You are on page 1of 24

Q: will be based on - Printers, OS, basic hardware, Office, networking (TCPIP

troubleshooting), ect.

General Questions
Q. What desktop operating systems are you familiar with?
A. I am familiar with windows operating system(win98, vista, xp, win 7) and I also have knowledge about unix
operating system (solaris operating system)
Q. Have you used imaging software before? How do you find these tools useful?
A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that
youve used. Hiring managers want to assess your in-depth knowledge and experience with using these tools. This
means talking about how you use their various feature sets. (If you have an opinion, you probably know the product
pretty well.)
Q. What are the pitfalls of using imaging software?
A. This question is meant to assess how well you know these products. For example, discussing the importance of
testing the image demonstrates that you use these tools on a regular basis.
Q. Have you used any software distribution tools? If so, which ones and how were they used?
A. I used deltashot,I used rediance, IBI|S ,,field engineer dispatch application, parts shipment tools, in blackberry I
used black berry desktop software, BIS tools(RIM)
Q. What do you like most about desktop support?
A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the
job: being busy, working with different people, and the challenges of learning new operating systems and
configurations.
Q. What do you like least about desktop support?
A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here would be
not being able to resolve a problem in a timely manner for reasons outside your control, such as hardware failure.
Stick to things outside of your control for the best response.
Q. When solving a desktop problem, do you prefer to work with the end-user, your peers, or on your own?
A. This is another question to determine your fit within the organization. Hiring managers understand that to be
successful as a support technician you will have to work in a team environment. This means working with other
employees, vendors, and end-users on a constant basis.
Q. Can you describe a situation where you have had to deal with a difficult person? How did you handle it?
Would you do anything differently?

A. Desktop support can be very demanding some days. End-users only see their own priority needs and often are not
interested in other demands on your time. This question explores how you deal with a difficult end-user by
understanding their problem, assessing priorities, and communicating a timeframe for resolution. Often good
communication can help both sides come to an agreement. Make sure you have an example with a successful
outcome.
Q. How would you say you are able to handle stress?
A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress. Sometimes from
the answer, they can also determine whether you are prone to stress. When responding, some techniques for
handling stress that you may want to talk about include continually evaluating whats on your plate and prioritizing,
communicating with your manager on what your priorities are, and making sure that you take a break to reenergize,
particularly at lunch time.
Q. What do you see yourself doing two or three years from now?
A. Hiring managers want you to stick around. They realize that you will not be in this position forever, and they
want to make sure theres a desire to move up within the organization as well as the right fit. They ask this question
to see whether theres a growth path for you possible within the organization. As a desktop technician, natural
growth paths are team leads, quality assurance, engineering positions, and entry-level development. Be honest about
where you want to be in two to three years, and ask the interviewer whether they see your career path as a
possibility.
Q. How do you learn new technologies?
A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning technology
on their own and who has the foresight to look for training opportunities. Besides the traditional books and manuals,
dont forget to include user groups, eLearning subscriptions, and IT professional sites such as CramSession.
Q. How do you prioritize tasks and manage your time?
A. What hiring managers want to know is whether you have time-management skills. Everyone manages their time
differently, but think about how you handle e-mail, when you check voice mail, how you respond to pages, when
you research and document, and how you pick up new trouble tickets.
Q. Imagine the following situation: you receive three simultaneous calls from three vicepresidents who need
assistance immediately. How do you manage these conflicting priorities?
A. Obviously this is a trick question. What the hiring manager is trying to assess is how you set expectations with
each of the individuals, knowing very well that you wont be able to assist all of them at the same time. They are
also looking for how you will prioritize each of these incidents, including seeking assistance from peers and
supervisors in order to meet user expectations. Dont allow the tyranny of the urgent to divert you from
managementestablished support priorities.
Q. How would you handle a user who continually misdiagnoses their PC issues?
A. By asking this question, the hiring manager is assessing your customer service skills. In this situation, you may

want to discuss that the key is to not offend the user and turn them off to your support services. In handling this
situation, you would pay particular attention to ways you can build trust with the user and lead them to the right
resolution to their problem.
These components may include:

Acknowledging the users diagnosis

Asking the user to reproduce the problem

Finding a solution that works

Q. How do you handle setting up new employees?


A. This question is used by the hiring manager to assess your knowledge of common practices within the IT
department, such as setting up new users. Obviously, the IT department plays a critical role in the productivity of the
new employee. The role of the desktop technician is to help ease the new employee into the resources available to
them and get them up to speed quickly. In responding to this question, you may want to talk about some of the tools
youve used in
the past to help users acquaint themselves with their new environment. Some tools that help are:

A new-user welcome letter that is customized to the specific user with all their relevant information
including telephone extension, how to access voice mail, and how to log in. It might also include a FAQ on
getting help.

