Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 20

Q1) If a user is not able to connect to Wifi what steps will you guide him/her?

Try these things first to help you fix or narrow down the connection problem.

Make sure Wi‑Fi is turned on. Select the "No internet connection" icon on the right
side of the taskbar, and make sure Wi-Fi is turned on. If it isn't, select it to turn it
on. Also, make sure Airplane mode is turned off.

Select Manage Wi-Fi connections (>) on the Wi-Fi quick setting, see if a Wi-Fi
network you recognize and trust appears in the list of networks. If it does, select
the Wi-Fi network, and they try to connect to it. If it says Connected underneath
the network name, select Disconnect, wait a moment, and then select Connect
again.

Ans 1) Try connecting to a network on a different frequency band. Many consumer Wi-Fi
routers broadcast at two different network frequency bands: 2.4 GHz and 5 GHz.
These will appear as separate networks in the list of available Wi-Fi networks. If
your list of available Wi-Fi networks includes both a 2.4 GHz network and a 5 GHz
network, try connecting to the other network. To learn more about the differences
between 2.4 GHz networks and 5 GHz networks, check out Wi-Fi problems and
your home layout.

Make sure the physical Wi‑Fi switch on your laptop is turned on. (An indicator light
usually shows when it's on.)

Run the Network troubleshooter. The Network troubleshooter can help diagnose
and fix common connection problems.

Q2) Why should we delete the Temporary files from system?

One of the most common places to find malware in your system is in the temp
Ans 2) folder. If malware is embedded in a program or application then running it may
create malicious temporary files. The best way to avoid any nastiness
associated with the temp folder is to permanently delete its contents.

Q3) How to delete the Temporary Files from Computer?

To delete temporary files:


In the search box on the taskbar, type disk cleanup, and select Disk Cleanup from
Ans 3) the list of results.
Select the drive you want to clean up, and then select OK.
Under Files to delete, select the file types to get rid of. To get a description of the
file type, select it.
Select OK.
Q4) How to speed up Windows 11 or any Operating System?

How to speed up Windows 11


Tip 1: Manage autostart programs.
Tip 2: Clear memory via disk cleanup.
Ans 4) Tip 3: Uninstall obsolete programs.
Tip 4: Turn off visual effects.
Tip 5: Turn off background apps.
Tip 6: Turn off app notifications.
Tip 7: Update Windows.
Tip 8: Defragmentation.

Q5) How do I clear RAM on Windows 11?

Initial steps to free up RAM


Restart PC. As mentioned above, RAM is characterized by storing data temporarily
and only for the programs running at the time. ...
Ans 5) Clear RAM cache. ...
Try other browsers. ...
Update applications. ...
Remove unused extensions. ...
Task Manager. ...
Uninstall unused programs. ...
Reduce background applications.

Q6) How to update Antivirus in Windows 11?

Update your antivirus definitions


Ans 6) Open the Windows Security app.
Select Virus & threat protection.
Under Virus & threat protection updates, select Protection updates.
Select Check for updates.

Q7) Why should we regularly update our Antivirus in System?

Ans 7) It is important to constantly update the anti-virus software on a computer because


computers are regularly threatened by new viruses. The anti-virus updates contain
the latest files needed to combat new viruses and protect your computer.

Q8) What are the 10 differences between RAM and ROM?

Ans 8) ROM is a non-volatile memory that means it stores data permanently even when
power is off. The CPU of the computer can read, write, or alter the data on RAM.
CPU can only read data from ROM, but it can write or change. RAM is used to store
data that CPU needs for current instruction processing
Q9) What is RAM?

RAM stands for Random Access Memory, it is the main memory of a computer
system that helps the CPU( Central Processing Unit ) to execute the instruction as
instructions first needed to be loaded into the RAM.

RAM is a volatile memory which means whenever the computer power is turned
off its data will be lost.
It is called random access because we can access any memory cell in RAM if we
Ans 9)
know the row and column that intersect at that cell.
RAM stores the information that our computer is actively using so that it can be
accessed fast and to run the multiple programs or applications in our system.
We require more memory. Increasing the RAM makes computers run faster
The Williams tube was the first RAM(Random Access Memory) which was the
cathode ray tube used for storing the binary data using electrical charges and was
highly volatile.

Q10) What is ROM?


ROM stands for Read Only Memory, it is also the primary memory like RAM. It is
read-only in memory as we can only read data on ROM, we cannot write data on
it.

ROM can store the data permanently in the system and that makes it nonvolatile
which means ROM can hold the data after the power is turned off.

