Top Banner
Q: will be based on - Printers, OS, basic hardware, Office, networking (TCPIP troubleshooting), ect. General Questions Q. What desktop operating systems are you familiar with? A. I am familiar with windows operating system(win98, vista, xp, win 7) and I also have knowledge about unix operating system (solaris operating system) Q. Have you used imaging software before? How do you find these tools useful? A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that you’ve used. Hiring managers want to assess your in-depth knowledge and experience with using these tools. This means talking about how you use their various feature sets. (If you have an opinion, you probably know the product pretty well.) Q. What are the pitfalls of using imaging software? A. This question is meant to assess how well you know these products. For example, discussing the importance of testing the image demonstrates that you use these tools on a regular basis. Q. Have you used any software distribution tools? If so, which ones and how were they used? A. I used deltashot,I used rediance, IBI|S ,,field engineer dispatch application, parts shipment tools, in blackberry I used black berry desktop software, BIS tools(RIM) Q. What do you like most about desktop support? A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the job: being busy, working with different people, and the challenges of learning new operating systems and configurations.
31

Interview Q for DS

Dec 22, 2015

Download

Documents

Interview Q for DS
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Interview Q for DS

Q: will be based on - Printers, OS, basic hardware, Office, networking (TCPIP

troubleshooting), ect.

General Questions

Q. What desktop operating systems are you familiar with?

A. I am familiar with windows operating system(win98, vista, xp, win 7) and I also have knowledge about unix

operating system (solaris operating system)

Q. Have you used imaging software before? How do you find these tools useful?

A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that

you’ve used. Hiring managers want to assess your in-depth knowledge and experience with using these tools. This

means talking about how you use their various feature sets. (If you have an opinion, you probably know the product

pretty well.)

Q. What are the pitfalls of using imaging software?

A. This question is meant to assess how well you know these products. For example, discussing the importance of

testing the image demonstrates that you use these tools on a regular basis.

Q. Have you used any software distribution tools? If so, which ones and how were they used?

A. I used deltashot,I used rediance, IBI|S ,,field engineer dispatch application, parts shipment tools, in blackberry I

used black berry desktop software, BIS tools(RIM)

Q. What do you like most about desktop support?

A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the

job: being busy, working with different people, and the challenges of learning new operating systems and

configurations.

Q. What do you like least about desktop support?

A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here would be

not being able to resolve a problem in a timely manner for reasons outside your control, such as hardware failure.

Stick to things outside of your control for the best response.

Q. When solving a desktop problem, do you prefer to work with the end-user, your peers, or on your own?

A. This is another question to determine your fit within the organization. Hiring managers understand that to be

successful as a support technician you will have to work in a team environment. This means working with other

employees, vendors, and end-users on a constant basis.

Q. Can you describe a situation where you have had to deal with a difficult person? How did you handle it?

Would you do anything differently?

Page 2: Interview Q for DS

A. Desktop support can be very demanding some days. End-users only see their own priority needs and often are not

interested in other demands on your time. This question explores how you deal with a difficult end-user by

understanding their problem, assessing priorities, and communicating a timeframe for resolution. Often good

communication can help both sides come to an agreement. Make sure you have an example with a successful

outcome.

Q. How would you say you are able to handle stress?

A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress. Sometimes from

the answer, they can also determine whether you are prone to stress. When responding, some techniques for

handling stress that you may want to talk about include continually evaluating what’s on your plate and prioritizing,

communicating with your manager on what your priorities are, and making sure that you take a break to reenergize,

particularly at lunch time.

Q. What do you see yourself doing two or three years from now?

A. Hiring managers want you to stick around. They realize that you will not be in this position forever, and they

want to make sure there’s a desire to move up within the organization as well as the right fit. They ask this question

to see whether there’s a growth path for you possible within the organization. As a desktop technician, natural

growth paths are team leads, quality assurance, engineering positions, and entry-level development. Be honest about

where you want to be in two to three years, and ask the interviewer whether they see your career path as a

possibility.

Q. How do you learn new technologies?

A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning technology

on their own and who has the foresight to look for training opportunities. Besides the traditional books and manuals,

don’t forget to include user groups, eLearning subscriptions, and IT professional sites such as CramSession.

Q. How do you prioritize tasks and manage your time?

A. What hiring managers want to know is whether you have time-management skills. Everyone manages their time

differently, but think about how you handle e-mail, when you check voice mail, how you respond to pages, when

you research and document, and how you pick up new trouble tickets.

Q. Imagine the following situation: you receive three simultaneous calls from three vicepresidents who need

assistance immediately. How do you manage these conflicting priorities?

