Beruflich Dokumente
Kultur Dokumente
BIOS are abbreviated as basic input output system and present in all computers. The main
purpose of the BIOS is that it ensures that all the components of the computer function together.
All details regarding the hardware components in the system are contained in the BIOS. Special
software is another name offered to BIOS as it interfaces the main hardware components of the
system with the operating system. The flash memory chip on the motherboard is where it is
stored.
3. What experience do you possess in technical support field?
If you possess any experience in the same field you can mention and become an ideal candidate
for the job role. Remember to speak about all the experiences and opinions in a professional and
positive manner. Talk about your previous job and the technical aspects that you have handled.
4. Tell me about yourself?
This is one of the usual questions and the very first question asked in any job interview. Though
it may be usual, it is important to answer the question carefully. Remember to maintain the
answer for a minute or two and not more than that. The topics to be covered in this question are
education, early years, recent career experience and work history. This is a warm-up question and
does not waste your best points on it.
5. What are the hardware components of desktop computer/laptop?
This is a basic question to test the basic knowledge of computers. The answer would be that the
hardware components for desktop and laptop computers are motherboard, processor, RAM,
monitor, mouse, soundcard, keyboard, graphics, hard disk drive, power supply, and floppy disk
drive.
6. What do you know about our organization?
For this particular question, the candidate must be able to mention the services, products,
reputation, image, history, management style, goals, problems and more about the organization.
Your answer should be formulated in a way which shows that you have invested time in
researching about the company. Also, show that you like to learn more about the organization.
Make your answers to sound positive and impress the interviewer.
7. Mention the difference between RAM and ROM?
RAM is random access memory which is used to store data temporarily. It is the data which the
computer is working presently. ROM is called read-only memory which is a permanent type of
memory storage for storage of important data. An example can be the BIOS.
8. Why do you want to work for us?
The answer should be formulated in a manner which satisfies the needs of the company. Your
answer can be that you wanted to be a part of the team because the organization possesses strong
management style. You can also mention that since the company accentuates on research and
development, you can get a chance to expose your skills and talent for the same. Proper
homework is mandatory in order to answer the question in the right manner.
9. What would you do when audio is not working on the computer?
The answer to this question is to check the basic cable connections. The connections that lead
from speakers to power must be checked. Finally, the device drivers can be checked out and also
the volume control must be checked.
10. What can you contribute us that someone else cannot?
For this question, show how valuable you are. Mention your records and how you would get
things accomplished. Mention all your accomplishments in your career and other specifics from
your resume. Also, assure that you can obtain results with your interest and skills you possess
and you would be considered a valuable employee. Also, answer that youre a person who
discovers problems, sets priorities, and can solve them with your experience.
11. What are the things to be done when a customer calls up that his computer is slow?
The IT officer first needs to check if the computer takes a longer time to start. The next step
would be to check if the computer is slow with just one application or completely. Then the
system is checked for virus, spyware, and malware. And finally, the system is to be checked for
the space available in the hard disk drive.
12. What is the need for device drivers?
Device drivers are also a piece of software which is considered mandatory to run the hardware
components in the system. These questions are basics and any candidate should possess basic
knowledge of these aspects.
13. Name the latest computer processors?
This question tests your knowledge and if youre updated with the latest technological trends.
The latest computer processors are I3, I5, and I7 processor and Intel Pentium Quad Core.
14. What are the attractive aspects and unattractive aspects that you consider about the
position?
Research and find out few attractive aspects of the job and mention them. For unattractive aspect
mention a single but minor unattractive aspect of the position which is not considered much.
15. Do you have an idea about the blue screen of death (BSOD)?
The indicant of a critical system problem is called blue screen of death where in this case the
computer freezes completely. In such a situation it does not denote anything. The system can be
restarted or booted in the safe mode to solve this issue.
22. What are the lights that are present on the modem and what do they indicate?
The lights on the modem are power light which indicates if the power is on or off. The link light
is the next light which makes sure if the modem is getting the broadband signal from the ISP. To
ensure if the internet is working, data light is utilized. Connectivity light is one ensures if the
modem is linked to the computer. These are the lights present in the modem and their functions.
23. What are the steps you follow to solve a technical problem?
This question would present your familiarity with the IT support process. Your answer would
also be a key which would enable the employer schedule for training if required. Remember to
list down all the steps for solving in the right order and also answer that each organization has
their own set of procedures.
24. What are the tools do you think is mandatory for problem solving?
Team members, experience, manuals, and knowledge are a few tools which are useful for
troubleshooting. Also do not present that team members are the main tool because any issue to be
solved must be handled independently.
