Filter interviews by
I am a highly skilled System Engineer with expertise in designing and implementing complex IT infrastructure.
Experienced in managing and troubleshooting network systems
Proficient in virtualization technologies such as VMware and Hyper-V
Strong knowledge of operating systems like Windows, Linux, and Unix
Familiar with scripting languages like PowerShell and Bash
Ability to analyze and optimize system performance
Excellent p
Troubleshooting email outlook related issues involves checking settings, connectivity, and account status.
Check internet connectivity
Verify account settings
Check for updates and patches
Disable add-ins and extensions
Recreate email profile
Check server status
Check for antivirus and firewall settings
Try accessing email from a different device or browser
Diagnosing booting related issues involves checking hardware, software, and configuration settings.
Check hardware components such as hard drive, RAM, and motherboard for any issues
Verify that the operating system is installed correctly and up-to-date
Check the boot order in BIOS settings
Use diagnostic tools such as Windows Startup Repair or Linux Boot Repair
Check for any recent software or driver updates that may have c
To assign an IP address in Windows, go to Network and Sharing Center, select the network adapter, and choose Properties.
Open Network and Sharing Center
Click on Change adapter settings
Right-click on the network adapter and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and click Properties
Choose 'Use the following IP address' and enter the IP address, subnet mask, and default gateway
Click OK to save the
To join a system in a Windows domain, follow these steps:
Open System Properties and click on the 'Computer Name' tab
Click the 'Change' button and select the 'Domain' option
Enter the name of the domain and provide domain credentials when prompted
Restart the computer for the changes to take effect
Active Directory is a Microsoft service that manages network resources and user permissions.
It is used to authenticate and authorize users and computers in a Windows domain network.
It stores information about users, groups, computers, and other network objects.
It allows administrators to centrally manage and deploy software, updates, and policies.
It provides a hierarchical structure for organizing network resources.
It ...
Top trending discussions
I applied via Company Website and was interviewed in Dec 2024. There were 2 interview rounds.
There are two main sections: foundation and advanced. The foundation section consists of three subsections: quantitative, reasoning, and verbal. If you pass the foundation section but do not clear the advanced section, you will be considered for either the ninja role or the digital role during the interview process. The advanced section includes advanced aptitude questions and two coding questions.
There were a total of seven sections: verbal ability, logical reasoning, arithmetic problems, verbal reasoning, puzzles, pseudocodes, and essay writing, with each section having its own cutoff scores.
I was interviewed in Oct 2024.
I was interviewed in Jul 2024.
Lambda expression is a concise way to represent an anonymous function in programming languages.
Lambda expressions are used to create functions without a name.
They are often used in functional programming languages like Python and Java.
Lambda expressions can take parameters and return a value.
Example: (x, y) -> x + y is a lambda expression that takes two parameters and returns their sum.
Hibernate is better than JDBC due to its object-relational mapping capabilities, automatic table creation, and improved performance.
Hibernate provides object-relational mapping (ORM) which simplifies database interactions by mapping Java objects to database tables, eliminating the need for manual SQL queries.
Hibernate can automatically generate SQL queries based on the Java objects, reducing the amount of code that nee...
Filter names starting with A from a list of strings
Iterate through the list of strings
Check if each string starts with 'A'
Add the string to a new list if it starts with 'A'
I applied via Company Website and was interviewed in Mar 2024. There were 4 interview rounds.
Devlopment in working
Assignment in work based
Coading A re Working based
A technical problem is an issue or challenge related to the functionality or performance of a system or technology.
Technical problems can arise from software bugs, hardware malfunctions, network issues, or compatibility issues.
Identifying and troubleshooting technical problems often requires a systematic approach, such as using diagnostic tools or following a step-by-step process.
Examples of technical problems include ...