A Getting to Know Your Helpdesk document that provides an orientation to helpdesk service, such as
how to contact the helpdesk, its hours of operation, what is and what is not supported by the helpdesk, and
answers to common new-user questions.

Question: What is your experience with hardware and software?


Answer: Generally speaking, system analysts provide tech-support for hardware and
software or using hardware and software tools. Analysts install and maintain, as well as
do research on hardware and software in order to optimize performance. Provide also
specifics about the types of hardware and software you have actually worked with and in
what context.
Question: What characteristics should a system analyst possess to be good at his
job?
Answer: System analysts are technical experts and outstanding analytical thinkers. They
are highly organized and knowledgeable about many different types of technological
systems. They are also able to adapt to the various unique technological conditions which
each new company brings. They possess reasonable communication skills and are able to
prepare effective reports, flowcharts, diagrams.
Question: What experience do you have with team work?
Answer: The job of a system analyst often requires communicating with relevant staff to
coordinate information and operation in order to optimize the system at all levels, in all
departments. Effective team communication is key.

Question: Can you provide the documentation required by the position of system
analyst?
Answer: Describe the various documentation you keep as part of your daily
responsibilities. Analysts document problems as well as the solutions required or
implemented. They make records of inventory and maintain system documentation.
Question: What is your technical expertise in this field?
Answer: Be specific here about what you actually have training and experience in. But
generally speaking, system analysts are usually experts in computer systems, hardware
platforms, and programming techniques.

IT help desk interview questions and Computer Help Desk


Questions

What IT help desk tools have you used in the past?


What types of software applications and networking programs tools do you use? Can you
list different IT products and your knowledge of these?

Have you ever been responsible for maintaining a network setting? What was the base
size, and expectations?

Describe your IT trouble shooting procedure?

What programs have you used to log and date calls?

Describe you experience in: firewalls, spy ware detection and virus ware implementation.

Describe your knowledge in: PC hardware and operating systems.

Help Desk Analyst Interview Questions

How have you built knowledge of products and services?


What type of process discipline do you use?

What communicating and networking systems are you familiar with?

Have you ever used SAP or similar system?

How do you manage and organize several departments? How do you monitor these
departments?

What type of systems development skills do you possess?

What are your administration practices?

What may be some issues you may perceive could cause possible calls by end users/
customers?

What steps do you take when taking a delicate call like the caller is concerned with
their warranty or asking for a return or refund?

Are you familiar with service manuals/schematics and how do you use them?

What if a warranty period pasts and a customer decide to turn down your support?

Do you believe a customer could cause damage to a product and expect the company to
fix or replace it? How would you handle this situation?

What is your ability to self-learn?

# How do you deal with difficult customers?

Technical Questions
Q1. If a customer calls saying his computer won't boot, how will you troubleshoot it?
Q2. If someone finds that their Internet connectivity is down, how would you fix the problem
Q3. How would you handle a technical issue that you're unfamiliar with?

Q. What questions would you ask to help isolate a users problem?


A. This question is used by the hiring manger to assess your problem-solving abilities. The following represent some
of the common questions that you would ask the end-user to help diagnose a situation:

When did the problem first start?

Has the system ever worked properly?

What was the last thing done to the system prior to the failure?

Is the issue intermittent or ongoing/constant?

Are there any error messages? If so, what are the specific error messages?

Has any new hardware been added to the system?

Has any new software been added to the system, including downloads from the Internet?

Has anything changed with the system (for example, has it been moved) since the issue presented itself?

Has anyone else had access to the system?

Are there any environmental factors that could be causing the issue?

Have you done any troubleshooting on the system on your own?

Have you checked all the cables/connections for a tight fit?

Q. What are the main differences between the following operating systems?
A. Unfortunately, most companies have not been able to standardize the operating systems used by users. Its always
critical that you know more than just the current version because there will always be a user who has a problem with
an older version. By asking this question, the hiring manager is actually testing your knowledge of different
operating systems that you may need to support. The following provides a concise summary of some of the major
differences.
Windows 2000 and XP
Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the hands of
consumers. The major changes include the following:

Device driver rollback

Remote control (single-user terminal services)

New Start menu, control panel, and user interface elements

Fast user switching

Encrypted file system support for redirected folders

Better support for roaming wireless networking

Enhanced policies

Credential Manager

Personal firewall

Q. What are typical virus sources and how do you prevent virus attacks?
A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible
virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections:

Use anti-virus software.