A. Obviously this is a trick question. What the hiring manager is trying to assess is how you set expectations with

each of the individuals, knowing very well that you won’t be able to assist all of them at the same time. They are

also looking for how you will prioritize each of these incidents, including seeking assistance from peers and

supervisors in order to meet user expectations. Don’t allow the “tyranny of the urgent” to divert you from

managementestablished support priorities.

Q. How would you handle a user who continually misdiagnoses their PC issues?

A. By asking this question, the hiring manager is assessing your customer service skills. In this situation, you may

Page 3: Interview Q for DS

want to discuss that the key is to not offend the user and turn them off to your support services. In handling this

situation, you would pay particular attention to ways you can build trust with the user and lead them to the right

resolution to their problem.

These components may include:

Acknowledging the user’s diagnosis

Asking the user to reproduce the problem

Finding a solution that works

Q. How do you handle setting up new employees?

A. This question is used by the hiring manager to assess your knowledge of common practices within the IT

department, such as setting up new users. Obviously, the IT department plays a critical role in the productivity of the

new employee. The role of the desktop technician is to help ease the new employee into the resources available to

them and get them up to speed quickly. In responding to this question, you may want to talk about some of the tools

you’ve used in

the past to help users acquaint themselves with their new environment. Some tools that help are:

A new-user welcome letter that is customized to the specific user with all their relevant information

including telephone extension, how to access voice mail, and how to log in. It might also include a FAQ on

getting help.

A “Getting to Know Your Helpdesk” document that provides an orientation to helpdesk service, such as

how to contact the helpdesk, its hours of operation, what is and what is not supported by the helpdesk, and

answers to common new-user questions.

Question: What is your experience with hardware and software?Answer: Generally speaking, system analysts provide tech-support for hardware and software or using hardware and software tools. Analysts install and maintain, as well as do research on hardware and software in order to optimize performance. Provide also specifics about the types of hardware and software you have actually worked with and in what context.

Question: What characteristics should a system analyst possess to be good at his job?Answer: System analysts are technical experts and outstanding analytical thinkers. They are highly organized and knowledgeable about many different types of technological systems. They are also able to adapt to the various unique technological conditions which each new company brings. They possess reasonable communication skills and are able to prepare effective reports, flowcharts, diagrams.

Question: What experience do you have with team work?Answer: The job of a system analyst often requires communicating with relevant staff to coordinate information and operation in order to optimize the system at all levels, in all departments. Effective team communication is key.

Page 4: Interview Q for DS

Question: Can you provide the documentation required by the position of system analyst?Answer: Describe the various documentation you keep as part of your daily responsibilities. Analysts document problems as well as the solutions required or implemented. They make records of inventory and maintain system documentation.

Question: What is your technical expertise in this field?Answer: Be specific here about what you actually have training and experience in. But generally speaking, system analysts are usually experts in computer systems, hardware platforms, and programming techniques.

IT help desk interview questions and Computer Help Desk Questions

What IT help desk tools have you used in the past? What types of software applications and networking programs tools do you use? Can you

list different IT products and your knowledge of these?

Have you ever been responsible for maintaining a network setting? What was the base size, and expectations?

Describe your IT trouble shooting procedure?

What programs have you used to log and date calls?

Describe you experience in: firewalls, spy ware detection and virus ware implementation.

Describe your knowledge in: PC hardware and operating systems.

Help Desk Analyst Interview Questions

How have you built knowledge of products and services? What type of process discipline do you use?

What communicating and networking systems are you familiar with?

Have you ever used SAP or similar system?

How do you manage and organize several departments? How do you monitor these departments?

What type of systems development skills do you possess?

What are your administration practices?

What may be some issues you may perceive could cause possible calls by end users/ customers?

Page 5: Interview Q for DS

What steps do you take when taking a delicate call like – the caller is concerned with their warranty or asking for a return or refund?

Are you familiar with service manuals/schematics and how do you use them?

What if a warranty period pasts and a customer decide to turn down your support?

Do you believe a customer could cause damage to a product and expect the company to fix or replace it? How would you handle this situation?

What is your ability to self-learn?

# How do you deal with difficult customers?

Technical Questions

Q1. If a customer calls saying his computer won't boot, how will you troubleshoot it? Q2. If someone finds that their Internet connectivity is down, how would you fix the problemQ3. How would you handle a technical issue that you're unfamiliar with?

Q. What questions would you ask to help isolate a user’s problem?

A. This question is used by the hiring manger to assess your problem-solving abilities. The following represent some

of the common questions that you would ask the end-user to help diagnose a situation:

When did the problem first start?

Has the system ever worked properly?

What was the last thing done to the system prior to the failure?

Is the issue intermittent or ongoing/constant?

Are there any error messages? If so, what are the specific error messages?

Has any new hardware been added to the system?

