Add office photos
Employer?
Claim Account for FREE

Cisco

4.1
based on 1.8k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

200+ Xylem Learning Interview Questions and Answers

Updated 21 Feb 2025
Popular Designations

Q1. Find Row With Maximum 1's in a Sorted 2D Matrix

You are provided with a 2D matrix containing only the integers 0 or 1. The matrix has dimensions N x M, and each row is sorted in non-decreasing order. Your objec...read more

Add your answer

Q2. Intersection of Linked List Problem

You are provided with two singly linked lists containing integers, where both lists converge at some node belonging to a third linked list.

Your task is to determine the data...read more

Add your answer

Q3. Interleaving Two Strings Problem Statement

You are given three strings 'A', 'B', and 'C'. Determine if 'C' is formed by interleaving 'A' and 'B'.

String 'C' is an interleaving of 'A' and 'B' if the length of 'C...read more

Add your answer

Q4. Pattern Matching Problem Statement

Given a pattern as a string and a set of words, determine if the pattern and the words list align in the same sequence.

Input:
T (number of test cases)
For each test case:
patte...read more
Add your answer
Discover Xylem Learning interview dos and don'ts from real experiences

Q5. Next Greater Element Problem Statement

You are given an array arr of length N. For each element in the array, find the next greater element (NGE) that appears to the right. If there is no such greater element, ...read more

Add your answer

Q6. Rat in a Maze Problem Statement

You need to determine all possible paths for a rat starting at position (0, 0) in a square maze to reach its destination at (N-1, N-1). The maze is represented as an N*N matrix w...read more

Add your answer
Are these interview questions helpful?

Q7. Optimal Strategy for a Coin Game

You are playing a coin game with your friend Ninjax. There are N coins placed in a straight line.

Here are the rules of the game:

1. Each coin has a value associated with it.
2....read more
Ans.

The task is to find the maximum amount you can definitely win in a game of coins against an opponent who plays optimally.

  • The game is played with alternating turns, and each player can pick the first or last coin from the line.

  • The value associated with the picked coin adds up to the total amount the player wins.

  • To maximize your winnings, you need to consider all possible combinations of coin picks.

  • Use dynamic programming to calculate the maximum amount you can win.

  • Keep track o...read more

Add your answer

Q8. Apple Pickup Problem Statement

Alice has a garden represented as a ‘N’ * ‘N’ grid called ‘MATRIX’. She wants to collect apples following these rules:

  • 1 -> Alice can pick an apple from this cell and pass throug...read more
Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Pattern Search in Strings

Given two strings S and P consisting of lowercase English alphabets, determine if P is present in S as a substring.

Input:

The first line contains an integer T, the number of test case...read more
Add your answer

Q10. Snake and Ladder Problem Statement

Given a 'Snake and Ladder' board with N rows and N columns, where positions are numbered from 1 to (N*N) starting from the bottom left, alternating direction each row, find th...read more

Add your answer

Q11. Covid Vaccination Distribution Problem

As the Government ramps up vaccination drives to combat the second wave of Covid-19, you are tasked with helping plan an effective vaccination schedule. Your goal is to ma...read more

Ans.

This question asks for finding the maximum number of vaccines administered on a specific day during a vaccination drive, given the total number of days, total number of vaccines available, and the day number.

  • Read the number of test cases

  • For each test case, read the number of days, day number, and total number of vaccines available

  • Implement a logic to find the maximum number of vaccines administered on the given day number

  • Print the maximum number of vaccines administered for e...read more

Add your answer

Q12. Longest Substring Without Repeating Characters Problem Statement

Given a string S of length L, determine the length of the longest substring that contains no repeating characters.

Example:

Input:
"abacb"
Output...read more
Add your answer

Q13. Problem: Search In Rotated Sorted Array

Given a sorted array that has been rotated clockwise by an unknown amount, you need to answer Q queries. Each query is represented by an integer Q[i], and you must determ...read more

Ans.

This is a problem where we need to search for a given number in a rotated sorted array.

  • The array is sorted and then rotated, so we can use binary search to find the number.

  • We can find the pivot point where the rotation happened and then perform binary search on the appropriate half of the array.

  • To find the pivot point, we can use a modified binary search algorithm.

  • Once we find the pivot point, we can determine which half of the array the target number lies in and perform bina...read more

Add your answer

Q14. Ways To Make Coin Change

Given an infinite supply of coins of varying denominations, determine the total number of ways to make change for a specified value using these coins. If it's not possible to make the c...read more

Add your answer

Q15. Cycle Detection in a Singly Linked List

Determine if a given singly linked list of integers forms a cycle or not.

A cycle in a linked list occurs when a node's next points back to a previous node in the list. T...read more

Add your answer

Q16. Find the Lone Set Bit

Your task is to identify the position of the only '1' bit in the binary representation of a given non-negative integer N. The representation contains exactly one '1' and the rest are '0's....read more

Add your answer

Q17. Word Break Problem Statement

You are given a list of N strings called A. Your task is to determine whether you can form a given target string by combining one or more strings from A.

The strings from A can be u...read more

Add your answer

Q18. Add Two Numbers Represented as Linked Lists

Given two linked lists representing two non-negative integers, where the digits are stored in reverse order (i.e., starting from the least significant digit to the mo...read more

Add your answer

Q19. How many clients are possible for a /24 address?. What is the network address and broadcast address here?

Ans.

A /24 address can have 256 clients. Network address is the first IP and broadcast address is the last IP.

  • A /24 address has 256 IP addresses

  • The network address is the first IP in the range

  • The broadcast address is the last IP in the range

Add your answer

Q20. Detect and Remove Loop in Linked List

For a given singly linked list, identify if a loop exists and remove it, adjusting the linked list in place. Return the modified linked list.