Perform regular updates to the virus software definition files and scan engines. Verify updates have
succeeded.

Perform regularly scheduled virus checks.

Configure software to check all files, not just program files.

Educate users on virus attacks, their consequences, and how to prevent them.

Know where all software came from.

Do regular backups.

Develop reporting mechanisms to inform server administrators of observed desktop infections and how
these could impact the server environment (such as deletions or corruption of files on public shares, hidden
payload files that might have been uploaded to servers, and so on).

Q. What are some of the guidelines you would recommend for implementing security at the user level?
A. Security is a major part of the desktop technicians day-to-day responsibilities. As the closest point of contact to
the end-users, technicians need to be savvy on the different methods for enforcing security. Some of the top
techniques are included below.
Anti-virus software:

Ensure that all users install and regularly use anti-virus software on their PCs.

Instruct users to immediately notify the helpdesk when they suspect theyve contracted a virus.

Password security:

Instruct users not to give out their passwords.

Instruct users not to write down their passwords.

Instruct users to make sure their password cannot be easily guessed by using a combination of
alphanumeric characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { } / ? < > , ; : \ | ` .).

Instruct users to change their password if they think there is even a slight chance someone knows it.

Instruct users to ensure their password is at least eight characters long.

Instruct users not to use a variation of their user ID.

Regularly change passwords on Administrator accounts on PCs (NT, Windows 2000 and XP)

Desktop security:

Instruct users not to leave their workstation logged in overnight.

Instruct users to enable screen savers that automatically lock their PC when there is no activity on it for
more than five minutes.

Q|: How would you handle the I cant log in call?


First I would ask the caller to verify that he has the correct user name and domain. Then I would ask the caller to check
if the caps lock key was enabled. If that doesnt resolve the issue I would continue by asking the caller to check the
physical connections such as Ethernet.
The importance of this question is to make sure the candidate covers the basics and doesnt jump to conclusions
without first troubleshooting the basics.
Q: Describe how a (substitute any technology here such as WEP, LAN, etc.) works?
WEP is a means of securing access to a wireless network and is usually established by a network administrator. WEP
keys include a series of hexadecimal digits the keys must match between devices in order for them to communicate.
Most applicants think this is a technical proficiency question; however, its really a question aimed at evaluating
communication skills. While candidates should be familiar with most popular acronyms they may ask you to explain
first, which is fine, as long as they can articulate the answer.

Networking:

Q:If asked to conduct an audit of all IP addresses being used in a particular


office, how would you go about doing that?
ANS: Use the IP management tools.
When it comes to IP Address Management, auditing is utmost important to
know who did what and when. IP Address Manager logs all the events
performed using the tool with the name of the OpUtils User and the date and
time of the event. This helps administrators to track and audit
Q: What does IE6 stand for?

Internet Explorer 6 (Microsoft). IE6, Internet Explorer version 6 (Microsoft).

Define these abbreviations or terms:


HTML -Hyper text Mark up Language used to design web page. You can find the
script in Internet Explorer if you click on View, Source.
CGI - Common Gateway Interface, It has only a single point for in enter and exit of
data.
URL : URL stands for Uniform Resource Locator used for web browsing. First it

starts with which protocol it should use for browsing, it means like FTP.
MIME : MIME stands for Multipurpose Internet Mail Extensions. Used by IBM. Just
to understand one Example: Microsoft uses Outlook. we can say IBM will use MIME.
HTTP: Hyper Text Transfer Protocol. It is used for web browsing.
FTP : FTP is a Protocol stands for File Transfer Protocol. Based on this protocol,web
pages will get displayed to us. Data transmission takes place using this protocol.
Telnet: Telnet is used to control servers remotely. This enables you to control the
server and communicate with other servers on the network.
Shortcut or alias
IP address : Internet Protocol Address are divided into 5 classes
Class A: 1-126 , 127 is loop back
Class B: 128-191
Class C: 192-223
Class D: 224-239- Multi casting
Class E: 240-254- used by Research and Development
DNS : Stands for- Domain Name System. It is the translator if IP address to a
meaningful word.
Windows NT Domain : A Windows domain is a collection of security principals that
share a central directory database.
Windows NT Share:
Postscript : Post Script is a programming language optimized for printing graphics
and text
Database (field, record, table): Database is A collection of information organized in such a way that a
computer program can quickly select desired pieces of data.

ISP - An Internet service provider (ISP) is an organization that provides access


to the Internet.

web proxy server: In computer networks, a proxy server is a server (a computer


system or an application) that acts as an intermediary for requests from clients
seeking resources from other servers.
what is an ip address?/ what is static ip ?

