Filter interviews by
Clear (1)
Different types of RAM include DDR, DDR2, DDR3, DDR4, and LPDDR.
DDR (Double Data Rate)
DDR2 (Double Data Rate 2)
DDR3 (Double Data Rate 3)
DDR4 (Double Data Rate 4)
LPDDR (Low Power Double Data Rate)
A public network IP range is a range of IP addresses that are accessible from the internet.
Public network IP ranges are assigned by Internet Assigned Numbers Authority (IANA)
Examples of public IP ranges include 1.0.0.0 to 126.255.255.255 for Class A, 128.0.0.0 to 191.255.255.255 for Class B, and 192.0.0.0 to 223.255.255.255 for Class C
Public IP addresses are unique and globally routable
To configure connectivity between two routers, you need to set up routing protocols and configure IP addresses.
Configure IP addresses on each router interface
Choose a routing protocol (e.g. OSPF, EIGRP) and configure it on both routers
Ensure both routers are in the same network or have a route to reach each other
Test connectivity using ping or traceroute commands
Top trending discussions
posted on 5 Oct 2022
I applied via Approached by Company and was interviewed in Sep 2022. There were 3 interview rounds.
Windows OS is a popular operating system developed by Microsoft.
Windows OS is available in different versions such as Windows 7, 8, 10, etc.
It has a graphical user interface (GUI) and supports multitasking.
Windows OS supports various file systems such as NTFS, FAT32, exFAT, etc.
It comes with built-in applications such as Microsoft Office, Internet Explorer, Windows Media Player, etc.
Windows OS can be customized with th...
posted on 3 Jan 2022
I applied via Naukri.com and was interviewed before Sep 2022. There was 1 interview round.
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for more unique addresses and improved security features.
IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
IPv4 supports up to 4.3 billion unique addresses, which is becoming insufficient with the growth of internet-connected devices, w...
I will install the OS using a bootable installation media or network deployment tools.
Create a bootable installation media (USB or DVD) with the OS image
Boot the computer from the installation media
Follow the on-screen instructions to install the OS
Configure settings such as language, time zone, and user accounts
Install necessary drivers and updates post installation
posted on 4 Apr 2023
I applied via Walk-in and was interviewed before Apr 2022. There were 3 interview rounds.
AD stands for Active Directory, a Microsoft technology used for managing users, computers, and other resources in a network. DHCP stands for Dynamic Host Configuration Protocol, a network protocol used for assigning IP addresses to devices.
AD is used for centralized management of network resources
AD allows for authentication and authorization of users and devices
DHCP automatically assigns IP addresses to devices on a n...
I applied via Naukri.com and was interviewed in Apr 2022. There were 2 interview rounds.
PST and OST are Outlook data files. BSOD is Blue Screen of Death. DNS is Domain Name System. VPN is Virtual Private Network.
PST and OST are data files used by Microsoft Outlook to store emails, contacts, and other data.
BSOD is a critical error screen displayed by Windows operating system when it encounters a system error.
DNS is a system that translates domain names into IP addresses, allowing computers to communicate w...
POP, IMAP, and SMTP are email protocols used for sending and receiving emails. Each protocol uses different port numbers.
POP (Post Office Protocol) is used for downloading emails from a server to a client. It uses port number 110.
IMAP (Internet Message Access Protocol) is used for accessing emails on a server from a client. It uses port number 143.
SMTP (Simple Mail Transfer Protocol) is used for sending emails from a c...
To backup a PST file, you can simply copy and paste it to an external drive or cloud storage. To speed up a slow system, try cleaning up temporary files and disabling unnecessary startup programs.
Copy and paste the PST file to an external drive or cloud storage
Use a backup software to automate the backup process
Clean up temporary files to free up space and improve performance
Disable unnecessary startup programs to redu
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Desktop l2 level related questions
How to configur system in domain
To configure SAP in user's system, follow these steps:
Install SAP GUI on the user's system
Configure the SAP logon pad with the necessary system details
Create a user ID and assign the necessary authorizations
Test the connection to ensure successful configuration
Outlook 365 offers numerous advantages for users.
