiveness of ads and making adjustments as needed.
Examples of ad work include creating a TV commercia...
A hub is a simple device that connects multiple devices in a network. A switch is a more advanced device that directs data to specific devices. A router connects multiple networks and directs data between them.
A hub operates at the physical layer of the OSI model, while a switch operates at the data link layer.
A hub broadcasts data to all devices connected to it, while a switch sends data only to the device it is inten...
VPN is a secure way to access a private network remotely over the internet.
VPN stands for Virtual Private Network
It encrypts the data transmitted over the internet
It allows remote access to a private network
It provides security and privacy to the users
Examples of VPNs are OpenVPN, Cisco AnyConnect, etc.
The default size of a PST file varies depending on the version of Outlook.
In Outlook 2003 and earlier, the default size limit is 2GB.
In Outlook 2007 and 2010, the default size limit is 20GB.
In Outlook 2013 and later, the default size limit is 50GB.
The size limit can be changed by modifying the registry or using third-party tools.
DNS resolves domain names to IP addresses, while DHCP assigns IP addresses to devices on a network.
DNS stands for Domain Name System and is responsible for translating domain names into IP addresses.
DHCP stands for Dynamic Host Configuration Protocol and is responsible for assigning IP addresses to devices on a network.
DNS is used to locate resources on a network, while DHCP is used to manage IP addresses and network c...
IP range refers to a set of IP addresses that fall within a specific numerical range.
IP range is defined by a starting IP address and an ending IP address
It is used to identify a group of devices on a network
CIDR notation is commonly used to represent IP ranges, such as 192.168.0.0/24
IP ranges can be used for security purposes, such as firewall rules or access control lists
There are 7 layers in the OSI model. Layer names are Physical, Data Link, Network, Transport, Session, Presentation, and Application.
The OSI model has 7 layers.
The layers are Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with adjacent layers.
The layers are organized in a hierarchical manner.
Examples of protocols at each layer include ...
I applied via Referral and was interviewed in Aug 2021. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Mar 2024. There were 3 interview rounds.
I applied via Job Portal and was interviewed in Jan 2024. There were 2 interview rounds.
Intune is a cloud-based service by Microsoft for managing mobile devices and applications.
Intune helps organizations manage the mobile devices and applications used by their employees.
It allows for remote management of devices, including enforcing security policies and installing software updates.
Intune can be used to manage devices running on various platforms, such as Windows, iOS, and Android.
It provides features li...
MDM mobile refers to Mobile Device Management software used to manage and secure mobile devices in an organization.
MDM mobile is used to remotely manage and secure mobile devices such as smartphones and tablets.
It allows IT administrators to enforce security policies, deploy applications, and monitor device usage.
Examples of MDM mobile software include AirWatch, MobileIron, and Microsoft Intune.
BSOD stands for Blue Screen of Death, a Windows operating system error screen.
BSOD is a stop error screen that appears when a critical system error occurs in Windows operating systems.
It is often caused by hardware failures, driver issues, or software conflicts.
Examples of BSOD error messages include 'IRQL_NOT_LESS_OR_EQUAL' and 'KERNEL_SECURITY_CHECK_FAILURE'.
A ticking tool is a software used for monitoring and tracking issues or tasks in a systematic manner.
Ticking tools help in organizing and prioritizing tasks for efficient resolution.
They often include features like ticket creation, assignment, status tracking, and resolution.
Popular ticking tools include Jira, ServiceNow, and Zendesk.
An incident is an unplanned event that disrupts normal operations, while SR stands for Service Request which is a formal request for something to be done.
An incident is typically a problem or issue that needs to be resolved quickly to minimize impact on operations
Service Requests are formal requests for new services, changes to existing services, or information
Examples of incidents include network outages, software cra...
based on 2 interviews
Interview experience
based on 1 review
Rating in categories
Engineer- Customer Support
5
salaries
| ₹1.7 L/yr - ₹3 L/yr |
Desktop Support Engineer
3
salaries
| ₹1.8 L/yr - ₹2.4 L/yr |
TCS
Wipro
Infosys
HCLTech