Professional Documents
Culture Documents
Sample Interview Questions - Technical Support Associate
Sample Interview Questions - Technical Support Associate
Try these things first to help you fix or narrow down the connection problem.
Make sure Wi‑Fi is turned on. Select the "No internet connection" icon on the right
side of the taskbar, and make sure Wi-Fi is turned on. If it isn't, select it to turn it
on. Also, make sure Airplane mode is turned off.
Select Manage Wi-Fi connections (>) on the Wi-Fi quick setting, see if a Wi-Fi
network you recognize and trust appears in the list of networks. If it does, select
the Wi-Fi network, and they try to connect to it. If it says Connected underneath
the network name, select Disconnect, wait a moment, and then select Connect
again.
Ans 1) Try connecting to a network on a different frequency band. Many consumer Wi-Fi
routers broadcast at two different network frequency bands: 2.4 GHz and 5 GHz.
These will appear as separate networks in the list of available Wi-Fi networks. If
your list of available Wi-Fi networks includes both a 2.4 GHz network and a 5 GHz
network, try connecting to the other network. To learn more about the differences
between 2.4 GHz networks and 5 GHz networks, check out Wi-Fi problems and
your home layout.
Make sure the physical Wi‑Fi switch on your laptop is turned on. (An indicator light
usually shows when it's on.)
Run the Network troubleshooter. The Network troubleshooter can help diagnose
and fix common connection problems.
One of the most common places to find malware in your system is in the temp
Ans 2) folder. If malware is embedded in a program or application then running it may
create malicious temporary files. The best way to avoid any nastiness
associated with the temp folder is to permanently delete its contents.
Ans 8) ROM is a non-volatile memory that means it stores data permanently even when
power is off. The CPU of the computer can read, write, or alter the data on RAM.
CPU can only read data from ROM, but it can write or change. RAM is used to store
data that CPU needs for current instruction processing
Q9) What is RAM?
RAM stands for Random Access Memory, it is the main memory of a computer
system that helps the CPU( Central Processing Unit ) to execute the instruction as
instructions first needed to be loaded into the RAM.
RAM is a volatile memory which means whenever the computer power is turned
off its data will be lost.
It is called random access because we can access any memory cell in RAM if we
Ans 9)
know the row and column that intersect at that cell.
RAM stores the information that our computer is actively using so that it can be
accessed fast and to run the multiple programs or applications in our system.
We require more memory. Increasing the RAM makes computers run faster
The Williams tube was the first RAM(Random Access Memory) which was the
cathode ray tube used for storing the binary data using electrical charges and was
highly volatile.
ROM can store the data permanently in the system and that makes it nonvolatile
which means ROM can hold the data after the power is turned off.
Ans 10) ROM contains the programs that help the computer to start up, the computer
BIOS is a PROM chip( PROM is a read-only memory that can be programmed after
it is created and is used to store information permanently) that contains the
program that is needed to start up the computer.
So, in this blog, we are going to learn about various types of computer networks
based on geographical areas they cover, functionality, ownership, and
Ans 11)
communication media used.
A computer network can be divided into the following types, based on the
geographical area that they cover, they are:
LAN(Local Area Network)
MAN(Metropolitan Area Network)
WAN(Wide Area Network)
Unplug the power cable for the modem from the power source.
Some modems have a backup battery. If you unplug the modem and lights stay
on, remove the battery from the modem.
If you had to remove the battery from the modem, put it back in.
Plug the modem back into the power source. The lights on the modem will
blink. Wait for them to stop blinking.
Wait a few minutes for the modem and router to fully power on. You can
usually tell when they’re ready by looking at the status lights on the two
devices.
RAM is volatile i.e we require the computer power to read data, when power is
turned off data is erased.
RAM read and write speed is faster than memories like ROM( Read Only
Memory) , HDD( Hard Disk Drive) and SDD(Solid State Drive)
RAM is used as cache memory, Cache memory is the smallest memory in the
computer system that provides high-speed data access to a processor.
RAM is expensive in comparison to other memories.
Characteristics of ROM
The characteristic of ROM is as follow:
ROM can write data only once but we can read data anytime.
ROM can store data permanently.
ROM is Non Volatile memory i.e it can retain data stored in it even after
computer power is turned off.
