0% found this document useful (0 votes)
48 views19 pages

Interview Question

Uploaded by

chavhanvishal162
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views19 pages

Interview Question

Uploaded by

chavhanvishal162
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

[what is your roles and responsibility(तुम्ही काय काम करता कपनित)

Configure network of client domain base network configuring printer sharing of


resources windows based DHCP server
_ helping client to solve there desktop hardware and network issue
_ outlook to problem issues_
_
_ troubleshoot windows 7 and windows 10 installing
_resolve software system issue
_format to laptop , installing operating system,
Configure to all company software.
Driver issue .
resolve slowness issue.
resolve to outlook issue.
Outlook configure.
resolve to all software login .
page not opening and performance issue .
Resolve to laptop slowness issue.
resolve to lan and wi fi issue.
Resolve to printer sharing.
Resolve to printer installation.
Resolve to LAN cabal crimping.
Drive partition.
Server to backup.

1. What is domain?
Domain is a set of computers which network recognise by the internet.
An active directory domain is a logical group of objects that is managed by the
same administrator team and is usually located on the same
physical network.
Domain is a security boundary.
When you install the AD it creates domain.
Domain can be forest root, tree root, and child.
When you create first domain of an organization it is always forest root domain.

2. What is domain controller?


A domain controller is a windows server computer which runs domain.
It control the domain operations.
You can have multiple domain controllers for the single domain.
Domain controller perform various function;
- Authenticates user accounts.
-to apply group police.
-to synchronize time.

Domain Controller Perform various Function ?


_ Authonticate User Account
_ To Apply group policy
_ To synchronize time between server & client .
3. How To add system in Domain ?
You can add a system to a domain only if you have administration access or the
equivalent.
To join your system to a domain:
-go to the control panel
-salect system and security.
-click om the system.
-go to computer name, domain, workgroup setting.
-salect change setting.
-navigate to the computer name tab and select change.
-click on domain under the member of option.
-type in the domain name which you want the system ti join.
-click ok and then to that again.
-restart the system.

What is trusting domain and trusted domain?


In trusting domain resources are available, while in trusted domain user’s account is
available.

What are the operational roles for DC (Domain controller) and ADC ( Additional
Domain Controller)?
Operational roles for DC (Domain controller) are:
• Domain Naming Master
• Schema Master
• RID Master
• PDC Emulator
• Infrastructure Master
Operational roles for ADC (Additional Domain Controller) are:
• PDC Emulator
• RID Master
• Infrastructure Master

4. Organisational Unit (OU)?


OU is a logical component of active directory.
Domain structure is verry large to manage, so OU’s are sure to logically organize the
domain structure. OU’s are mostly use to perform department wise or location wise
administration.
Benefits-you can set group policy on OU’s.
-You can hide OU’s object from user.
-group policy set-site domain and OU.
Define an active directory?
It is a service introduced by Microsoft which is mainly used to manage, organize and
run networks.
It consist of various objects like forests, groups, site etc.
Active directory ensures that the software and the computer are secure. It
authenticates and authorize all computers and users in a windows domain network. It
is also used for managing different functions like creating admin users, connecting to
external devices like printers, scanners.
A directory service connects network resources with there respective network
addresses, and provides that information to entities in the network.

Mention what are the component of AD?


Components of AD includes-
Logical Structure:- Tree, Forest, Domains and OU.
Physical Structures:- Domain controller and sites.

What is Kerberos ?
Kerberos is an authentication protocol for network.
It is built to offer strong authentication for server/client application by using secret key
cryptography
Port number is 88 for Kerberos

8.what exactly VPN server?


The team VPN refer to a virtual private network.
It’s a secure communication network that allows businesses and organizations to
connect privetly over a public network .
This is utilized by the network mobile users.
_ VPN is remote access technology it's logical secure over the physical connection.
_ By using this VPN corporate user can connect to company N/w securly from any
location in the world.
_VPN protocols : pptp. Point to point turning protocol.
L2tp- layer 2 turning protocol it ip sec for encryption.
________________
9.what is distinction between a RAS server and a VPN server?
RAS (remote access server) is true local area connection between two connections,
Where as VPN is a local connection that spans a broad geographical region.

