Mostly Asked Desktop Interview Preparation Guide
Download PDF

Desktop Support frequently Asked Questions by expert members with experience in Desktop related jobs. So get preparation for the Desktop Support job interview questions

82 Desktop Support Questions and Answers:

Table of Contents:

Mostly Asked  Desktop Support Job Interview Questions and Answers
Mostly Asked Desktop Support Job Interview Questions and Answers

1 :: Explain hosts and LM hosts file?

The "HOSTS" file contains entries that simulate "A" records in DNS (and PTR records, too). Only DNS-legal names are allowed in this file.

The "LMHOSTS" file contains entries that simulate NetBIOS name resolution responses (and they have a baroque little mini-language to let you preload entries into the NetBIOS name resolution cache, specify domain entries, and include other files). Only NetBIOS-legal names are allowed in this file.

2 :: What is a blue screen of death? How to trouble shoot the computer in such situation?

I will reboot my machine 3 times. If the problem continues, the 4th time, I will press f2 to enter the setup which will automatically make my machine go through a process called bios. The bios process will read all my hardware and take me to a configuration setup, then I will go on the boot tab or press F12/F8(depending on the computer) and start windows normally. IF THIS DOESNT SOLVE THE ISSUE, then I will reboot my machine, press F12 and enter the safe mode. Once I enter the safe mode, I will type "msconfig" and click on the "startup" then I will click "DISSABLE ALL >Ok>APPLY>RESTART.

IF SAFE MODE DOESN'T WORK:
I will insert the system recovery CD and press F8 or F12. Then I will press "R" for repair, and restore the system.

IF SYSTEM REPAIR DOESNT WORK:
Reinstall

LAST STEP, IF NOTHING WORKS:
Create a ticket for the client and transfer to tier 2.

3 :: How to configure Outlook?

Normally outlook can be configured in two ways Automatic and other is manual.in Automatic setting there is nothing to configure all u need is to provide a valid credentials.but in manual u should first know about your input and output ports ie pop/ smtp and imap and these are provide to you by concern team and now u provide the credentials that all your outlook is configured.

4 :: What is LMHOSTS?

The "LMHOSTS" file contains entries that simulate NetBIOS name resolution responses (and they have a baroque little mini-language to let you preload entries into the NetBIOS name resolution cache, specify domain entries, and include other files). Only NetBIOS-legal names are allowed in this file.

5 :: What is HOSTS?

The "HOSTS" file contains entries that simulate "A" records in DNS (and PTR records, too). Only DNS-legal names are allowed in this file.

6 :: What is the difference between win XP and win 7/8?

First of all graphic difference and then XP support IP Ver. 4 only and window 7 support IP Ver. 4 and 6 both

7 :: What is SysWOW64 folder?

It is normally found in the 64 Bit OS egs: 64bit Win7. This is very similar to the system32 of the 32 bit OS

8 :: What is UAC (User Account control)?

user account control setting is a tools for administration that raise & alert if you modify the privilege of administrator.user account control protect your computer from malicious software because it allow user to notice when a document & program trying access.

9 :: I have disabled all usb ports on my stationary computer, my mouse and keyboard dont work... how do I enable it back? I cannot press F2 to get into BIOS, nothing works... keyboard or mouse?

Type in Run window regedit and click OK

After registry editor Open Goes to the
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUsbStor
In the Right Pane Double Click on Start and Type in Value 4
USB Port is Disabled
Type Value 3 For Enable USB Port

10 :: Suppose A user calls and every time he launches Internet Explorer he gets the page cant be displayed right before this his virus software had detected virus...what could be causing this problem you checked the settings in IE and its has the correct homepage?

This can happen if the host file is changed by the threat infection.

To resolve this unnecessary host entries files perform the following steps :

1. Click Start, > Find or Search > Files or Folders.

2. Make sure that "Look in" is set to (C:) or to "Local Hard Drive if you have
more than one hard drive, and that "Include subfolders" is checked.

3. In the "Named" or "Search for..." box, type:

hosts

4. Click Find Now or Search Now. After all files are found--this could take a
few minutes--go on to "To delete any extra lines."

For each Host file that was found in the search, do the following:

To delete any extra lines

1. Right-click the file and then click Properties.

2. In the bottom section of the Properties dialog box, make sure that the
Read-only attribute box is not checked. If it is checked, remove the check mark.

3. Click OK.

4. Right-click the file again and then click Open With.

5. Uncheck the Always use this program to open this program check box.

6. Scroll through the list of programs and double-click Notepad.

7. When the file opens, delete all the entries in the Hosts file, except for the
following line:

127.0.0.1 localhost

8. Close Notepad and save your changes when prompted.

Restart the computer and see if your Internet explorer is getting redirected
to other websites.

11 :: What is the difference between power user group in XP and power user group in windows 7?

Basically, Power Users can:

Run legacy applications, in addition to Windows 2000 or Windows XP Professional certified applications.

Install programs that do not modify operating system files or install system services.

Customize systemwide resources including printers, date, time, power options, and other Control Panel resources.
Create and manage local user accounts and groups.
Stop and start system services which are not started by default.

Power Users do not have permission to add themselves to the Administrators group. Power Users do not have access to the data of other users on an NTFS volume, unless those users grant them permission

12 :: Suppose I am Getting below Error while activating the Windows8. please help: The file name, directory name or volume label syntax is incorrect?

in the activation product key 0 wont be kindly check your product key reenter the product key it will get activate

13 :: Suppose a customer cant work how do you deal with this?

This is a common problem faced by a every one working in helpdesk.