Has any new software been added to the system, including downloads from the Internet?

Has anything changed with the system (for example, has it been moved) since the issue presented itself?

Has anyone else had access to the system?

Are there any environmental factors that could be causing the issue?

Have you done any troubleshooting on the system on your own?

Page 6: Interview Q for DS

Have you checked all the cables/connections for a tight fit?

Q. What are the main differences between the following operating systems?

A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always

critical that you know more than just the current version because there will always be a user who has a problem with

an older version. By asking this question, the hiring manager is actually testing your knowledge of different

operating systems that you may need to support. The following provides a concise summary of some of the major

differences.

Windows 2000 and XP

Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the hands of

consumers. The major changes include the following:

Device driver rollback

Remote control (single-user terminal services)

New Start menu, control panel, and user interface elements

Fast user switching

Encrypted file system support for redirected folders

Better support for roaming wireless networking

Enhanced policies

Credential Manager

Personal firewall

Q. What are typical virus sources and how do you prevent virus attacks?

A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible

virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections:

Use anti-virus software.

Perform regular updates to the virus software definition files and scan engines. Verify updates have

succeeded.

Perform regularly scheduled virus checks.

Configure software to check all files, not just program files.

Educate users on virus attacks, their consequences, and how to prevent them.

Page 7: Interview Q for DS

Know where all software came from.

Do regular backups.

Develop reporting mechanisms to inform server administrators of observed desktop infections and how

these could impact the server environment (such as deletions or corruption of files on public shares, hidden

payload files that might have been uploaded to servers, and so on).

Q. What are some of the guidelines you would recommend for implementing security at the user level?

A. Security is a major part of the desktop technician’s day-to-day responsibilities. As the closest point of contact to

the end-users, technicians need to be savvy on the different methods for enforcing security. Some of the top

techniques are included below.

Anti-virus software:

Ensure that all users install and regularly use anti-virus software on their PCs.

Instruct users to immediately notify the helpdesk when they suspect they’ve contracted a virus.

Password security:

Instruct users not to give out their passwords.

Instruct users not to write down their passwords.

Instruct users to make sure their password cannot be easily guessed by using a combination of

alphanumeric characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { } / ? < > , ; : \ | ` ’ ” .).

Instruct users to change their password if they think there is even a slight chance someone knows it.

Instruct users to ensure their password is at least eight characters long.

Instruct users not to use a variation of their user ID.

Regularly change passwords on Administrator accounts on PCs (NT, Windows 2000 and XP)

Desktop security:

Instruct users not to leave their workstation logged in overnight.

Instruct users to enable screen savers that automatically lock their PC when there is no activity on it for

more than five minutes.

Q|: How would you handle the “I can’t log in” call?

First I would ask the caller to verify that he has the correct user name and domain. Then I would ask the caller to check

if the “caps lock” key was enabled. If that doesn’t resolve the issue I would continue by asking the caller to check the

Page 8: Interview Q for DS

physical connections such as Ethernet.

The importance of this question is to make sure the candidate covers the basics and doesn’t jump to conclusions

without first troubleshooting the basics.

Q: Describe how a (substitute any technology here such as WEP, LAN, etc.) works?

WEP is a means of securing access to a wireless network and is usually established by a network administrator. WEP

keys include a series of hexadecimal digits the keys must match between devices in order for them to communicate.

Most applicants think this is a technical proficiency question; however, it’s really a question aimed at evaluating

communication skills. While candidates should be familiar with most popular acronyms they may ask you to explain

first, which is fine, as long as they can articulate the answer.

Networking:

Q:If asked to conduct an audit of all IP addresses being used in a particular office, how would

you go about doing that?

ANS: Use the IP management tools.When it comes to IP Address Management, auditing is utmost important to know who did what and when. IP Address Manager logs all the events performed using the tool with the name of the OpUtils User and the date and time of the event. This helps administrators to track and audit

Q: What does IE6 stand for?

Internet Explorer 6 (Microsoft). IE6, Internet Explorer version 6 (Microsoft).

Define these abbreviations or terms:

HTML -Hyper text Mark up Language used to design web page. You can find the

script in Internet Explorer if you click on View, Source.

CGI - Common Gateway Interface, It has only a single point for in enter and exit of

data.

URL : URL stands for Uniform Resource Locator used for web browsing. First it

starts with which protocol it should use for browsing, it means like FTP.

MIME : MIME stands for Multipurpose Internet Mail Extensions. Used by IBM. Just

to understand one Example: Microsoft uses Outlook. we can say IBM will use MIME.

HTTP: Hyper Text Transfer Protocol. It is used for web browsing.