Ans 10) ROM contains the programs that help the computer to start up, the computer
BIOS is a PROM chip( PROM is a read-only memory that can be programmed after
it is created and is used to store information permanently) that contains the
program that is needed to start up the computer.

Read-only memory( ROM) is also called firmware which is an integrated circuit.


ROM is used in microcontrollers that are used in computer keyboards, monitors,
printers, and many electronic devices.

Q 11) What are the types of Network?


A computer network is a system in which multiple computers are connected to
share information and resources. Computer network varies with each other
based on their functionality, geography, ownership, and communication media
used.

So, in this blog, we are going to learn about various types of computer networks
based on geographical areas they cover, functionality, ownership, and
Ans 11)
communication media used.

A computer network can be divided into the following types, based on the
geographical area that they cover, they are:
LAN(Local Area Network)
MAN(Metropolitan Area Network)
WAN(Wide Area Network)

Q 12) What is VPN? How It Works, Types of VPN


VPN stands for "Virtual Private Network" and describes the opportunity to
establish a protected network connection when using public networks. VPNs
Ans 12) encrypt your internet traffic and disguise your online identity. This makes it more
difficult for third parties to track your activities online and steal data. The
encryption takes place in real time.
Unplug the power cable for the router from the power source.

Unplug the power cable for the modem from the power source.

Some modems have a backup battery. If you unplug the modem and lights stay
on, remove the battery from the modem.

Wait at least 30 seconds or so.

If you had to remove the battery from the modem, put it back in.

Plug the modem back into the power source. The lights on the modem will
blink. Wait for them to stop blinking.

Plug your router back into the power source.

Wait a few minutes for the modem and router to fully power on. You can
usually tell when they’re ready by looking at the status lights on the two
devices.

On your PC, try to connect again.


Characteristics of RAM
The characteristic of RAM is as follow:

RAM is volatile i.e we require the computer power to read data, when power is
turned off data is erased.
RAM read and write speed is faster than memories like ROM( Read Only
Memory) , HDD( Hard Disk Drive) and SDD(Solid State Drive)
RAM is used as cache memory, Cache memory is the smallest memory in the
computer system that provides high-speed data access to a processor.
RAM is expensive in comparison to other memories.
Characteristics of ROM
The characteristic of ROM is as follow:

ROM can write data only once but we can read data anytime.
ROM can store data permanently.
ROM is Non Volatile memory i.e it can retain data stored in it even after
computer power is turned off.
ROM contains BIOS( Basic Input Output System), it is the first program that runs
when a computer is switched on, that loads Operating System from secondary
memory to primary memory, which helps in starting up the computer.
LAN(Local Area Network)
A local area network is a network, which is designed to operate over a very
small geographical or physical area such as an office, building, a group of
buildings, etc.

Generally, it is used to connect two or more personal computers through a


communication medium such as coaxial, twisted-pair cables, etc. A LAN can use
either wired or wireless mode of communication. The LAN which entirely uses
wireless media for communication can be termed as WLAN(Wireless Local Area
Network) .

Local Area Networks came under existence in around 1970s. IEEE developed the
specifications for LAN. The speed of this network varies from 10mbps(Ethernet
network) to 1gbps(FDDI or Gigabit Ethernet).

In other words, a LAN connects a relatively small number of machines in a


relatively close geographical area. Bus, Ring, and Star topology are generally
used in a local area network. In LAN, one computer can become a server in a
star topology, serving all other computers called clients. Two different buildings
can be connected very easily in LAN using a 'Bridge'.

Ethernet LAN is the most commonly used LAN. The speed of a Local Area
Network also depends on the topology used. For example, a LAN using bus
topology has a speed of 10mbps to 100mbps, while in ring topology it is around
4mbps to 16mbps. LAN's are generally privately owned networks.

How does a VPN work?


A VPN hides your IP address by letting the network redirect it through a
specially configured remote server run by a VPN host. This means that if you
surf online with a VPN, the VPN server becomes the source of your data. This
means your Internet Service Provider (ISP) and other third parties cannot see
which websites you visit or what data you send and receive online. A VPN works
like a filter that turns all your data into "gibberish". Even if someone were to get
their hands on your data, it would be useless.
To run the Network troubleshooter

Select Start > Settings > System > Troubleshoot > Other troubleshooters .

Under Most frequent, select Network & Internet > Run, or select the button below to launch the Network
& Internet Get Help feature.

Open Get Help for Network & Internet

Follow the steps in the troubleshooter and see if that fixes the problem.

