Filter interviews by
Routing protocols determine how data packets are forwarded across a network, while routed protocols define the format of the packets.
Routing protocols are used by routers to determine the best path for forwarding data packets.
Examples of routing protocols include RIP, OSPF, and BGP.
Routed protocols are used to format the data packets themselves, such as IP or IPv6.
Examples of routed protocols include TCP/IP, UDP, ...
Switching is the process of forwarding data packets between devices on the same network, while routing is the process of forwarding data packets between different networks.
Switching operates at Layer 2 of the OSI model, using MAC addresses to forward packets within a network.
Routing operates at Layer 3 of the OSI model, using IP addresses to forward packets between networks.
Switches create broadcast domains, while...
The ISO model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The ISO model stands for International Organization for Standardization model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers for data transmission...
VLAN stands for Virtual Local Area Network, used to segment a network into multiple isolated networks for security and performance purposes.
VLANs allow for logical segmentation of a network, improving security and performance.
Devices within the same VLAN can communicate with each other as if they were on the same physical network.
VLANs are commonly used in enterprise networks to separate different departments or f...
BGP stands for Border Gateway Protocol, used for routing between different autonomous systems on the internet.
BGP is a standardized exterior gateway protocol used to exchange routing information between different autonomous systems (AS).
It helps in determining the best path for data packets to travel between networks.
BGP is crucial for ensuring efficient and reliable internet connectivity.
It allows network adminis...
Router commands are used to configure and manage routers in a network.
show ip interface brief - displays a summary of the router's interfaces and their IP addresses
show running-config - displays the current configuration of the router
interface [interface name] - enters interface configuration mode for a specific interface
ip route [destination network] [subnet mask] [next hop IP] - adds a static route to the routin...
Subnet mask is a 32-bit number used to divide an IP address into network and host portions.
Subnet mask is used to determine which part of an IP address is the network portion and which part is the host portion.
There are different types of subnet masks such as Classful subnet masks, Classless subnet masks, and Variable Length Subnet Masks (VLSM).
Examples of subnet masks include 255.255.255.0 (Class C), 255.255.0.0 ...
VLAN types include default, data, voice, management, and native VLANs.
Default VLAN: VLAN 1 is the default VLAN on Cisco switches.
Data VLAN: Used for data traffic.
Voice VLAN: Used for voice traffic.
Management VLAN: Used for managing network devices.
Native VLAN: Untagged VLAN used for trunking.
Proxy is an intermediary server that separates end users from the websites they browse. DHCP is a network protocol that assigns IP addresses to devices.
Proxy server acts as a middleman between a user and the internet, providing anonymity and security.
DHCP dynamically assigns IP addresses to devices on a network, simplifying network administration.
Proxy servers can be used to bypass content restrictions or improve ...
OSPF, RIP, IGRP, and EIGRP are routing protocols used in networking to determine the best path for data packets to travel.
OSPF (Open Shortest Path First) is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path.
RIP (Routing Information Protocol) is a distance-vector routing protocol that uses hop count as a metric to determine the best path.
IGRP (Interior Gateway Routing Proto...
I applied via Recruitment Consulltant and was interviewed in Jun 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Mar 2022. There were 2 interview rounds.
VLAN stands for Virtual Local Area Network, used to segment a network into multiple isolated networks for security and performance purposes.
VLANs allow for logical segmentation of a network, improving security and performance.
Devices within the same VLAN can communicate with each other as if they were on the same physical network.
VLANs are commonly used in enterprise networks to separate different departments or functi...
The ISO model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The ISO model stands for International Organization for Standardization model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers for data transmission.
For ...
Switching is the process of forwarding data packets between devices on the same network, while routing is the process of forwarding data packets between different networks.
Switching operates at Layer 2 of the OSI model, using MAC addresses to forward packets within a network.
Routing operates at Layer 3 of the OSI model, using IP addresses to forward packets between networks.
Switches create broadcast domains, while rout...
Proxy is an intermediary server that separates end users from the websites they browse. DHCP is a network protocol that assigns IP addresses to devices.
Proxy server acts as a middleman between a user and the internet, providing anonymity and security.
DHCP dynamically assigns IP addresses to devices on a network, simplifying network administration.
Proxy servers can be used to bypass content restrictions or improve netwo...
BGP stands for Border Gateway Protocol, used for routing between different autonomous systems on the internet.
BGP is a standardized exterior gateway protocol used to exchange routing information between different autonomous systems (AS).
It helps in determining the best path for data packets to travel between networks.