FTP : FTP is a Protocol stands for File Transfer Protocol. Based on this

Page 9: Interview Q for DS

protocol,web pages will get displayed to us. Data transmission takes place using this

protocol.

Telnet: Telnet is used to control servers remotely. This enables you to control the

server and communicate with other servers on the network.

Shortcut or alias

IP address : Internet Protocol Address are divided into 5 classes

Class A: 1-126 , 127 is loop back

Class B: 128-191

Class C: 192-223

Class D: 224-239- Multi casting

Class E: 240-254- used by Research and Development

DNS : Stands for- Domain Name System. It is the translator if IP address to a

meaningful word.

Windows NT Domain : A Windows domain is a collection of security principals that

share a central directory database.

Windows NT Share:

Postscript : Post Script is a programming language optimized for printing graphics

and text

Database (field, record, table): Database is A collection of information organized in such a way that a

computer program can quickly select desired pieces of data.

ISP - An Internet service provider (ISP) is an organization that provides access to the Internet.

web proxy server: In computer networks, a proxy server is a server (a computer system or an

application) that acts as an intermediary for requests from clients seeking resources from other servers.

what is an ip address?/ what is static ip ?

0-255, number to identify dhcp protocol- reserve ip address call static ip address

An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication

Page 10: Interview Q for DS

12) local loop address - 127.0.0.0

Network 127.0.0.0 is reserved for IP traffic local to your host

Usually, address 127.0.0.1 will be assigned to a special interface on your host, the loop back interface, which acts like a closed circuit

Its main use is to test TCP/IP. If you can ping this address then your TCP/IP is working and your network interface is OK.

# Name 3 email clients. ( outlook express, outlook, thunderbird ),# Name 3 web browsers.(internet explorer,googlechrome,firefox)

# What is a subnet?

A subnet is a logical grouping of connected network devices. Network nodes that are related by the same IP address range. For example, computers with an address beginning with 192.168.1.x are in the same subnet.# What is ADSL?

ADSL is a type of high-speed Internet access service. It uses telephone lines to transmit data# What port does SMTP use?

For Send Mail Transfer protocol default port number as is 25.

What port does HTTP use?port 80

13) when internet is not working , then what will be first step that you will perform to troubleshoot it

ipconfig [/all] or [/renew ] or [/release ] or [/flushdns]

14 ) Bits in IP adress - 32 (4 ip adress*8 bits)

15) default sheets in Ms- excel - 3

Sub net interview qustrionion

!. What is id device and scasi device

SCSI

Small Computer System Interface, an industry standard interface that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives, CD-ROM drives, printers, and scanners faster and more flexibly than previous interfaces.

SCSI ID

Page 11: Interview Q for DS

A computer term for a unique number assigned to each device connected to a SCSI bus. It uniquely identifies the device on the SCSI channel. Each controller in an array has it’s own SCSI ID.

BASIC Hardware::

Q:How do you cut and paste using keyboard shortcuts?

Ctrl+c and ctrl+v

1) what is next to Microsoft office symbol - ans customize quick access toolbar

2) Layouts in Ms word - Print layout , web layout , fullscreen, outline, draft

3) pc is loses times , who will responsible for this ? - ans cmos

4) a blue screen appears on screen , what will be ur first step - Ans Select LKGC (Last known good configuration)

5) if Paper Jam in printer , then what will be the first step ? Remove the papers manually from printer

6) SMPS fullform - ans switch mode power supply

7) CMOS fullform - ans Complementary metal–oxide–semiconductor (CMOS)

8) If power shutdowns , which is be responsible for providing the continuous power to computer - ans UPS

what to do when printer is not working and it doesnt give any error message - options :- drivers are corrupted , Printer is not installed , Request Stucked in Queues , drivers are not installed. ( Not sure abt the ans )

9) can we customize the buttons in Ms -word –no

10) A Question Related to UNC , how we can access the workstation :- UNC / Server name or Hostname / server name ( something like that , not sure about its ans )

Typing in the the UNC address into Start>Run.

Access workstation via UNC (at Start | Run).

. 2)difference between laptop and desktop computer

3)what is protocol

Page 12: Interview Q for DS

In information technology, a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities.

The TCP/IP Internet protocols, a common example, consist of:

Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level

Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level

Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each with defined sets of rules to use with corresponding programs elsewhere on the Internet

There are many other Internet protocols, such as the Border Gateway Protocol (BGP) and the

Dynamic Host Configuration Protocol (DHCP).

Protocol - Formal description of messages to be exchanged and rules to be followed for two or more systems to exchange information.

5)what is the port for net/ithernet/

An Ethernet port is an opening on computer network equipment that Ethernet cables plug into. Ethernet ports accept cables with RJ-45 connectors

7) What is internet ?

The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (often called TCP/IP, although not all applications use TCP) to serve billions of users worldwide.