0-255, number to identify dhcp protocol- reserve ip address call static ip address
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication

12) local loop address - 127.0.0.0


Network 127.0.0.0 is reserved for IP traffic local to your host
Usually, address 127.0.0.1 will be assigned to a special interface on your host, the loop back
interface, which acts like a closed circuit
Its main use is to test TCP/IP. If you can ping this address then your TCP/IP is working and your
network interface is OK.
# Name 3 email clients. ( outlook express, outlook, thunderbird ),
# Name 3 web browsers.(internet explorer,googlechrome,firefox)
# What is a subnet?
Network nodes that are related by the
same IP address range. For example, computers with an address beginning with 192.168.1.x
are in the same subnet.
# What is ADSL?
A subnet is a logical grouping of connected network devices.

ADSL is a type of high-speed Internet access service. It uses telephone lines to transmit data
# What port does SMTP use?
For Send Mail Transfer protocol default port number as is 25.
What port does HTTP use?port 80

13) when internet is not working , then what will be first step that you will perform to
troubleshoot it
ipconfig [/all] or [/renew ] or [/release ] or [/flushdns]
14 ) Bits in IP adress - 32 (4 ip adress*8 bits)
15) default sheets in Ms- excel - 3
Sub net interview qustrionion

!. What is id device and scasi device

SCSI
Small Computer System Interface, an industry standard interface that allow
personal computers to communicate with peripheral hardware such as disk
drives, tape drives, CD-ROM drives, printers, and scanners faster and more
flexibly than previous interfaces.

SCSI ID
A computer term for a unique number assigned to each device connected to a SCSI bus. It
uniquely identifies the device on the SCSI channel. Each controller in an array has its
own SCSI ID.
BASIC Hardware::
Q:How do you cut and paste using keyboard shortcuts?
Ctrl+c and ctrl+v

1) what is next to Microsoft office symbol - ans customize quick access toolbar
2) Layouts in Ms word - Print layout , web layout , fullscreen, outline, draft
3) pc is loses times , who will responsible for this ? - ans cmos
4) a blue screen appears on screen , what will be ur first step - Ans Select LKGC (Last known
good configuration)
5) if Paper Jam in printer , then what will be the first step ? Remove the papers manually from
printer
6) SMPS fullform - ans switch mode power supply
7) CMOS fullform - ans Complementary metaloxidesemiconductor (CMOS)
8) If power shutdowns , which is be responsible for providing the continuous power to computer
- ans UPS
what to do when printer is not working and it doesnt give any error message - options :- drivers
are corrupted , Printer is not installed , Request Stucked in Queues , drivers are not installed.
( Not sure abt the ans )
9) can we customize the buttons in Ms -word no

10) A Question Related to UNC , how we can access the workstation :- UNC / Server name or
Hostname / server name ( something like that , not sure about its ans )
Typing in the the UNC address into Start>Run.

Access workstation via UNC (at Start | Run).


. 2)difference between laptop and desktop computer
3)what is protocol
In information technology, a protocol is the special set of rules that end points in a
telecommunication connection use when they communicate. Protocols specify
interactions between the communicating entities.

The TCP/IP Internet protocols, a common example, consist of:

Transmission Control Protocol (TCP), which uses a set of rules to exchange


messages with other Internet points at the information packet level
Internet Protocol (IP), which uses a set of rules to send and receive messages
at the Internet address level
Additional protocols that include the Hypertext Transfer Protocol (HTTP) and
File Transfer Protocol (FTP), each with defined sets of rules to use with
corresponding programs elsewhere on the Internet

There are many other Internet protocols, such as the Border Gateway Protocol (BGP) and the
Dynamic Host Configuration Protocol (DHCP).
Protocol - Formal description of messages to be exchanged and rules to be followed for two or more
systems to exchange information.

5)what is the port for net/ithernet/


An Ethernet port is an opening on computer network equipment that Ethernet cables plug into.
Ethernet ports accept cables with RJ-45 connectors
7) What is internet ?
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (often called TCP/IP, although not all applications
use TCP) to serve billions of users worldwide.
8)what is difference between between DDR 2 and DDR3 ram?
There are mainly four types of RAM; SD, DDR, DDR2 and DDR3. They differ in the way they operate
and mainly in their operation speeds. All RAM's used in computers today have a synchronous