25. As an IT support engineer have you learned from your mistakes?
The real fact is that everyone who works makes a mistake. There is no loss in making a mistake
while working. The main aspect of asking this question is to know if the candidate makes
mistakes and learns from it without repeating. To make this question an apt one, you can state an
example where you made a mistake and learned from it and also never repeated the same.
These are a few common interview questions and answers for IT support. Almost all answers
should be formulated in a positive tone and focusing on the clients and solving their issues.
Candidates should be aware of basic technical knowledge and troubleshooting and hardware
related topics. IT support is one highly demanded job and hence proper knowledge is required to
solve the questions in the interview.
The candidates should also make a note of all the aspects that must not be asked to the employer.
Some of them are salary, perks, leave and more are few aspects which must not be discussed in
an interview. Candidates who are unaware of the happenings in an IT support interview can run
through these hints. These are commonly asked questions and proper preparation would surely
fetch you more marks and help you clear the interview. On that note, good luck.
idden or administrative shares are share names with a dollar sign ($) appended to their names.
Administrative shares are usually created automatically for the root of each drive letter. They do
not display in the network browse list.
What is Client/Server?
Clients and Servers are separate logical entities that work together over a network to accomplish
a task. Many systems with very different architectures that are connected together are also called
Client/Server.
(ii)Centralize administration
(iii)Main aim is to secure data
(iv)Best suite in company environments
Linux doesnt support windows file system that contain partition scheme. It (Linux) has its own
file system known as ext2, and ext3. it will install only on it.In linux file system it will install
on / (root) partition.
What is IP?
Internet Protocol (IP) is an unreliable, best effort delivery, connection-less protocol used for
transmitting and receiving data between hosts in a TCP/IP network
What is layer?
Layer is a completely logical partition of PDU (protocol data unit) process. That define how the
information is travel form one computer to other over the network.
What is TCP/IP?
It is combination of two protocols TCP and IP. It is used for reliable data transfer.
The collection of mostly used software released in package Form Company. For Example MsOffice that contain word, power point, Excel, etc.
IN - 'IN' stands for India. The 'IN' is a 2-letter country code for India.
10Base2 An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that
uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum
of 2 segments.
10Base5An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that
uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.
10BaseTAn Ethernet term meaning a maximum transfer rate of 10 Megabits per second that
uses baseband signaling and twisted pair cabling.
What is the difference between an unspecified passive open and a fully specified
passive open?
An unspecified passive open has the server waiting for a connection request from a client.
A fully specified passive open has the server waiting for a connection from a specific client.
External Data Representation is a method of encoding data within an RPC message, used to
ensure that the data is not system-dependent.
When were OSI model developed and why its standard called 802.XX and so on?
OSI model was developed in February1980 that why these also known as 802.XX Standard
(Notice 80 means ==> 1980, 2means ==> February)
What is IP?
It's a unique 32 bits software address of a node in a network.
Three ranges of IP addresses have been reserved for private address and they are not valid for use
on the Internet. If you want to access internet with these address you must have to use proxy
server or NAT server (on normal cases the role of proxy server is played by your ISP.).If you do
decide to implement a private IP address range, you can use IP addresses from any of the
following classes:
Class A 10.0.0.0 10.255.255.255
Class B 172.16.0.0 172.31.255.255
Class C 192.168.0.0 192.168.255.255
What is APIPA?
Automatic private IP addressing (APIPA) is a feature mainly found in Microsoft operating
systems. APIPA enables clients to still communicate with other computers on the same network
segment until an IP address can be obtained from a DHCP server, allowing the machine to fully
participate on the network. The range of these IP address are the 169.254.0.1 to 169.254.255.254
with a default Class B subnet mask of 255.255.0.0.
What is FQDN?
An FQDN contains (fully qualified domain name) both the hostname and a domain name. It
uniquely identifies a host within a DNS hierarchy
Which command will you use to find out the name of the pc in networks?
NSLOOKUP [192.168.0.1]
[Ip of target computer]
What do you need to do that your browser will point URL www.example.com to
the internal IP address 127.99.11.01?
Make changes in the hosts file in C:\WINDOWS\system32\drivers\etc
The Hosts file is looked at first before going out to the DNS (Domain Name Service) servers.
you have to put the following on new lines at the end of hosts file:
127.99.11.01 example.com
127.99.11.01 www.example.com
What is FTP?
FTP is short for File Transfer Protocol. This is the protocol used for file transfer over the
Internet.
What is router?
Router is a device that is used to connect two different networks.
What is ADS?
A central component of the Windows platform, Active Directory service provides the means to
manage the identities and relationships that make up network environments.
What is full form DHCP and how will you configure it?