8)what is difference between between DDR 2 and DDR3 ram?

There are mainly four types of RAM; SD, DDR, DDR2 and DDR3. They differ in the way they operate and mainly in their operation speeds. All RAM's used in computers today have a synchronous interface meaning they wait for a clock signal before it can respond to clock signals.

SD RAM:

SDRAM stands for synchronous dynamic random access memory. SDRAM is Single Data Rate meaning that SDRAM can accept one command and transfer one word of data per clock cycle. Typical speeds of SDRAM are 100 and 133 MHz.

DDR SDRAM:

DDR SDRAM stands for double data rate synchronous dynamic random access memory. DDR RAM transfers data twice per clock cycle, hence the name double data rate. DDR clock speeds range

Page 13: Interview Q for DS

between 200 MHz (DDR-200) and 400 MHz (DDR-400). DDR-200 transfers 1600 MB/s, while DDR-400 transfers 3200 MB/s.

DDR2 SDRAM:

DDR2 SDRAM stands for double data rate 2 synchronous dynamic random access memory.DDR2 is twice as fast as DDR which means twice as much data is carried to the module for each clock cycle. Also due to the design improvements DDR2 consumes less power as compared to the DDR memory. DDR2 speeds range between 400 MHz (DDR2-400) and 800 MHz (DDR2-800). DDR2-400 transfers 3200 MB/s. DDR2-800 transfers 6400 MB/s.

DDR3 SDRAM:

So by now after reading the above it is quite obvious what DDR3 SDRAM stands for, double data rate 3 synchronous dynamic random access memory. In theory DDR3 is supposed to act twice as fast as DDR2 memories. Thus DDR3 speeds range between 800 MHz (DDR3-800) and 1600 MHz (DDR3-1600). DDR3-800 transfers 6400 MB/s; DDR3-1600 transfers 12800 MB/s.

Only gamers may notice the difference between DDR2 and DDR3 speeds, while for everyone else, even DDR will be sufficient. But if you are buying a new PC spending a little extra for the increased speed is always appreciated.

But in the end it all depends on your requirements and your budget. DDR3 will cost a lot more than DDR2, also for DDR3 speeds you will also need a motherboard that can support it, so if you are planning on upgrading your RAM to DDR3 you should be certain that your motherboard can support it. If your requirements do not involve heavy gaming or video editing and video processing then you have no need for the powerful DDR3 memory.

These interview questions test the knowledge of x86 Intel architecture and 8086 microprocessor

specifically.

1. What is a Microprocessor? - Microprocessor is a program-controlled device, which fetches the instructions from memory, decodes and executes the instructions. Most Micro Processor are single- chip devices.

2. Give examples for 8 / 16 / 32 bit Microprocessor? - 8-bit Processor - 8085 / Z80 / 6800; 16-bit Processor - 8086 / 68000 / Z8000; 32-bit Processor - 80386 / 80486.

3. Why 8085 processor is called an 8 bit processor? - Because 8085 processor has 8 bit ALU (Arithmetic Logic Review). Similarly 8086 processor has 16 bit ALU.

4. What is 1st / 2nd / 3rd / 4th generation processor? - The processor made of PMOS / NMOS / HMOS / HCMOS technology is called 1st / 2nd / 3rd / 4th generation processor, and it is made up of 4 / 8 / 16 / 32 bits.

5. Define HCMOS? - High-density n- type Complimentary Metal Oxide Silicon field effect transistor.

6. What does microprocessor speed depend on? - The processing speed depends on DATA BUS WIDTH.

7. What is the disadvantage of microprocessor? - It has limitations on the size of data. Most Microprocessor does not support floating-point operations.

Page 14: Interview Q for DS

8. Why does microprocessor contain ROM chips? - Microprocessor contain ROM chip because it contain instructions to execute data.

9. What is the difference between primary & secondary storage device? - In primary storage device the storage capacity is limited. It has a volatile memory. In secondary storage device the storage capacity is larger. It is a nonvolatile memory. Primary devices are: RAM / ROM. Secondary devices are: Floppy disc / Hard disk.

10. Difference between static and dynamic RAM? - Static RAM: No refreshing, 6 to 8 MOS. Dynamic RAM: Refreshed periodically, 3

11. What is cache memory? - Cache memory is a small high-speed memory. It is used for temporary storage of data & information between the main memory and the CPU (center processing unit). The cache memory is only in RAM.

12. What is called .Scratch pad of computer.? - Cache Memory is scratch pad of computer.

13. Differentiate between RAM and ROM? - RAM: Read / Write memory, High Speed, Volatile Memory. ROM: Read only memory, Low Speed, Non Voliate Memory..