Restart your modem and wireless router. This helps create a new connection to your internet service
provider (ISP).

When you do this, everyone that is connected to your Wi-Fi network will be temporarily disconnected.
The steps you take to restart your modem and router can vary, but here are the general steps.
Advantages of RAM
The advantages of RAM are:

We can read and write in RAM


RAM is power efficient
RAM increases the speed of the computer system
RAM is faster than secondary storage
Advantages of ROM
The advantages of ROM are:

ROM is non-volatile, we can retain data after power is removed.


ROM has the functionality of auto-refreshing.
ROM can store data permanently.
ROM is less expensive as compared to ROM.
MAN(Metropolitan Area Network)
A Metropolitan Area Network is a bigger version of LAN that uses similar technology as LAN. It spans over
a larger geographical area such as a town or an entire city.

It can be connected using an optical fiber cable as a communication medium. Two or more LAN's can also
be connected using routers to create a MAN. When this type of network is created for a specific campus,
then it is termed as CAN(Campus Area Network).

The MAN spans over a geographical area of about 50km. The best example of MAN is the cable television
network that spans over the whole city.

A MAN can be either a public or privately owned network. Generally, a telephone exchange line is most
commonly used as a communication medium in MAN. The protocols that are used in MAN are RS-232,
Frame Relay, ISDN, etc.

What are the benefits of a VPN connection?


A VPN connection disguises your data traffic online and protects it from external access. Unencrypted data
can be viewed by anyone who has network access and wants to see it. With a VPN, hackers and cyber
criminals can’t decipher this data.

Secure encryption: To read the data, you need an encryption key . Without one, it would take millions of
years for a computer to decipher the code in the event of a brute force attack . With the help of a VPN,
your online activities are hidden even on public networks.

Disguising your whereabouts : VPN servers essentially act as your proxies on the internet. Because the
demographic location data comes from a server in another country, your actual location cannot be
determined. In addition, most VPN services do not store logs of your activities. Some providers, on the
other hand, record your behavior, but do not pass this information on to third parties. This means that any
potential record of your user behavior remains permanently hidden.

Access to regional content: Regional web content is not always accessible from everywhere. Services and
websites often contain content that can only be accessed from certain parts of the world. Standard
connections use local servers in the country to determine your location. This means that you cannot
access content at home while traveling, and you cannot access international content from home. With
VPN location spoofing , you can switch to a server to another country and effectively “change” your
location.

Secure data transfer: If you work remotely, you may need to access important files on your company’s
network. For security reasons, this kind of information requires a secure connection. To gain access to the
network, a VPN connection is often required. VPN services connect to private servers and use encryption
methods to reduce the risk of data leakage.
WAN(Wide Area Network)
A Wide Area Network is the largest spread network. It spans over very
large-distances such as a country, continent or even the whole globe. Two
widely separated computers can be connected very easily using WAN. For
Example, the Internet.

A WAN may include various Local and Metropolitan Area Network. The
mode of communication in a WAN can either be wired or wireless.
Telephone lines for wired and satellite links for wireless communication
can be used in a wide area network.

In other words, WAN provides long distance transmission of data, voice,


image, and video, over a large geographical area. A WAN may span
beyond 100km range. It may be privately or publicly owned.

The protocols used in WAN are ISDN(Integrated Service Digital Network),


SMDS(Switched Multi-Megabit Data Service), SONET(Synchronous Optical
Network), HDLC(High Data Link Control), SDLC(Synchronous Data Link
Control), etc.

The advantage of WAN is that it spans over a very large geographical


area, and connects a huge mass of people.
S.No.

1
2
3
4
5
6
7
8
9
10
11
12
13
JOB DESCRIPTION

Voice Support & Email technical Support to ensure closure as per ITIL Incident Management process.
Follow-up/ update ticket for every call to ensure timely closure.
Call ownership, drive to resolution and communication with customer.
Perform Life Cycle of Incident Management Process, starting with Incident Logging to Call Closure and customer sat
Telephonic support to End Users and co-ordination with Vendors, Client Problem Management team and other Towe
Proactive monitoring & Perform documented Escalation process.
Troubleshooting on Application Support (Off Shelf or Customized)
Troubleshooting on Printers & MFD’s
Troubleshooting on VPN software and Collaboration tools
Troubleshooting on Password Reset tools and Remote Control tools
Troubleshooting of MS Windows & Office, Desktops, Laptops, iPAD Peripherals and Networking
Troubleshooting Application and Workplace IT & Communications & Collaboration Support (including IP Telephony)
Interaction with internal and external stakeholders

You might also like