Dynamic host configuration protocol
To configure it on Server
Configure your server ==>Add/Remove a role ==>DHCP server ==>complete the wizard
Start ==> Administrative tools ==> DHCP ==>New scope ==> Wizard
Now authorized this server and do activate it
On client
Local area network ==> tcp/ip ==> obtain ip automatically
Obtain DNS automatically
How will you remove this error ntldr missing press any key to reboot the
system ?
Reboot the system with XP, ( apply also on server2003,) cd
On setup screen press to R to repair the window
Now provide the administrator password
C:\>cd f:( your cd drive latter, f is taken as the example )
f:\>cd i386
f:\>copy ntldr c:\
f:\>exit
reboot the system
Why do we do networking?
For data sharing
To accumulate hardware resource
What is network?
A network is basically all of the components (hardware and software) involved in connecting
computers across small and large distances.
What is networking?
A process that is describes how the network will connect.
What is topology?
A topology defines how the devices are connected. Further it is divided in physical and logical
topology.
Where are the Windows NT Primary Domain Controller (PDC) and its Backup
Domain Controller (BDC) in Server 2003?
The scheme of PDC and BDC is replaced by The Active Directory in server 2000 and further.
Now all domain controllers share a multi master peer-to-peer read and write relationship that
hosts copies of the Active Directory.
What is LILO?
LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory,
and tell the system which partition and hard drive to boot from.
I can't seem to access the Internet, don't have any access to the corporate
network and on IP configuration on my address is 169.254.*.*. What happened?
The 169.254.*.* net mask is assigned to Windows machines running 98/2000/XP if the DHCP
server is not available. The name for the technology is APIPA (Automatic Private Internet
Protocol Addressing).
We've installed a new Windows-based DHCP server, however, the users do not
seem to be getting DHCP leases off of it.
The server must be authorized first with the Active Directory.
What's the major difference between FAT and NTFS on a local machine?
FAT and FAT32 provide no security over locally logged-on users. Only native NTFS provides
extensive permission control on both remote and local files.
What is presentation layer and how it is responsible for in the OSI model?
The presentation layer establishes the data format prior to passing it along to the network
application's interface. TCP/IP networks perform this task at the application layer
When were OSI model developed and why its standard called 802.XX and so on?
OSI model was developed in February1980 that why these also known as 802.XX Standard
(Notice 80 means ==> 1980, 2means ==> February)
What is OSPF?
It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses
knowledge of an Internet's topology to make accurate routing decisions.
What is Kerberos?
It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos
uses encryption to prevent intruders from discovering passwords and gaining unauthorized
access to files.
It is a host that has a multiple network interfaces and that requires multiple IP addresses is called
as a Multihomed Host.
It is a problem that can ruin TCP performance. This problem occurs when data are passed to the
sending TCP entity in large blocks, but an interactive application on the receiving side reads 1
byte at a time.
What is region?
When hierarchical routing is used, the routers are divided into what we call regions, with each
router knowing all the details about how to route packets to destinations within its own region,
but knowing nothing about the internal structure of other regions.
BOOTP helps a diskless workstation boot. How does it get a message to the
network looking for its IP address and the location of its operating system boot
files?
BOOTP sends a UDP message with a subnet work broadcast address and waits for a reply from a
server that gives it the IP address. The same message might contain the name of the machine that
has the boot files on it. If the boot image location is not specified, the workstation sends another
UDP message to query the server.
DNS uses UDP for communication between servers. It is a better choice than TCP because of the
improved speed a connectionless protocol offers. Of course, transmission reliability suffers with
UDP.
What are the three type of routing tables and What are the advantages and
disadvantages of these?
The three types of routing tables are fixed, dynamic, and fixed central.
A fixed table must be manually modified every time there is a change.
A dynamic table changes its information based on network traffic, reducing the amount of
manual maintenance.
A fixed central table lets a manager modify only one table, which is then read by other devices.
The fixed central table reduces the need to update each machine's table, as with the fixed table.
Usually a dynamic table causes the fewest problems for a network administrator, although the
table's contents can change without the administrator being aware of the change.
What is attenuation?
The degeneration of a signal over distance on a network cable is called attenuation.
What is cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
What is RAID?
A method for providing fault tolerance by using multiple hard disk drives.
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a
remote computer and it hides the networking hardware from applications.
NETBEUI is NetBIOS extended user interface. A transport protocol designed by Microsoft and
IBM for the use on small subnets.
What is redirector?
Redirector is software that intercept
What is Beaconing?
The process that allows a network to self-repair networks problems. The stations on the network
notify the other stations on the ring when they are not receiving the transmissions. Beaconing is
used in Token ring and FDDI networks.
What is SAP?
Series of interface points that allow other computers to communicate with the other layers of
network protocol stack.
What is subnet?
A generic term for section of a large networks usually separated by a bridge or router.