11. what is Outlook ? (MS=Microsoft)


_ outlook is a personal information manage S/W from Microsoft available as port of
MS office Outlook include function calen dering tork managing contact .
_ Outlook is an email software program by MS that enables user to sent and reseive
e-mail on their computer.
_ there are two version of Outlook
i) MS Outlook express
ii)MS Outlook.
_ outlook is used as a mail client tool means you consent & recive email's by using MS
Office Outlook.
How to configure mail in outlook?
Open outlook and select file menu—add account---enter mail—select advance
option—setup my account—manually them connect---advance setup screen choose
type server connect from it.

How to backup outlook?


Select file—click export import---then select export file next—select outlook file PST
them select folder wan to backup them choose location file and store backup.

pop 3 (post office protocol version 3)


_ pop 3 very famous protocol which can be used with Outlook express and MS office
Outlook
_ it use TCP port number 110
_ it acts as incoming mail server
_ it receives and store email until you reads them.

IMAP (internet message access protocol)


_ IMAP is advance protocol
_ It allows the user to see all the folder on the mail server
_ IMAP and pop 3 difference is a pop 3 can be read emails office but IMAP can not
read

12. what is group policy ?


_ group policy provider the access all user in the N/w
_ group policy is set of restrictian and permissive active that can be applied to users
and computer
_ group policy can be set as site lavel, domain level & OU lavel.

13. What is DHCP ?


_ DHCP stands for dynamic host configuration protocol
_ DHCP is used assign IP address automatically to DHCP client. {Computer with obtain
iP address automatically}
_ DHCP uses TCP port number 67/68
_ DHCP Work DORA (Discover , Offer , Request , Aknowledgement) method

: 1) What is scope & super scope ?


The scope consist of an IP address like getway IP, subnet mask , DNS server. It can be
used to communicate with the other PC’s in the Network.
The superscope becomes when you combine two or more scope together.

14.What is DNS ?
_ DNS stand for domain name system.
_ DNS is a name resulation service.
_ DNS is uses resolve FQDN (fully Qudified domain name) to IP address.
_ DNS uses TCP port number =53.
DNS Troubleshooting
1) NS Lookup Command
- Interactive Mode
- Full Command Mode
2) IP Config /Flush DNS
3) IP Config/ Display DNS
4) IP Config/ Register DNS
5) DC Diag

What is forword and reversed lookup?


When we convert Ip address into name is called reverser lookup.
While converting name into ip address is called forword lookup.

16. what is DNS zone ?


_ DNS zone is a database container which is used to store resource record.
17. what is resource record ?
_ it is actual DNS database which are used for resulation.

15.what is office 365


_office 365 is software as a service
_Cloud solution that combines the traditional MS office
desktop application MS application services and some new productivity services.
It is also run in saas application in the cloud service.
The Enterprise Suite has 3 main plans: E1, E3, and E5. E1 doesn’t include Office client
or information protection. E3 has most of the necessary features. If you’d like to have additional
functionalities, such as Teams phone system or audio conferencing, consider the E5 license
Is the Office client the only difference between E1 and E3?

Of course not. There are much more security options in E3 such as email and documents
encryption and DLP. You have better control over your inboxes, mail flow, and data analytics. E3
gives you access to on-premises enterprise licenses where E1 offers only a standard license.

What is E1 and E3 license?


E1, the entry-level plan, focuses on providing small businesses with essential
services like web-based Office apps, cloud storage, and email.
E3, targeted at bigger enterprises, gives access to the full suite of online and offline
Office applications alongside added security features.

What is Blue screen & How does it work ? what would you do If your Computer
stopped Working ?
The main issue is RAM. Check it first, then proceed to safe mode. Scanning your pc
with an antivirus program and updating drivers.

: OSI model OSI (open system Interconnection)


OSI is 7 layer architecture model which help you to esily understand the network
communication
Iso model is verry help full for system programmer , system architect pc manufacture
and student

_OSI is 7 layer architecture model

1) Physical layer (CSMA/CD-carrier sense multiple access with collision detection)


2) data link layer (ARP, SLIP, PPP, PPTP, RARP, SDLC, HDLC, L2TP)
3) network layer (IP, IPX, RIP, OSPF, BGP, IPsec, IGMP, ICMP, NAT)
4) transport layer (TCO, UDP, NWLINK, SPX, NETBEUI)
5) session layer (SSL- secure socket layer, net BIOUS, SQL, NFS)
6) presentation layer (AFP, TDI, NCP)
7) application layer (http, ftp, smtp, pop3, nntp, telnet, tffp, smb, apple talk, ncp)

default gateway ?
_ it is a local router address which forward your traffic to another router.
_ gateway operate at upper layer of on model gateway is used to connect different
long distance N/w each other.