14. What is NV-RAM? - Nonvolatile Read Write Memory, also called Flash memory. It is also know as shadow RAM.

HP interview question

"What is a Domain Controller?"

On Microsoft Servers, a domain controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain.[1] A domain is a concept introduced in Windows NT whereby a user may be granted access to a number of computer resources with the use of a single username and password combination.

A network server which holds a directory database that manages user access to a network, which includes logging on, authentication, and access to the network resources

A server responsible for managing domain information, such as login identification and passwords. [800-82] (see also identification, information, passwords, control, domain)

"What is the Windows registry?"

The Windows Registry is where nearly all configuration settings are stored in Windows. The Windows Registry is accessed with the Registry Editor tool.

In very simple terms, the Windows registry is the database that holds all the settings for your Windows operating system.

The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems

Page 15: Interview Q for DS

How to format windows7 c drive only?please give me the steps?

Just Take back up important file from your C Drive. After Re-start your system and press F12 (Select Boot Device) (If not open then, Again Re-Start and Press Del button, Change Bios in Boot Device is CD/DVD Drive) and select boot device is CD/DVD Drive. at the same time insert your Windows 7 OS CD in your CD Drive. after loading cd, the Windows 7 automatically asked details for install Windows 7.

How to do partition?

To create a new partition on your hard drive:

1. Click the Start button.2. Select Control Panel.

3. View your system options:

o In XP, click the Performance and Maintenance link.

o In Vista, click the System and Maintenance link.

o In 7, click the System and Security link.

4. Click the Administrative Tools link.

5. Double-click the Computer Management icon.

Note: In Windows Vista, click the Continue button.

6. In the left pane, if not already expanded, double-click Storage.7. In the left pane, select Disk Management.

8. In the lower right pane, to the right of the disk on which you want to allocate space, right-click the unlabeled black bar.

9. Create a partition.

o In XP, from the drop-down list, select New Partition....

o In Vista/7, from the drop-down list, select New Simple Volume....

Note: In XP, follow these additional steps:

1. Click Next.2. Select the type of partition you want to create.

Click Next.

Specify the size of the partition you want to create.

Page 16: Interview Q for DS

o In XP, in the Partition Size in MB: spin box, type the size you want for the partition you are creating.

o In Vista/7, in the Simple Volume Size in MB: spin box, type the size you want for the partition you are creating.

Click Next.

Select the appropriate radio button for the option you want for assigning a drive letter to the partition.

Click Next.

Select the appropriate radio button for the option to format or to not format your partition. For detailed instructions about formatting a partition, refer to Formatting a New Partition or Logical Drive on Your Hard Drive in Windows XP/Vista/7 (http://answers.vt.edu/kb/entry/2479/)

Click Next.

Click Finish.

How to go to BIOS?

Dell - XPS, Dimension, Inspiron, Latitude. OptiPlex, Precision, Vostro

Press F2 when the Dell logo appears. Press every few seconds until the message Entering Setup appears.

Older Dell desktops and laptops may instead use Ctrl+Alt+Enter or Del to enter BIOS.

Older Dell laptops may use Fn+Esc or Fn+F1.

Hewlett-Packard (HP) - Pavilion, TouchSmart, Vectra, OmniBook, Tablet

Press the F1, F10, or F11 key after restarting the computer. HP Tablet PCs may use F10 or F12.

Other HP computers may allow access to BIOS using the F2 or Esc keys.

IBM - PC, XT, AT

Press F1 immediately after powering on the computer. Older IBM computers (including some laptops) may utilize the F2 key for BIOS entry.

How to see windows log ?

Ans: Right click "My Computer" icon, left Click Manage. In the Tree on the left click Event Viewer, then click System.

How to see hardware status in windows laptop and desktop?

Page 17: Interview Q for DS

Device manager "My Computer" icon, left Click Manage. In the Tree on the left click device manager

How to back up and restore in windows 7

Start>control panel>system and security>backup and restore>setup backup>backup destination

Network back up

Start>control panel>system and security>backup and restore>setup backup>backup destination>save on a network>select network location>network credential

Restore

Start>control panel>system and security>backup and restore>select back up to restore file from

How to back up and restore file and folder in vista/win 7

Open the Registry Editor by clicking the Start button , typing regedit into the Search box, and then pressing

ENTER. If you are prompted for an administrator password or confirmation, type the password or provide

confirmation.

Locate and click the key or subkey that you want to back up.

Click the File menu, and then click Export.

In the Save in box, select the location where you want to save the backup copy, and then type a name for the

backup file in the File name box.

Click Save.

Name the diff types of operating systems?

windows-xp,vista, 7,8 ... server 2003, 2008 linuxmacvista

What is different between 98 and xp?