1st thing don't try to argue with him.
2ndly try to understand the issues or problems he is facing.
3rdly don't promise him heaven and earth.

Finally keep a cool head don't concentrate on what he is saying and just concentrate on the solution.

As a help desk professional your duty is to focus on the best possible solution.
Don't get carried away.

14 :: When I boot my computer I have seen on my Screen " Verifying DMI pool data" and then after second line is shown "NTLDR is missing..." what is this problem and who can I solve it?

NTLDR is a Known as the Network Loader. It helps in loading the operating system. If it is showing Ntldr is missing you need to copy the ntldr file from operating system CD.

Copy the ntldr and ntdetect.com files from the xp cd to your computer

1.Insert the windows xp bootable cd into the computer.
2.When prompted to press any key to boot from the cd, press any key.
3.Once in the windows xp setupmenu press "R" key to repair the windwos.
4.Log into your windows installation by pressing 1key and press enter.
5.when you are prompted for your administrator password. enter the password.
6.Copy the two files to the root directory of the primary hard disk.
copy cdrom:i386ntldr c:
copy cdrom:i386ntdetect.com c:
7. Once both of these files have been successfully copied, remove the cd from the computer and reboot.

15 :: What is Bluescreen? What would you do if your PC turns into Bluescreen?

major problem is RAM first check with ram then go to safe mode scan your PC by using antivirus at the same time update drivers it should be mother board supported drivers or else use recommended software

16 :: How to hard disk dynamic?

goto run then type diskmgmt.msc after that you need to select hardisk then right click on it now you can convert it into basic disk to dynamic disk.
note: you should be login with administrator account.

17 :: Explain how to write a system service file in windows?

With Windows File Protection active, replacing or deleting a system file that has no file lock to prevent it getting overwritten causes Windows immediately and silently to restore the original copy of the file. The original version of the file is restored from a cached folder which contains backup copies of these files

18 :: What are the steps to create .pst in client system?

we have two option for creation of Archive folder or PST(Personal Storage Template) or personal folder

1. Automatic Archive
2. Manually Archive

Manually Archive for 2007 and 2010

For Outlook 2007
File> New> Outlook data file> Select 1st option under type of storage>select the location for PST(exp-d-driveoutlook)> Give file name according your choice like Archive 2011> Ok> mention again Archive 2011>Ok
Now it appear in left hand side Navigation pane of Outlook 2007 window

For Outlook 2010
File> Info> Scroll down account setting button >select Data file tab under Account Setting window>>Select path where you want store> Give file name >>ok Give name to the Archive folder>>OK
Now it appear in left hand side Navigation pane of Outlook 2010 window

19 :: What is the difference between server OS and desktop OS?

1.With server OS we can manage desktop OS. Server Os is higher version of Desktop OS.
2.server OS gives centralized administration for users shared resources higher security.
But Desktop OS gives local machine administration only.
3.Server OS is fully covered & managed security. For (ex) Domain Controller application server print server etc. We make server with security. for Desktop OS Normal PC. We make low level security.

20 :: What is the difference between language and technology?

Technology is the way in which a current problem statement is Resolved.
and Language by the way in which the technology has been Implemented.
e.g Silverlight is technology which comes from Microsoft
it has been implemented in c# language...

another example WCF is a technology implemented via c#

21 :: What is IP range in networking side?

Microsoft Outlook can store more data. it's format of *.pst .it
used SMTP protocol we can used. spell check, notepad, remainder is present in version of MS-OFFICE XP, 2003, 2007. It's used
as Microsoft application.
Outlook configures with Microsoft office products. Outlook express format *.dbx...and ver of 5.0,5.5.& 6...it's
equivalent of IE ver. spell checker, calc, notepad is NOT here. less data can be used.
It's uses POP3 & SMTP Protocols. incoming mail POP3 & Outgoing mail SMTP

IP Range
1-126 Class A subnet mask 255.0.0.0
128-191 Class B subnet mask 255.255.0.0
192-223 Class C subnet mask 255.255.255.0
224-241 Class D subnet mask 255.255.255.255
242-254 Class E

22 :: What is the difference between Outlook & Outlook Express?

Outlook Express is a POP3- and IMAP-compatible mail client with a built-in newsreader. It is available with Internet Explorer for Windows or as a stand-alone client.

Outlook is also an email client, but unlike Outlook Express, it is also a personal information manager. We can use it for viewing and maintaining calendars, organizing contacts, and managing tasks. When we use it with an Exchange server account, you can use it for group scheduling and sharing your contacts and tasks with others.

23 :: What are the core files required to boot Windows XP?

ntldr,
boot.ini,
bootsect.dos,
ntdetect.com,
ntbootdd.sys,
ntoskrnl.exe,
hal.dll,
system,
device drivers (s.sys)

24 :: What is difference between Win XP and Wn 7 technically?

Windows XP has a simple look and not that much secured as compared to Windows 7

1. XP does not have gadgets like clock but win 7 has
2. Win 7 looks and graphics are awesome than Xp.
3. Bitdefender is built in in win7 to protect pc from instant attack of adware malware etc.
4. User Account Control is added. in win 7
5. Very secured feature. System files always remain locked.win 7
6. Speech recognition feature to win 7. You can handle and run pc by speaking in mic.
7. It provides diagnose tools for troubleshooting. (Win7)
8. Easy backup and restore feature as compared to XP.
etc..............

Overall Windows 7 is awesome.

25 :: What is LDAP Server?

LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server.
Desktop Support Interview Questions and Answers
82 Desktop Support Interview Questions and Answers