: Types of Network ?
1) LAN ( Local Area network )
2) WAN ( Wide Area network )
3) MAN ( Metropolitan Area Network )
4) CAN ( Campus Area Network )
5) SAN (Storage Area Network )

Types & Range of IP addresses ?


An IP address, or Internet Protocol address, is a series of numbers that identifies
any device on a network. Computers use IP addresses to communicate with each
other both over the internet as well as on other networks.

Class A : [ 1 - 126 ] millionth of Host


Class B : [128 - 191] 65534 Host
Class C : [ 192 - 223 ] 254 Host
Class D : [ 224 - 239 ] it is reserved for multicasting purpose
Class E : [ 240 - 255]
127.0.0.1:-- loopback testing

WHAT IS 127(LOOPBACK TESTING)

This IP address allows the machine to connect to and communicate with itself.

WHAT IS APIPA (AUTOMATIC PRIVATE IP ADDRESSING)

When your Windows-based computer (configured for DHCP) is initializing, it


broadcasts three or more "discover" messages. If a DHCP server does not respond
after several discover messages are broadcast, the Windows computer assigns itself a
Class B (APIPA) address.

Range 169.254.0.1 TO 169.254.255.254

: ip Config ?
it is used to Check the ip address of local system.

Ping ?( Packet internet group)


It is used to check the connectivity of two or more devices physically.

How to create Bootable Pen-Drive ?


Cmd- diskpart – list disk – select disk – clean – create partition primary – select partition
– format fs – ntfs quick – active – exit – done.

LAN & WAN


LAN – Local area network and it is use for small business , floor , school.
WAN – Wide area network and it is use for big business , offices , no limit.

What is different between IPv4 & IPv6 ?


The main difference between IPv4 & IPv6 is the address size of IP. The IPv4 is a 32 bit
address , whereas IPv6 is 128 bit.

Crimping
It is a process of terminating UTP cable with RJ45 connecter
Two types of crimping
- Straight : PC – to – Switch
- Cross : PC – to – PC

Telnet (Telecomunication Network)


Application Layer – 7
It uses TCP port – 23
It is use to configure network computers , Network devices remotely.

How to add network printer in any system ?


Go to the control panel , Click the devices and printer And then select add a printer,
select the printer , Install the printer driver.

Differentiate between Domain and workgroup?


Ans: Domain is a centralized network module and it has a large network,
in the domain Two or more users.
Whereas Workgroup is a decentralized network with small groups, In the
workgroup single user.
What are the types of the operating system or O.S?

The two types of operating systems are:

• NOS: Network Operating System. Examples of NOS- Windows NT,


2000,2003
• SOS: Simple Operating System. Examples of SOS – Windows 95,98, ME

Explain what is SYSVOL?


SYSVOL -System Volume
SYSVOL refers to a set of files and folders that reside on the local hard
disk of each domain controller in a domain and that are replicated by the
File Replication service (FRS).
These files contain group or user policy information.

What Is SCSI?
Answer :
SCSI stands for Small Computer System Interface. It is a standard
electronic interface that allows personal computers to communicate with
peripheral hardware such as disk drives, tape drives, printers, CD-ROM
drives. In “SCSI” the rate of data transmission is fast.

TCP/IP PORT?
-FTP (data)= 20
-FTP (control)= 21
-TELNET= 23
-SMTP= 25
-LOGIN= 49
-DNS= 53
-SQL= 66
-DHCP= 67/68
-HTTP= 80
-KERBEROS= 88
-POP3= 110

OST
It is use for the IMAP account Microsoft exchange account office 365 account
OST stands for Offline Storage Table
It is non-Movable file
We cannot Repair OST

PST
It is used for POP3 account PST is also used to Back-up or Export Item.
PST Stand for Personal Storage table , And PST File Size Is Upto 50 GB.
we can repair PST file using scanpst tool.
BITLOCKER

Bitlocker is a full volume encryption technology

By using Bitlocker you can encryption OS volume as well as data volume

It provide verry strong AES (advance encryption on standard ) encryption algorithem

1. TPM (trusted platform modes)


TPM is a hardware chip MBD which is used to store bitlocker key.