BGP is crucial for ensuring efficient and reliable internet connectivity.
It allows network administrato...
Routing protocols determine how data packets are forwarded across a network, while routed protocols define the format of the packets.
Routing protocols are used by routers to determine the best path for forwarding data packets.
Examples of routing protocols include RIP, OSPF, and BGP.
Routed protocols are used to format the data packets themselves, such as IP or IPv6.
Examples of routed protocols include TCP/IP, UDP, and I...
OSPF, RIP, IGRP, and EIGRP are routing protocols used in networking to determine the best path for data packets to travel.
OSPF (Open Shortest Path First) is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path.
RIP (Routing Information Protocol) is a distance-vector routing protocol that uses hop count as a metric to determine the best path.
IGRP (Interior Gateway Routing Protocol) ...
VLAN types include default, data, voice, management, and native VLANs.
Default VLAN: VLAN 1 is the default VLAN on Cisco switches.
Data VLAN: Used for data traffic.
Voice VLAN: Used for voice traffic.
Management VLAN: Used for managing network devices.
Native VLAN: Untagged VLAN used for trunking.
Router commands are used to configure and manage routers in a network.
show ip interface brief - displays a summary of the router's interfaces and their IP addresses
show running-config - displays the current configuration of the router
interface [interface name] - enters interface configuration mode for a specific interface
ip route [destination network] [subnet mask] [next hop IP] - adds a static route to the routing tab...
Subnet mask is a 32-bit number used to divide an IP address into network and host portions.
Subnet mask is used to determine which part of an IP address is the network portion and which part is the host portion.
There are different types of subnet masks such as Classful subnet masks, Classless subnet masks, and Variable Length Subnet Masks (VLSM).
Examples of subnet masks include 255.255.255.0 (Class C), 255.255.0.0 (Clas...
I applied via Walk-in and was interviewed in Jun 2021. There were 3 interview rounds.
I applied via Walk-in and was interviewed in Jun 2021. There were 3 interview rounds.
Top trending discussions
posted on 16 Sep 2021
I appeared for an interview before Sep 2020.
Round duration - 30 minutes
Round difficulty - Easy
To search for a node in a linked list, iterate through the list and compare each node's value with the target value.
Start at the head of the linked list
Iterate through each node by following the 'next' pointer
Compare the value of each node with the target value
Return the node if found, otherwise return null
To detect a loop in a linked list, we can use Floyd's Cycle Detection Algorithm.
Initialize two pointers, slow and fast, at the head of the linked list.
Move slow pointer by one step and fast pointer by two steps.
If there is a loop, the two pointers will eventually meet.
Alternatively, we can use a hash set to store visited nodes and check for duplicates.
Implement a stack using a singly linked list
Create a Node class with data and next pointer
Create a Stack class with top pointer pointing to the top of the stack
Implement push, pop, and peek operations by manipulating the linked list
Example: Node class - Node { int data; Node next; }
Round duration - 40 minutes
Round difficulty - Easy
The top view of a binary tree shows the nodes visible from the top when looking down from the root node.
The top view of a binary tree is the set of nodes visible from the top when looking down from the root node.
Nodes at the same horizontal distance from the root are considered at the same level in the top view.
If multiple nodes are at the same horizontal distance, only the topmost node at that level is included in the...
Deleting a node from a linked list involves updating pointers to maintain the list's integrity.
Identify the node to be deleted by traversing the list
Update the previous node's next pointer to skip the node to be deleted
Free the memory allocated to the node to be deleted
Do practice a lot of questions on linked list and stacks as these are two most important data structures asked in the interview. Also, try to implement it yourself without seeing the solution. Also prepare for Computer Science subjects like Operating System, Database Management System, Computer Networks, etc. I prepared them through Coding Ninjas notes which were simpler and easy to understand.
Application resume tips for other job seekersKeep your resume short and up to mark and check spellings before submitting it for the interview process.
Final outcome of the interviewSelectedI appeared for an interview before May 2021.
Round duration - 120 Minutes
Round difficulty - Medium
Round duration - 60 Minutes
Round difficulty - Easy
Given a singly linked list with 'N' nodes containing integer values, your task is to sort the list using insertion sort and output the sorted list.
Insertion Sort is an al...
Implement insertion sort algorithm on a singly linked list with integer values.
Traverse the linked list and for each node, find its correct position in the sorted list.
Remove the node from the original list and insert it at the correct position in the sorted list.
Repeat this process until all nodes are sorted.