It was a good interview experience
Designed and implemented a cloud-based monitoring system for a large-scale network infrastructure
Utilized AWS services such as CloudWatch and Lambda functions
Developed custom scripts for data collection and analysis
Implemented real-time alerts and notifications for system administrators
Improved system performance and reliability through proactive monitoring
Collaborated with cross-functional teams to gather requirements
I applied via TCS and was interviewed in Dec 2024. There was 1 interview round.
Hash technology is a method used to convert data into a fixed-size string of characters, typically used for data security and integrity.
Hash technology uses algorithms to generate a unique fixed-size string of characters from input data.
It is commonly used for data security, password storage, digital signatures, and data integrity verification.
Examples of hash algorithms include MD5, SHA-1, and SHA-256.
Blockchain is a decentralized, distributed ledger technology used to securely record transactions across multiple computers.
Decentralized database
Consensus mechanism
Immutable record of transactions
Cryptographic security
Smart contracts
Examples: Bitcoin, Ethereum
DML stands for Data Manipulation Language, used to manage data in a database.
DML is a subset of SQL (Structured Query Language) used to insert, update, delete, and retrieve data in a database.
Examples of DML commands include INSERT, UPDATE, DELETE, and SELECT.
DML is essential for managing and manipulating data within a database system.
Binary to decimal conversion involves multiplying each digit by 2 raised to the power of its position.
To convert binary to decimal, start from the rightmost digit and multiply each digit by 2 raised to the power of its position.
Add all the results together to get the decimal equivalent.
For example, to convert binary 1011 to decimal: 1*2^3 + 0*2^2 + 1*2^1 + 1*2^0 = 11.
Iterate through array and compare each element to find the maximum number.
Iterate through the array using a loop.
Compare each element to a variable storing the current maximum number.
Update the variable if a larger number is found.
Return the maximum number at the end.
Basic HTML code for inserting image and creating a table
Use <img> tag to insert an image with src attribute
Use <table>, <tr>, <td> tags to create a table structure
Specify image source and table content within respective tags
I applied via Campus Placement and was interviewed in Nov 2024. There were 2 interview rounds.
Its very easy
Basic maths questions learned up to 10
Basic Apptitude questions
The recent challenges faced in the field of System Engineering include adapting to remote work, cybersecurity threats, and managing complex systems.
Adapting to remote work due to the COVID-19 pandemic
Increased cybersecurity threats and the need for enhanced security measures
Managing complex systems with evolving technology and integration challenges
Troubleshooting DB errors involves identifying the root cause, checking logs, verifying configurations, and testing queries.
Identify the specific error message or behavior
Check database logs for any relevant information
Verify database configurations and settings
Test the problematic queries to isolate the issue
Consider recent changes or updates that may have caused the error
To troubleshoot performance related errors, analyze system logs, check resource utilization, identify bottlenecks, and optimize configurations.
Analyze system logs for any error messages or warnings related to performance issues
Check resource utilization such as CPU, memory, disk, and network usage
Identify bottlenecks in the system that may be causing performance degradation
Optimize configurations such as adjusting sett...
P1 tickets are high priority issues that require immediate attention and resolution.
Acknowledge the ticket immediately to show the user that their issue is being addressed
Assess the severity of the issue and prioritize accordingly
Communicate with the user regularly to provide updates on the progress
Involve necessary stakeholders or teams to expedite resolution
Ensure proper documentation of the issue and resolution step
Relationship Manager
103
salaries
| ₹2 L/yr - ₹5 L/yr |
Assistant Manager
78
salaries
| ₹3.5 L/yr - ₹11 L/yr |
Senior Relationship Manager
76
salaries
| ₹2.5 L/yr - ₹4 L/yr |
Executive Relationship Manager
66
salaries
| ₹2.7 L/yr - ₹4.2 L/yr |
Sales Manager
47
salaries
| ₹1.7 L/yr - ₹6.5 L/yr |
ICICI Lombard General Insurance Company
HDFC Ergo General Insurance
Reliance General Insurance
Tata AIG