2. Bitlocker without TPM

You need to configure group policy for as volume to uneble bitlocker without
valied TPM

BITLOCKER TO GO

- Introduced in windows 7 first time


- It is used to encrypt on entire removable drive (pendrive)

HOW TO CONFIGURE BITLOCKER

Control panel---bitlocker drive—turn on bitlocker—eneble

BITLOCKER WITHOUT TPM

Win.R—gpdhir.msc—computer configuration—administrator----templets—bitlocker
drives encryption

--administrator drives & policy—required administrator—eneble policy—allow


startup---without tpm

What is Blue screen & How does it work ? what would you do If your Computer
stopped Working ?

The main issue is RAM. Check it first, then proceed to safe mode. Scanning your pc
with an antivirus program and updating drivers.

HOW DO I FIX BSOD ERROR

These errors can be caused by both hardware and software issues. If you added new
hardware to your PC before the Blue Screen error, shut down your PC, remove the
hardware, and try restarting. If you're having trouble restarting, you can start your
PC in safe mode.

The most significant difference between Windows 7 and Windows 10

is that Windows 10 is an attempt to synchronize the OS on all its products. This includes
PCs, laptops, tablets, phones, as well as its Xboxs. Whereas, Windows 7 is only
supported on PCs and laptops. Due to this, Windows 10 is optimized for touchscreen,
while Windows 7 is not.
LDAP PORT NO

LDAP is an application layer protocol that uses port 389 via TCP or user datagram
protocol (UDP). LDAP queries can be transmitted in cleartext and, depending upon
configuration, can allow for some or all data to be queried anonymously.

WIRELESS ACCESS POINT

In computer networking, a wireless access point (WAP), or more generally just access
point (AP), is a networking hardware device that allows other Wi-Fi ...

WHAT IS AN ACCESS POINT USED FOR ?

An access point is a device that creates a wireless local area network, or WLAN,
usually in an office or large building. An access point connects to a wired router,
switch, or hub via an Ethernet cable, and projects a WiFi signal to a designated area.

WHAT IS AN ACCESS POINT EXAMPLE

A common example of an access point is a router, a device that receives and sends
data when a computer or other devices are linked to it. Earlier uses of a router needed
an actual cable or wire connection linking it to a computer.

TWO TYPES OF ACCESS POINT

There are two types of APs. These are: Autonomous Access Point (AP) Lightweight
Access Point (LAP)

WHAT IS DIFFERENCE BETWEEN ACCESS POINT AND ROUTER

An Access point is a networking device that allows connecting the devices with the
wired network. A Router works as a sender, receiver and analyser between data and
computer networks that are linked with it.

IMAP PORT NO 993

IMAP is used to retrieve messages,

IMAP works between the server and client for communication.

IMAP allows users to organize emails onto the server

Incoming Mail (IMAP) Server imap.gmail.com Requires SSL: Yes Port: 993
SMTP PORT NO 25

SMTP is for sending data.

SMTP works between servers to transfer information.

while SMTP allows organizing emails on client storage.

smtp.gmail.com Requires SSL: Yes Requires TLS: Yes (if available)


Outgoing Mail
Requires Authentication: Yes Port for SSL: 465 Port for TLS/STARTTLS:
(SMTP) Server
587

WHAT IS FIREWALL

A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization's previously established
security policies. At its most basic, a firewall is essentially the barrier that sits between
a private internal network and the public Internet.

TYPES OF FIREWALLS

• Packet Filtering Firewalls. Packet filtering firewalls are the oldest, most basic
type of firewalls. ...
• Circuit-Level Gateways. ...
• Stateful Inspection Firewalls. ...
• Application-Level Gateways (Proxy Firewalls)

WHAT IS FIREWALL USED


Firewalls provide protection against outside cyber attackers by shielding your
computer or network from malicious or unnecessary network traffic. Firewalls can
also prevent malicious software from accessing a computer or network via the internet.

WHAT IS FIREWALL AND HOW IT WORKS?


Firewalls are network security systems that prevent unauthorized access to a
network.

SWITCHES AND ROUTER

Routers store the data and deliver them in the form of packers. Switches, on the other
hand, are network devices that route the data from multiple input ports to a certain
output port. To conclude, routers connect multiple networks, while switches connect
multiple devices in a network.
TYPES OF NETWORK SWITCHES

• KVM Switch.
• Managed Switch.
• Unmanaged Switch.
• Smart Switch.
• PoE Switch.