1. Win98 Support FAT file system & XP support NTFS And Also FAT.

2. Win98 Does not Having Remote Access facility While in XP there is.

3. win98 Does not need faster processing speed while XP Need 500mhz processing Speed.

4. Win98 Does not provide System Restore while XP Provide.

5. Win98 does not having Hibernate facility While XP having Hibernate Facility.

6. Win98 And WinXp layout And visual Styles are Different.

7. WinXp improve Device Support.

Page 18: Interview Q for DS

8. WinXP having CD Burning Facility,fast user Switching.

9. Ability to support multithreading to utilize hyperthreading feature.

What is the different between xp ,vista , and windows 7

Windows 7 : It`s the latest version, it`s like buying a new car, you don`t know what could go wrong but you trust it since it`s something new.Good :- It`s more secure when compared with Vista and XP- Has more features then Vista and XP- Support for this OS will be longer than Vista.Bad :- Some applications that doesn`t work on Windows 7 and you need to search on the Internet for solutions however this is not true for popular software versions.- It claims to run on the same computer resources like XP SP 3 but from experience I can tell that it`s not true.

Vista : The predecessor of Windows 7, the second most hated OS after Windows Me.Good :- A lot of drivers available- More secure when compared with older versions of XP

Bad :- Uses a lot of computer resources- Too many disappointed users

XP SP 3 : It requires less system resources, it`s easier to use and if you know how to ``secure`` this operating system then you don`t need Vista.

Good :- It`s not using a lot of RAM or CPU memory- Pretty stable and very easy to use- There is a version called Windows XP 64 bit launched in 2005 which supports more than 4 GB.

Bad :

- Microsoft said that XP SP 3 is the latest version that fixes security issues and there will be no other security updates- You won`t find new drivers that will work with this OS in future.

What is a device manager?

Page 19: Interview Q for DS

The Device Manager is a Control Panel applet in Microsoft Windows operating systems. It allows users to view and control the hardware attached to the computer. When a piece of hardware is not working, the offending hardware is highlighted for the user to deal with.

An administrative tool that you can use to manage the devices on your computer. Using Device Manager, you can view and change device properties, update device drivers, configure device settings, and uninstall devices

What do you mean by restore and recovery?

System Restore is a feature first introduced in Windows XP. It allows users to restore their computers to a previous state without losing personal data files. System Restore automatically creates restore points, which you can use to revert your system to the way it was at a previous time

The tools available on the System Recovery Options menu can be used to repair Windows files, restore important settings to previous values, test your computer's memory, and much more.

What if you forget password?

If you've forgotten your Windows password and you're on a domain, you should contact your system administrator

to reset your password. If you're not on a domain, you can reset your password by using a password reset disk or by

using an administrator account.

If you forget the administrator password and don't have a password reset disk or another administrator account, you

won't be able to reset the password. If there are no other user accounts on the computer, you won't be able to log on

to Windows and will need to re-install Windows.

Hide allTo use your password reset disk to reset your password

You will not be able to follow these steps if you have locked your computer.

1. If you have typed the wrong password, you'll receive a message that says your user name or password is

incorrect. When this message appears, click OK.

2. Click Reset password, and then follow the instructions.

To use an administrator account to reset your password

Warning

Page 20: Interview Q for DS

If you use an administrator account to reset the password, you will permanently lose access to any e-mail

messages or encrypted files that are on that account.

Note

These steps cannot be completed on Windows Vista Starter, Windows Vista Home Basic, and Windows

Vista Home Premium.

1. Log on to the administrator account that you will use to reset the forgotten password.

2. Open Local Users and Groups by clicking the Start button , typing lusrmgr.msc into the Search box,

and then pressing ENTER. If you are prompted for an administrator password or confirmation, type the

password or provide confirmation.

3. Double-click Local Users and Groups, and then click Users.

4. Right-click the account that you need to reset the password for, and then click Set Password.

5. Type and confirm the new password.

1.Basic technical knowledge of Operating systems like Windows XP2.Basic Knowledge of MS Outlook troubleshooting, Internet and Networking3.Basic technical knowledge of PCs

Check google-Troubleshooting Guide Business PCs(HP)

Active directory

Active Directory is a database that keeps track of all the user accounts and passwords in your organization. It allows you to store your user accounts and passwords in one protected location, improving your organization's security.

Windows Server 2008 R2 includes several tools that let you manage Active Directory from the command line. Here’s a look at the key tools and what they do.