interface meaning they wait for a clock signal before it can respond to clock signals.
SD RAM:
SDRAM stands for synchronous dynamic random access memory. SDRAM is Single Data Rate
meaning that SDRAM can accept one command and transfer one word of data per clock cycle.
Typical speeds of SDRAM are 100 and 133 MHz.
DDR SDRAM:
DDR SDRAM stands for double data rate synchronous dynamic random access memory. DDR RAM
transfers data twice per clock cycle, hence the name double data rate. DDR clock speeds range
between 200 MHz (DDR-200) and 400 MHz (DDR-400). DDR-200 transfers 1600 MB/s, while DDR400 transfers 3200 MB/s.
DDR2 SDRAM:
DDR2 SDRAM stands for double data rate 2 synchronous dynamic random access memory.DDR2 is
twice as fast as DDR which means twice as much data is carried to the module for each clock cycle.
Also due to the design improvements DDR2 consumes less power as compared to the DDR
memory. DDR2 speeds range between 400 MHz (DDR2-400) and 800 MHz (DDR2-800). DDR2-400
transfers 3200 MB/s. DDR2-800 transfers 6400 MB/s.
DDR3 SDRAM:
So by now after reading the above it is quite obvious what DDR3 SDRAM stands for, double data
rate 3 synchronous dynamic random access memory. In theory DDR3 is supposed to act twice as
fast as DDR2 memories. Thus DDR3 speeds range between 800 MHz (DDR3-800) and 1600 MHz
(DDR3-1600). DDR3-800 transfers 6400 MB/s; DDR3-1600 transfers 12800 MB/s.
Only gamers may notice the difference between DDR2 and DDR3 speeds, while for everyone else,
even DDR will be sufficient. But if you are buying a new PC spending a little extra for the increased
speed is always appreciated.
But in the end it all depends on your requirements and your budget. DDR3 will cost a lot more than
DDR2, also for DDR3 speeds you will also need a motherboard that can support it, so if you are
planning on upgrading your RAM to DDR3 you should be certain that your motherboard can support
it. If your requirements do not involve heavy gaming or video editing and video processing then you
have no need for the powerful DDR3 memory.
These interview questions test the knowledge of x86 Intel architecture and 8086 microprocessor
specifically.
1.

What is a Microprocessor? - Microprocessor is a program-controlled device, which


fetches the instructions from memory, decodes and executes the instructions. Most Micro
Processor are single- chip devices.
2.
Give examples for 8 / 16 / 32 bit Microprocessor? - 8-bit Processor - 8085 / Z80 /
6800; 16-bit Processor - 8086 / 68000 / Z8000; 32-bit Processor - 80386 / 80486.

3.

Why 8085 processor is called an 8 bit processor? - Because 8085 processor has 8
bit ALU (Arithmetic Logic Review). Similarly 8086 processor has 16 bit ALU.

4.

What is 1st / 2nd / 3rd / 4th generation processor? - The processor made of PMOS
/ NMOS / HMOS / HCMOS technology is called 1st / 2nd / 3rd / 4th generation processor, and it
is made up of 4 / 8 / 16 / 32 bits.

5.

Define HCMOS? - High-density n- type Complimentary Metal Oxide Silicon field effect
transistor.

6.

What does microprocessor speed depend on? - The processing speed depends on
DATA BUS WIDTH.

7.

What is the disadvantage of microprocessor? - It has limitations on the size of data.


Most Microprocessor does not support floating-point operations.

8.

Why does microprocessor contain ROM chips? - Microprocessor contain ROM chip
because it contain instructions to execute data.

9.

What is the difference between primary & secondary storage device? - In primary
storage device the storage capacity is limited. It has a volatile memory. In secondary storage
device the storage capacity is larger. It is a nonvolatile memory. Primary devices are: RAM /
ROM. Secondary devices are: Floppy disc / Hard disk.

10.

Difference between static and dynamic RAM? - Static RAM: No refreshing, 6 to 8


MOS. Dynamic RAM: Refreshed periodically, 3

11.

What is cache memory? - Cache memory is a small high-speed memory. It is used for
temporary storage of data & information between the main memory and the CPU (center
processing unit). The cache memory is only in RAM.

12.

What is called .Scratch pad of computer.? - Cache Memory is scratch pad of


computer.

13.

Differentiate between RAM and ROM? - RAM: Read / Write memory, High Speed,
Volatile Memory. ROM: Read only memory, Low Speed, Non Voliate Memory..

14.

What is NV-RAM? - Nonvolatile Read Write Memory, also called Flash memory. It is also
know as shadow RAM.

HP interview question
"What is a Domain Controller?"
On Microsoft Servers, a domain controller (DC) is a server that responds to
security authentication requests (logging in, checking permissions, etc.) within the
Windows Server domain.[1] A domain is a concept introduced in Windows NT
whereby a user may be granted access to a number of computer resources with the
use of a single username and password combination.
A network server which holds a directory database that manages user access to a
network, which includes logging on, authentication, and access to the network
resources

A server responsible for managing domain information, such as login identification


and passwords. [800-82] (see also identification, information, passwords, control,
domain)

"What is the Windows registry?"