Ensure the implementation is in-place, without using extra space.
Handle edge cases like empty list or single no...
Your task is to implement a Stack data structure using a Singly Linked List.
Create a class named Stack
which supports the following operations, each in O(1...
Implement a Stack data structure using a Singly Linked List with operations in O(1) time.
Create a class named Stack with getSize, isEmpty, push, pop, and getTop methods.
Use a Singly Linked List to store the elements of the stack.
Ensure each operation runs in O(1) time complexity.
Handle cases where the stack is empty appropriately.
Implement the logic for each query type as specified in the input and output sections.
Given an integer N, determine and print all the prime numbers between 2 and N, inclusive.
Integer N
Prime numbers printed on separate lines
Generate and print all prime numbers between 2 and N, inclusive.
Iterate from 2 to N and check if each number is prime
Use a helper function to determine if a number is prime
Print each prime number on a new line
Round duration - 45 Minutes
Round difficulty - Medium
This round was based on oops concepts and their applications and about STLs.
Given a number N
, generate a pattern where the outer rectangle is filled with the number N
, and the inner rectangles contain decreasing numbers down to 1.
The input be...
Generate a rectangular pattern with outer rectangle filled with N and inner rectangles containing decreasing numbers.
Create a 2-D array with dimensions based on input N
Fill the outer rectangle with N and inner rectangles with decreasing numbers down to 1
Adjust the values in the inner rectangles based on the layer number
Return the generated pattern as a 2-D list/array
Round duration - 30 Minutes
Round difficulty - Easy
This around was basically to judge my communication and behavioral skills.
Tip 1 : Basics should be very clear related to DSA.
Tip 2 : Good knowledge of OS will be plus for Qualcomm
Tip 3 : One should revise the college project thoroughly before interview.
Tip 1 : Be brief while writing resume.
Tip 2 : Mention atleast 2 projects.
posted on 7 May 2017
I appeared for an interview in Feb 2017.
malloc is a function in C that dynamically allocates memory on the heap. It is used to allocate memory for variables or data structures.
malloc is used in C programming language.
It is used to allocate memory on the heap.
malloc is different from 'new' in C++ as it does not call constructors for objects.
C++ is a general-purpose programming language while Objective C is a superset of C used for iOS and macOS development.
C++ is widely used for developing applications, games, and system software.
Objective C is mainly used for iOS and macOS development.
C++ supports both procedural and object-oriented programming paradigms.
Objective C is an object-oriented language with dynamic runtime features.
C++ has a larger community a...
Class container is a class that holds objects of other classes, while class composition is a way to combine multiple classes to create a new class.
Class container holds objects of other classes, acting as a collection or container.
Class composition combines multiple classes to create a new class with its own behavior and attributes.
In class container, the objects are typically stored in a data structure like an array o...
Divide the horses into groups of 5 and race them. Take the top 2 from each race and race them again. Finally, race the top 2 horses to determine the top 3.
Divide the horses into 3 groups of 5 and race them.
Take the top 2 horses from each race and race them again.
Finally, race the top 2 horses to determine the top 3.
Developing a real-time data processing system for a high-traffic e-commerce website
Implemented a distributed system architecture to handle large volumes of data
Optimized algorithms for efficient data processing and storage
Utilized caching mechanisms to improve system performance
Worked closely with cross-functional teams to troubleshoot and resolve issues
Example: Successfully reduced data processing time by 50% by imple...
Seeking new challenges and opportunities for growth.
Looking for a more challenging role to further develop my skills
Interested in exploring new technologies and industries
Seeking better career advancement opportunities
Want to work in a more collaborative team environment
The width of a tree is the maximum number of nodes at any level in the tree.
To calculate the width of a tree, we can perform a level order traversal and keep track of the maximum number of nodes at any level.
We can use a queue data structure to perform the level order traversal.
At each level, we count the number of nodes in the queue and update the maximum width if necessary.
based on 1 interview experience
Difficulty level
Duration
Senior Engineer
29
salaries
| ₹3.9 L/yr - ₹10.2 L/yr |
Production Assistant
21
salaries
| ₹1.8 L/yr - ₹3.5 L/yr |
Junior Engineer
17
salaries
| ₹1.6 L/yr - ₹3.6 L/yr |
Senior Design Engineer
16
salaries
| ₹5.6 L/yr - ₹9.5 L/yr |
Service Engineer
16
salaries
| ₹14.3 L/yr - ₹18.5 L/yr |
Qualcomm
Intel
Molex
TDK India Private Limited