Access to emails, contacts, and calendar from anywhere with internet connection
Collaboration and sharing features for team projects
Integration with other Microsoft Office applications
Automatic updates and security features
Large storage capacity for emails and attachments
Mobile app for easy access on-the-go
Bitlocker is important for securing data on Windows devices.
Encrypts data on Windows devices to prevent unauthorized access
Protects against theft or loss of devices
Meets compliance requirements for data protection
Can be managed centrally through Active Directory
Can be used in combination with other security measures like TPM and Secure Boot
Helps prevent data breaches and protects sensitive information
MFA stands for Multi-Factor Authentication, which is a security process that requires users to provide two or more forms of identification to access a system.
MFA adds an extra layer of security to protect against unauthorized access.
The most common forms of identification used in MFA are passwords, security tokens, and biometric data.
MFA can be implemented through various methods such as SMS codes, mobile apps, or hard...
I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.
A network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another for sharing data and resources.
Networks can be wired or wireless
Networks can be local (LAN), wide area (WAN), or global (Internet)
Networks use protocols like TCP/IP for communication
VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol used to manage VLAN configurations across a network. VLANs are virtual LANs that separate broadcast domains.
VTP is used to synchronize VLAN information across switches in a network
It helps in reducing the administrative overhead of manually configuring VLANs on each switch
VLANs are used to logically segment a network into separate broadcast domains
VLANs impro...
Protocol is a set of rules that govern the communication between devices in a network.
Protocol defines the format, timing, sequencing, and error checking of data transmission.
Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.
Protocols ensure that devices can communicate effectively and understand each other's data.
Basic requirements of CCNA include knowledge of networking fundamentals, routing and switching, and hands-on experience with Cisco devices.
Understanding of networking fundamentals such as TCP/IP, subnetting, and OSI model
Knowledge of routing and switching concepts including VLANs, STP, and routing protocols like OSPF and EIGRP
Hands-on experience with Cisco routers and switches
Ability to troubleshoot network issues and ...
There are multiple ways to transfer data in CCNA, including wired and wireless methods.
Data transfer methods in CCNA include Ethernet, Wi-Fi, Bluetooth, and cellular networks.
Ethernet is a common wired method used for data transfer in CCNA.
Wi-Fi allows for wireless data transfer over a local network.
Bluetooth is used for short-range wireless data transfer between devices.
Cellular networks enable data transfer over mobi
IP stands for Internet Protocol, which is a logical address used to identify devices on a network.
IP is a unique identifier assigned to each device connected to a network.
It allows devices to communicate with each other by routing data packets.
There are two versions of IP - IPv4 and IPv6.
IPv4 addresses are 32 bits long and written in decimal format (e.g. 192.168.1.1).
IPv6 addresses are 128 bits long and written in hexa...
I applied via Walk-in and was interviewed before May 2022. There was 1 interview round.
DORA (Discover Offer Request Acknowledge) is a process used by DHCP clients to obtain IP addresses from DHCP servers.
DHCP client sends a Discover message to locate available DHCP servers
DHCP server responds with an Offer message containing an available IP address
DHCP client sends a Request message to request the offered IP address
DHCP server responds with an Acknowledge message to confirm the IP address assignment
The D...
Three-way handshake is a process used in TCP/IP networking to establish a connection between two devices.
The client sends a SYN (synchronize) packet to the server.
The server responds with a SYN-ACK (synchronize-acknowledge) packet.
The client sends an ACK (acknowledge) packet to the server, and the connection is established.
This process ensures that both devices are ready to communicate and establishes the parameters of
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
What questions they will ask..
Who to develop the company profit and shares
based on 1 interview
Interview experience
Desktop Support Engineer
45
salaries
| ₹0 L/yr - ₹0 L/yr |
Talent Acquisition Executive
28
salaries
| ₹0 L/yr - ₹0 L/yr |
Application Support Engineer
23
salaries
| ₹0 L/yr - ₹0 L/yr |
Talent Acquisition Specialist
15
salaries
| ₹0 L/yr - ₹0 L/yr |
Information Technology Recruiter
14
salaries
| ₹0 L/yr - ₹0 L/yr |
Infosys
TCS
Wipro
HCLTech