The Windows Registry is where nearly all configuration settings are stored in
Windows. The Windows Registry is accessed with the Registry Editor tool.
In very simple terms, the Windows registry is the database that holds all the
settings for your Windows operating system.
The Windows Registry is a hierarchical database that stores configuration settings
and options on Microsoft Windows operating systems

How to format windows7 c drive only?please give me the steps?


Just Take back up important file from your C Drive. After Re-start your system and
press F12 (Select Boot Device) (If not open then, Again Re-Start and Press Del
button, Change Bios in Boot Device is CD/DVD Drive) and select boot device is
CD/DVD Drive. at the same time insert your Windows 7 OS CD in your CD Drive.
after loading cd, the Windows 7 automatically asked details for install Windows 7.
How to do partition?
To create a new partition on your hard drive:
1. Click the Start button.
2. Select Control Panel.
3. View your system options:
o

In XP, click the Performance and Maintenance link.

In Vista, click the System and Maintenance link.

In 7, click the System and Security link.

4. Click the Administrative Tools link.


5. Double-click the Computer Management icon.
Note: In Windows Vista, click the Continue button.
6. In the left pane, if not already expanded, double-click Storage.
7. In the left pane, select Disk Management.

8. In the lower right pane, to the right of the disk on which you want to
allocate space, right-click the unlabeled black bar.
9. Create a partition.
o

In XP, from the drop-down list, select New Partition....

In Vista/7, from the drop-down list, select New Simple Volume....

Note: In XP, follow these additional steps:


Click Next.
2. Select the type of partition you want to create.
1.

Click Next.

Specify the size of the partition you want to create.


o

In XP, in the Partition Size in MB: spin box, type the size you
want for the partition you are creating.

In Vista/7, in the Simple Volume Size in MB: spin box, type the
size you want for the partition you are creating.

Click Next.

3
Select the appropriate radio button for the option you want for
assigning a drive letter to the partition.
4

Click Next.

5
Select the appropriate radio button for the option to format or to
not format your partition. For detailed instructions about formatting a
partition, refer to Formatting a New Partition or Logical Drive on Your
Hard Drive in Windows XP/Vista/7
(http://answers.vt.edu/kb/entry/2479/)
6

Click Next.

Click Finish.

How to go to BIOS?
Dell - XPS, Dimension, Inspiron, Latitude. OptiPlex, Precision, Vostro

Press F2 when the Dell logo appears. Press every few seconds until the message Entering
Setup appears.
Older Dell desktops and laptops may instead use Ctrl+Alt+Enter or Del to enter BIOS.
Older Dell laptops may use Fn+Esc or Fn+F1.

Hewlett-Packard (HP) - Pavilion, TouchSmart, Vectra, OmniBook, Tablet

Press the F1, F10, or F11 key after restarting the computer.
HP Tablet PCs may use F10 or F12.

Other HP computers may allow access to BIOS using the F2 or Esc keys.

IBM - PC, XT, AT

Press F1 immediately after powering on the computer.


Older IBM computers (including some laptops) may utilize the F2 key for BIOS entry.

How to see windows log ?


Ans: Right click "My Computer" icon, left Click Manage. In the Tree on the left click Event Viewer, then click
System.

How to see hardware status in windows laptop and desktop?


Device manager "My Computer" icon, left Click Manage. In the Tree on the left click device manager

How to back up and restore in windows 7


Start>control panel>system and security>backup and restore>setup backup>backup destination
Network back up
Start>control panel>system and security>backup and restore>setup backup>backup destination>save on a
network>select network location>network credential
Restore
Start>control panel>system and security>backup and restore>select back up to restore file from

How to back up and restore file and folder in vista/win 7

Open the Registry Editor by clicking the Start button

, typing regedit into the Search box, and then pressing

ENTER. If you are prompted for an administrator password or confirmation, type the password or provide
confirmation.
Locate and click the key or subkey that you want to back up.
Click the File menu, and then click Export.
In the Save in box, select the location where you want to save the backup copy, and then type a name for the
backup file in the File name box.
Click Save.

Name the diff types of operating systems?


windows-xp,vista, 7,8 ... server 2003, 2008
linux
mac
vista

What is different between 98 and xp?


1. Win98 Support FAT file system & XP

support NTFS And Also FAT.