4 TYPES OF ROUTER
- wired routers,
- wireless routers,
- core routers,
- edge routers and VPN routers.

How to work ticketing tools

A ticketing system is a help desk software program used to process, manage, and track
customer issues from submission to resolution. Ticketing systems automatically
organize and prioritize support requests in a central dashboard. Users can tag,
categorize, and assign tickets as they come in.

What are the different types of ticketing tools?

Here are the best IT ticketing systems today:

-Spiceworks.

-HubSpot.

-OS Ticket.

-ServiceNow.

-ConnectWise.

-SolarWinds Web Help Desk.

-Jira Service Desk.

-Jitbit.
What are the steps in ticketing system?

The business benefits more than offset the costs of IT help desk software.

Improved customer satisfaction. Sooner or later customers encounter technical issues.


...

Higher team productivity. ...

Meet business obligations. ...

Stage 1: Log tickets. ...

Stage 2: Take action. ...

Stage 3: Monitor and escalate. ...

Stage 4: Close and optimize

How do you handle a ticketing tool?

-Ticketing system best practices

-Ensure proper agent training. ...

-Decide how you will prioritize tickets. ...

-Use all the automation capabilities. ...

-Ensure your team isn't overloaded. ...

-Make the right use of ticket tagging. ...

-Set and monitor ticket statuses. ...

-Create canned messages and templates. ...

-Implement Service-Level Agreements (SLAs)

SERVICE NOW TICKETING TOOLS

The ServiceNow business model is based on providing products using SaaS cloud
computing software. It involves setting up systems to define, manage, automate and
structure services for companies. ServiceNow users can find the software useful within
security, operations, customer service, HR and other industries.

How does ServiceNow ticketing tool work?

An IT ticketing system is a tool used to track IT service requests, events, incidents, and
alerts that might require additional action from IT. Ticketing software allows
organizations to resolve their internal IT issues by streamlining the resolution
process.

How do I create a ticket in ServiceNow?


From the Enterprise menu, select Monitoring, then select Incident Manager. Select an
incident for which you would like to create a ServiceNow ticket. In the Create Ticket
pop-up window, select the ServiceNow Ticketing Connector and a ticket template from
the Template Name drop-down menu, then click OK.

Windows 10 upgrede version

Win 10 upgrede version 21h2 & 22h2

Replacing a Motherboard
1. Disconnect all cables and remove all expansion cards from the current
motherboard.
2. Remove the screws that secure the old motherboard and remove the
motherboard.
3. If you are reusing the CPU and/or memory, remove them from the old
motherboard and install them on the new one.

• Replace the old back-panel I/O template with the template


supplied with the new motherboard.

• Remove and install motherboard mounting posts as necessary


to match the mounting holes on the new motherboard.

• Install the new motherboard and secure it with screws in all


mounting hole positions.

• Reinstall all of the expansion cards and reconnect the cables.

How to Replace a Hard Drive and Reinstall an Operating System


1. Back up data. ...
2. Create a recovery disc. ...
3. Remove the old drive. ...
4. Place the new drive. ...
5. Reinstall the operating system. ...
6. Reinstall your programs and files.

Hoe to replace battery ?


Disconnect your laptop from a power source. Remove the back panel of your laptop with a
screwdriver. Remove your old battery. Connect your new battery to the body of your laptop.
Removing a laptop keyboard
1. Remove screws on bottom of laptop. ...
2. Remove keyboard or top part of laptop casing. ...
3. Remove keyboard screws and keyboard. ...
4. Disconnect keyboard cable. ...
5. Connect keyboard cable. ...
6. Place keyboard in the laptop case. ...
7. Add screws to secure the keyboard. ...
8. Attach top casing around the keyboard.

Types of Hard Drives


Currently, there are two common types of hard drive:
Hard Disk Drive (HDD)
Solid State Drive (SSD)
A hard drive utilizes any of the interfaces such as PATA, SATA, SCSI. Today, there
are SSDs that utilize the NVMe interface.
Let's look at the two types of hard drives in detail.
Hard Disk Drive (HDD)
Hard disk drives are not that new and you will find them installed in older
computers. They consist of a moving part that rotates during reading and writing
operations, so they usually make noise.

These days, you may not see many newer desktop and laptop computers with
hard disk drives, but they remain popular because of their storage space. 16 GB,
32 GB, and 64 GB are the lowest you can find out there. There are 500 GB, 1 TB,
2TB, and more than 4 TB hard drives.

This enormous storage space is the reason hard disk drives may go nowhere any
time soon. There are even external hard disk drives you can use to backup your
files.