Adprep Prepares a Windows forest or domain for installation of Windows domain controllers (DCs). To prepare a forest or a domain, use adprep /forestprep and adprep /domainprep, respectively. (Note that for Windows Server 2003 SP1 or later, a domain’s Group Policy isn’t automatically updated. To prepare Group Policy for the domain, you must use the command adprep /domainprep /gpprep. This modifies the access control entries (ACEs) for all Group Policy object (GPO) folders in the SYSVOL directory to grant read access to all enterprise domain controllers. This level of access is required to support RSoP for site-based policy. Because this security change causes the NT File Replication Service (NTFRS) to resend all GPOs to all domain controllers, you should use adprep /domainprep /gpprep only after careful planning.)

Page 21: Interview Q for DS

Dsadd Adds computers, contacts, groups, organizational units, and users to Active Directory. Type dsadd objectname /? at a command prompt to display help information about using the command, such as dsadd computer /?.

Dsget Displays properties of computers, contacts, groups, organizational units, users, sites, subnets, and servers registered in Active Directory. Type dsget objectname /? at a command prompt to display help information about using the command, such as dsget subnet /?.

Dsmod Modifies properties of computers, contacts, groups, organizational units, users, and servers that exist in Active Directory. Type dsmod objectname /? at a command prompt to display help information about using the command, such as dsmod server /?.

Dsmove Moves a single object to a new location within a single domain or renames the object without moving it. Type dsmove /? at a command prompt to display help information about using the command.

Dsquery Uses search criteria to find computers, contacts, groups, organizational units, users, sites, subnets, and servers in Active Directory. Type dsquery /? at a command prompt to display help information about using the command.

Dsrm Removes objects from Active Directory. Type dsrm /? at a command prompt to display help information about using the command.

Ntdsutil Allows the user to view site, domain, and server information; manage operations masters; and perform database maintenance of Active Directory. Type ntdsutil /? at a command prompt to display help information about using the command.

Example

Using a command line

1. Open Command Prompt.

2. Type: dsmod userUserDN-pwdNewPassword

3. If you want to require the user to change this password at the next logon process,

Type: dsmod userUserDN-mustchpwd {yes|no}

Working with active directory without command

Page 22: Interview Q for DS

Exchange server………

To open Active Directory Users and Computers, click Start, click Control Panel, double-click Administrative Tools, and then double-click Active Directory Users and Computers.

Start >active directory icon>company name>expand>user>right lick>add user

Find>user>right lick>disable,delet,password reset

OUT LOOK email:

Outlook Express is an email client. Outlook Express allows you send and receive emails from your computer.

What is the difference between Outlook Express and Outlook?

Outlook Express, as I mentioned, comes free with Internet Explorer or Windows operating system. It's a lean and

mean email client. Microsoft Outlook on the other hand is an email client

# How do you set up a new ac acount in Outlook Express?

http://support.microsoft.com/kb/2409264

Set Up an Outlook Express E-Mail Account

The Internet Connection Wizard makes short work of setting up your online mailbox by walking you through each step for every e-mail account you set up.

1. Before you get going, make sure you know your email address along with the following information. (You may need to contact your ISP, Internet Service Provider, to get it.)

First, information about the e-mail servers

Page 23: Interview Q for DS

o The type of e-mail server you use: POP3 (most e-mail accounts), HTTP (such as Hotmail), or IMAP

o The name of the incoming e-mail servero For POP3 and IMAP servers, the name of the outgoing e-mail server

(generally SMTP)

Second, information about your account:o Your account name and password

(For some solid advice about making a secure password, read the Create strong passwords article.)

o Find out if your ISP requires you to use Secure Password Authentication (SPA) to access your e-mail account—yes or no is all that's required.

2. Start Outlook Express, and on the Tools menu, click Accounts.If the Internet Connection Wizard starts up automatically, skip ahead to step 4.

3. Click Add, and then click Mail to open the Internet Connection Wizard.

4. On the Your Name page of the wizard, type your name as you want it to appear to everyone who gets e-mail from you, and then click Next.Most people use their full name, but you can use any name—even a nickname—that people will recognize.

5. On the Internet Explorer Address page, type your e-mail address, and then click Next.

6. On the E-mail Server Names page, fill in the first block of information that you gathered from your ISP in step 1, and then click Next.

Note: If you chose HTTP as your incoming e-mail server—as for a Hotmail or MSN account—this wizard page changes slightly so you can identify your HTTP mail service provider.

Page 24: Interview Q for DS

7. On the Internet Mail Logon page, type your account name and password.

Note: If you're concerned about break-ins to your e-mail, click to clear the check in the Remember Password box. You'll then be prompted for the password each time you send or retrieve mail.

8. Click Next, and then click Finish.

You're ready to send your first e-mail!

Unsure if your new e-mail account is working? Send an e-mail message to a friend. If they get the message, your account is ready to roll! But if you run into problems setting up your account, Outlook Express offers help. Search for troubleshooting topics from Contents and Index on the Help menu