2. Win98 Does not Having Remote Access facility While in XP there is.
3. win98 Does not need faster processing speed while XP Need 500mhz processing Speed.
4. Win98 Does not provide System Restore while XP Provide.
5. Win98 does not having Hibernate facility While XP having Hibernate Facility.
6. Win98 And WinXp layout And visual Styles are Different.
7. WinXp improve Device Support.
8. WinXP having CD Burning Facility,fast user Switching.
9. Ability to support multithreading to utilize hyperthreading feature.

What is the different between xp ,vista , and windows 7


Windows 7 : It`s the latest version, it`s like buying a new car, you don`t know what could go
wrong but you trust it since it`s something new.
Good :
- It`s more secure when compared with Vista and XP
- Has more features then Vista and XP
- Support for this OS will be longer than Vista.
Bad :
- Some applications that doesn`t work on Windows 7 and you need to search on the Internet for
solutions however this is not true for popular software versions.
- It claims to run on the same computer resources like XP SP 3 but from experience I can tell that
it`s not true.

Vista : The predecessor of Windows 7, the second most hated OS after Windows Me.
Good :
- A lot of drivers available
- More secure when compared with older versions of XP
Bad :
- Uses a lot of computer resources
- Too many disappointed users
XP SP 3 : It requires less system resources, it`s easier to use and if you know how to ``secure``
this operating system then you don`t need Vista.

Good :
- It`s not using a lot of RAM or CPU memory
- Pretty stable and very easy to use
- There is a version called Windows XP 64 bit launched in 2005 which supports more than 4 GB.
Bad :
- Microsoft said that XP SP 3 is the latest version that fixes security issues and there will be no
other security updates
- You won`t find new drivers that will work with this OS in future.

What is a device manager?


The Device Manager is a Control Panel applet in Microsoft Windows operating systems. It allows users to view and
control the hardware attached to the computer. When a piece of hardware is not working, the offending hardware is
highlighted for the user to deal with.
An administrative tool that you can use to manage the devices on your computer. Using Device Manager, you can
view and change device properties, update device drivers, configure device settings, and uninstall devices

What do you mean by restore and recovery?


System Restore is a feature first introduced in Windows XP. It allows users to restore their computers to a previous
state without losing personal data files. System Restore automatically creates restore points, which you can use to
revert your system to the way it was at a previous time
The tools available on the System Recovery Options menu can be used to repair Windows files, restore
important settings to previous values, test your computer's memory, and much more.

What if you forget password?


If you've forgotten your Windows password and you're on a domain, you should contact your system administrator
to reset your password. If you're not on a domain, you can reset your password by using a password reset disk or by
using an administrator account.
If you forget the administrator password and don't have a password reset disk or another administrator account, you
won't be able to reset the password. If there are no other user accounts on the computer, you won't be able to log on
to Windows and will need to re-install Windows.

Hide all
To use your password reset disk to reset your password

You will not be able to follow these steps if you have locked your computer.

1.

2.

If you have typed the wrong password, you'll receive a message that says your user name or password is
incorrect. When this message appears, click OK.
Click Reset password, and then follow the instructions.

To use an administrator account to reset your password

Warning

If you use an administrator account to reset the password, you will permanently lose access to any e-mail
messages or encrypted files that are on that account.

Note

These steps cannot be completed on Windows Vista Starter, Windows Vista Home Basic, and Windows
Vista Home Premium.
1.
2.

Log on to the administrator account that you will use to reset the forgotten password.
Open Local Users and Groups by clicking the Start button , typing lusrmgr.msc into the Search box,
and then pressing ENTER. If you are prompted for an administrator password or confirmation, type the
password or provide confirmation.

3.

Double-click Local Users and Groups, and then click Users.

4.

Right-click the account that you need to reset the password for, and then click Set Password.

5.

Type and confirm the new password.

1.Basic technical knowledge of Operating systems like Windows XP


2.Basic Knowledge of MS Outlook troubleshooting, Internet and Networking
3.Basic technical knowledge of PCs

Check google-Troubleshooting Guide Business


PCs(HP)
Active directory
Active Directory is a database that keeps track of all the user accounts and
passwords in your organization. It allows you to store your user accounts and
passwords in one protected location, improving your organization's security.