Solid State Drive (SSD)


SSD hard drives are one of the latest hard drive technologies at the time of
writing this article. Most newer computers have SSDs instead of HDDs.
Unlike the hard drive technologies before SSD drives, they don’t consist of
moving parts and they don’t use magnetism for storing data. So, they don't make
noise like hard disk drives (HDDs).

Instead, they use integrated circuits (ICs) just like third-generation computers.
This makes them more durable, faster, and less prone to damage and
corruption.

SSD hard drives have a notable advantage of transferring data at speed of 550
MB/S and allow faster boot times than the types of hard drives before them.

Solid state drives also have enormous sizes, but they are very expensive when
compared to hard disk drives.
Difference between ddr3 and ddr4
In the case of DDR3, the clock speed varies from about 400 to 1066 MHz. In the
case of DDR4, the clock speed varies from about 1066 to 2133 MHz. Latency in
the case of DDR3 is lower than that of DDR4. Latency in the case of DDR4 is way
more than that of DDR3.

what is RAM & Processor


Image result for what is RAM & Processor
RAM stands for Random Access Memory, and is used as a short-term memory
storage space. The processor, also known as the CPU, provides the instructions
and processing power the computer needs to do its work.

how to do diagnosing
Steps to diagnosis
taking an appropriate history of symptoms and collecting relevant data.
physical examination.
generating a provisional and differential diagnosis.
testing (ordering, reviewing, and acting on test results)
reaching a final diagnosis.
consultation (referral to seek clarification if indicated

How to Diagnose, Troubleshoot, and Repair a Laptop


How to diagnose, troubleshoot, and repair the component
Power related: making sure the battery on the laptop is functioning. If any of
the LEDS are lighting up. Test the ac power adapter.
Motherboard related: It could even be just a broken dc jack. It could also be
your motherboard completely not working but you can test it in several ways
even by using the digital multi meter.
LCD/no image: failing ram can result this try replacing the ram with a new one.
Or even trying taking out the ram and putting it back in.
Making noises: related to hard drive or a bad cooling fan. Test the fan to see if
it spins correctly and is functioning correctly.
Fan related/overheating: making sure to clean air vents because they are more
compacted in laptops making it overheat. Also updating your bios. Like
previously if it is making noises make sure it's functioning correctly.
Hard drive issues: If your having issues with a slow hard drive definitely use
defrag which defragments things like folders and files on hard drive and creates
more optical space and organization. If it starts making loud clicking noises when
accessing information on the hard drive replace it for better function.
Video wise: making sure the LCD is fine and that it is not cracked or it has no
issues.
Also making sure your video drivers are always updated keeps your computer in
shape.
Next I will show you and explain with depth three of the issues that can happen
with your laptop that were shown above and how to diagnose, troubleshoot and
repair the hardware in the laptop.

Laptop Overheating Issue


Now this is also a very common problem with laptops. Laptops have a
more compact air venting system. so air circulation is harder. The purpose of a
heat pipe is to fix this issue of overheating. But since there is such little space
more dust is able to block the air venting circulation. This can then cause the fan
to overheat if clogged with a lot of dust. To remove this use a q-tip and carefully
remove it from the silver area or any other parts.
( These are pictures from two different laptops). It is a quick easy solution
where you just need a screwdriver to take off the nails and clean it quickly!

How to fix your HP, Dell, Mi, or any other Windows laptop that Not turn on
Check power supply
Faulty screen
Check for incompatible hardware
Remove attached accessories
Replace battery
CMOS battery
No bootable media error
Windows crashes during startup
what is BOIs?
BIOS (basic input/output system) is the program a computer's
microprocessor uses to start the computer system after it is powered on. It also
manages data flow between the computer's operating system (OS) and attached
devices, such as the hard disk, video adapter, keyboard, mouse and printer.
post signal in laptop
The POST (power on self-test) is a set of procedures that a computer runs
through each time it is turned on. It ensures that all of the system's hardware is
working properly before trying to load the operating system. If the computer
does not pass POST, it will not boot.
If you're experiencing POST errors when you boot your computer, the
following steps may help you fix the problem.
How do I fix POST error?
POST troubleshooting steps
Remove new hardware. ...
Remove any disks or USB devices. ...
Disconnect external devices. ...
Reconnect and check power cords. ...
Identify beep code. ...
Check all fans. ...
Check all cables. ...
Disconnect all expansion cards.

You might also like