ROM contains BIOS( Basic Input Output System), it is the first program that runs
when a computer is switched on, that loads Operating System from secondary
memory to primary memory, which helps in starting up the computer.
LAN(Local Area Network)
A local area network is a network, which is designed to operate over a very
small geographical or physical area such as an office, building, a group of
buildings, etc.
Local Area Networks came under existence in around 1970s. IEEE developed the
specifications for LAN. The speed of this network varies from 10mbps(Ethernet
network) to 1gbps(FDDI or Gigabit Ethernet).
Ethernet LAN is the most commonly used LAN. The speed of a Local Area
Network also depends on the topology used. For example, a LAN using bus
topology has a speed of 10mbps to 100mbps, while in ring topology it is around
4mbps to 16mbps. LAN's are generally privately owned networks.
Select Start > Settings > System > Troubleshoot > Other troubleshooters .
Under Most frequent, select Network & Internet > Run, or select the button below to launch the Network
& Internet Get Help feature.
Follow the steps in the troubleshooter and see if that fixes the problem.
Restart your modem and wireless router. This helps create a new connection to your internet service
provider (ISP).
When you do this, everyone that is connected to your Wi-Fi network will be temporarily disconnected.
The steps you take to restart your modem and router can vary, but here are the general steps.
Advantages of RAM
The advantages of RAM are:
It can be connected using an optical fiber cable as a communication medium. Two or more LAN's can also
be connected using routers to create a MAN. When this type of network is created for a specific campus,
then it is termed as CAN(Campus Area Network).
The MAN spans over a geographical area of about 50km. The best example of MAN is the cable television
network that spans over the whole city.
A MAN can be either a public or privately owned network. Generally, a telephone exchange line is most
commonly used as a communication medium in MAN. The protocols that are used in MAN are RS-232,
Frame Relay, ISDN, etc.
Secure encryption: To read the data, you need an encryption key . Without one, it would take millions of
years for a computer to decipher the code in the event of a brute force attack . With the help of a VPN,
your online activities are hidden even on public networks.
Disguising your whereabouts : VPN servers essentially act as your proxies on the internet. Because the
demographic location data comes from a server in another country, your actual location cannot be
determined. In addition, most VPN services do not store logs of your activities. Some providers, on the
other hand, record your behavior, but do not pass this information on to third parties. This means that any
potential record of your user behavior remains permanently hidden.
Access to regional content: Regional web content is not always accessible from everywhere. Services and
websites often contain content that can only be accessed from certain parts of the world. Standard
connections use local servers in the country to determine your location. This means that you cannot
access content at home while traveling, and you cannot access international content from home. With
VPN location spoofing , you can switch to a server to another country and effectively “change” your
location.
Secure data transfer: If you work remotely, you may need to access important files on your company’s
network. For security reasons, this kind of information requires a secure connection. To gain access to the
network, a VPN connection is often required. VPN services connect to private servers and use encryption
methods to reduce the risk of data leakage.
WAN(Wide Area Network)
A Wide Area Network is the largest spread network. It spans over very
large-distances such as a country, continent or even the whole globe. Two
widely separated computers can be connected very easily using WAN. For
Example, the Internet.
A WAN may include various Local and Metropolitan Area Network. The
mode of communication in a WAN can either be wired or wireless.
Telephone lines for wired and satellite links for wireless communication
can be used in a wide area network.
1
2
3
4
5
6
7
8
9
10
11
12
13
JOB DESCRIPTION
Voice Support & Email technical Support to ensure closure as per ITIL Incident Management process.
Follow-up/ update ticket for every call to ensure timely closure.
Call ownership, drive to resolution and communication with customer.
Perform Life Cycle of Incident Management Process, starting with Incident Logging to Call Closure and customer sat
Telephonic support to End Users and co-ordination with Vendors, Client Problem Management team and other Towe
Proactive monitoring & Perform documented Escalation process.
Troubleshooting on Application Support (Off Shelf or Customized)
Troubleshooting on Printers & MFD’s
Troubleshooting on VPN software and Collaboration tools
Troubleshooting on Password Reset tools and Remote Control tools
Troubleshooting of MS Windows & Office, Desktops, Laptops, iPAD Peripherals and Networking
Troubleshooting Application and Workplace IT & Communications & Collaboration Support (including IP Telephony)
Interaction with internal and external stakeholders