Windows Server 2008 R2 includes several tools that let you manage Active Directory
from the command line. Heres a look at the key tools and what they do.
Adprep Prepares a Windows forest or domain for installation of Windows domain
controllers (DCs). To prepare a forest or a domain, use adprep /forestprep and
adprep /domainprep, respectively. (Note that for Windows Server 2003 SP1 or later, a
domains Group Policy isnt automatically updated. To prepare Group Policy for the
domain, you must use the command adprep /domainprep /gpprep. This modifies the
access control entries (ACEs) for all Group Policy object (GPO) folders in the SYSVOL
directory to grant read access to all enterprise domain controllers. This level of access is
required to support RSoP for site-based policy. Because this security change causes the
NT File Replication Service (NTFRS) to resend all GPOs to all domain controllers, you
should use adprep /domainprep /gpprep only after careful planning.)
Dsadd Adds computers, contacts, groups, organizational units, and users to Active
Directory. Type dsadd objectname /? at a command prompt to display help
information about using the command, such as dsadd computer /?.
Dsget Displays properties of computers, contacts, groups, organizational units, users,
sites, subnets, and servers registered in Active Directory. Type dsget objectname /? at
a command prompt to display help information about using the command, such as
dsget subnet /?.
Dsmod Modifies properties of computers, contacts, groups, organizational units, users,
and servers that exist in Active Directory. Type dsmod objectname /? at a command
prompt to display help information about using the command, such as dsmod
server /?.
Dsmove Moves a single object to a new location within a single domain or renames the
object without moving it. Type dsmove /? at a command prompt to display help
information about using the command.
Dsquery Uses search criteria to find computers, contacts, groups, organizational units,
users, sites, subnets, and servers in Active Directory. Type dsquery /? at a command
prompt to display help information about using the command.
Dsrm Removes objects from Active Directory. Type dsrm /? at a command prompt to
display help information about using the command.
Ntdsutil Allows the user to view site, domain, and server information; manage
operations masters; and perform database maintenance of Active Directory. Type
ntdsutil /? at a command prompt to display help information about using the
command.
Example

Using a command line


1. Open Command Prompt.
2. Type: dsmod userUserDN-pwdNewPassword
3. If you want to require the user to change this password at the next logon
process,
Type: dsmod userUserDN-mustchpwd {yes|no}

Working with active directory without command


Exchange server
To open Active Directory Users and Computers, click Start, click Control Panel,
double-click Administrative Tools, and then double-click Active Directory Users
and Computers.
Start >active directory icon>company name>expand>user>right lick>add user
Find>user>right lick>disable,delet,password reset

OUT LOOK email:


Outlook Express is an email client. Outlook Express allows you send and receive emails from your computer.

What is the difference between Outlook Express and Outlook?


Outlook Express, as I mentioned, comes free with Internet Explorer or Windows operating system. It's a lean and
mean email client. Microsoft Outlook on the other hand is an email client

# How do you set up a new ac acount in Outlook Express?


http://support.microsoft.com/kb/2409264

Set Up an Outlook Express E-Mail Account


The Internet Connection Wizard makes short work of setting up your online mailbox by
walking you through each step for every e-mail account you set up.
1. Before you get going, make sure you know your email address along with the
following information. (You may need to contact your ISP, Internet Service
Provider, to get it.)
First, information about the e-mail servers
o The type of e-mail server you use: POP3 (most e-mail accounts), HTTP
(such as Hotmail), or IMAP
o The name of the incoming e-mail server
o For POP3 and IMAP servers, the name of the outgoing e-mail server
(generally SMTP)
Second, information about your account:
o Your account name and password
(For some solid advice about making a secure password, read the Create
strong passwords
article.)
o Find out if your ISP requires you to use Secure Password Authentication
(SPA) to access your e-mail accountyes or no is all that's required.
2. Start Outlook Express, and on the Tools menu, click Accounts.
If the Internet Connection Wizard starts up automatically, skip ahead to step
4.
3. Click Add, and then click Mail to open the Internet Connection Wizard.

4. On the Your Name page of the wizard, type your name as you want it to appear
to everyone who gets e-mail from you, and then click Next.
Most people use their full name, but you can use any nameeven a nickname
that people will recognize.
5. On the Internet Explorer Address page, type your e-mail address, and then
click Next.
6. On the E-mail Server Names page, fill in the first block of information that you
gathered from your ISP in step 1, and then click Next.
Note: If you chose HTTP as your incoming e-mail serveras for a Hotmail or

MSN accountthis wizard page changes slightly so you can identify your HTTP
mail service provider.

7. On the Internet Mail Logon page, type your account name and password.
Note: If you're concerned about break-ins to your e-mail, click to clear the check
in the Remember Password box. You'll then be prompted for the password
each time you send or retrieve mail.

8. Click Next, and then click Finish.


You're ready to send your first e-mail!
Unsure if your new e-mail account is working? Send an e-mail message to
a friend. If they get the message, your account is ready to roll! But if you run
into problems setting up your account, Outlook Express offers help. Search for
troubleshooting topics from Contents and Index on the Help menu

You might also like