Expected Complexity:

Aim for a...read more

Add your answer

Q21. Spiral Order Traversal of a Binary Tree

Given a binary tree with N nodes, your task is to output the Spiral Order traversal of the binary tree.

Input:

The input consists of a single line containing elements of ...read more
Add your answer

Q22. Maximum Path Sum Between Two Leaves

Given a non-empty binary tree where each node has a non-negative integer value, determine the maximum possible sum of the path between any two leaves of the given tree.

Expla...read more

Add your answer

Q23. Minimum Steps for a Knight to Reach Target

Given a square chessboard of size 'N x N', determine the minimum number of moves a Knight requires to reach a specified target position from its initial position.

Expl...read more

Add your answer

Q24. Dijkstra's Shortest Path Problem Statement

You are given an undirected graph with V vertices (numbered from 0 to V-1) and E edges. Each edge connects two nodes u and v and has an associated weight representing ...read more

Add your answer

Q25. Level Order Traversal Problem Statement

Given a binary tree of integers, return the level order traversal of the binary tree.

Input:

The first line contains an integer 'T', representing the number of test cases...read more
Add your answer

Q26. Next Greater Number Problem Statement

Given a string S which represents a number, determine the smallest number strictly greater than the original number composed of the same digits. Each digit's frequency from...read more

Ans.

The task is to find the smallest number greater than the given number, with the same set of digits.

  • Iterate through the digits of the given number from right to left.

  • Find the first digit that is smaller than the digit to its right.

  • Swap this digit with the smallest digit to its right that is greater than it.

  • Sort the digits to the right of the swapped digit in ascending order.

  • If no such digit is found, return -1.

Add your answer

Q27. LRU Cache Design Question

Design a data structure for a Least Recently Used (LRU) cache that supports the following operations:

1. get(key) - Return the value of the key if it exists in the cache; otherwise, re...read more

Add your answer

Q28. Find All Pairs Adding Up to Target

Given an array of integers ARR of length N and an integer Target, your task is to return all pairs of elements such that they add up to the Target.

Input:

The first line conta...read more
Add your answer

Q29. Anagram Pairs Verification Problem

Your task is to determine if two given strings are anagrams of each other. Two strings are considered anagrams if you can rearrange the letters of one string to form the other...read more

Add your answer
Q30. ...read more

Implement Stack with Linked List

Your task is to implement a Stack data structure using a Singly Linked List.

Explanation:

Create a class named Stack which supports the following operations, each in O(1) time:

Add your answer

Q31. LCA of Three Nodes Problem Statement

You are given a Binary Tree with 'N' nodes where each node contains an integer value. Additionally, you have three integers, 'N1', 'N2', and 'N3'. Your task is to find the L...read more

Add your answer

Q32. When would I go for a router to make two computers communicate?

Ans.

A router is needed to connect two computers in different networks or to share internet connection.

  • When two computers are in different networks, a router is needed to connect them.

  • A router can also be used to share internet connection between multiple devices.

  • Routers can provide additional security features like firewall and VPN.

  • Examples of routers include Cisco, Netgear, and TP-Link.

Add your answer

Q33. Reverse Linked List Problem Statement

Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.

Input:

The first line of input is an integer T, rep...read more
Add your answer

Q34. Longest Subarray Zero Sum Problem Statement

Given an array of integers arr, determine the length of the longest contiguous subarray that sums to zero.

Input:

N (an integer, the length of the array)
arr (list of ...read more
Add your answer

Q35. What is the difference between an arraylist and a linkedlist in Java?

Ans.

ArrayList is a resizable array while LinkedList is a doubly linked list.

  • ArrayList is faster for accessing elements while LinkedList is faster for adding or removing elements.

  • ArrayList uses contiguous memory while LinkedList uses non-contiguous memory.

  • ArrayList is better for random access while LinkedList is better for sequential access.

  • Example: ArrayList - List names = new ArrayList<>(); LinkedList - List names = new LinkedList<>();

Add your answer

Q36. What are possible security issues and How to manage Security concerns in web application

Ans.

Possible security issues and how to manage them in web applications

  • SQL injection attacks

  • Cross-site scripting (XSS) attacks

  • Cross-site request forgery (CSRF) attacks

  • Insecure authentication and authorization mechanisms

  • Sensitive data exposure

  • Implementing secure coding practices

  • Regularly updating software and security patches

  • Conducting regular security audits and penetration testing

  • Implementing multi-factor authentication

  • Using HTTPS and SSL/TLS encryption

  • Limiting access to sensiti...read more

Add your answer

Q37. Maximum Size Rectangle Sub-matrix with All 1's Problem Statement

You are provided with an N * M sized binary matrix 'MAT' where 'N' denotes the number of rows and 'M' denotes the number of columns. Your task is...read more

Add your answer

Q38. Spiral Matrix Problem Statement

You are given a N x M matrix of integers. Your task is to return the spiral path of the matrix elements.

Input

The first line contains an integer 'T' which denotes the number of ...read more
Add your answer

Q39. Minimum Cost Path Problem Statement

Given an N x M matrix filled with integers, determine the minimum sum obtainable from a path that starts at a specified cell (x, y) and ends at the top left corner of the mat...read more

Add your answer

Q40. What is the difference between an object oriented and object based language?

Ans.

Object-oriented languages support inheritance and polymorphism, while object-based languages do not.

  • Object-oriented languages allow for the creation of classes and objects, and support inheritance and polymorphism.

  • Object-based languages only support objects, but do not have the concept of classes or inheritance.

  • Examples of object-oriented languages include Java, C++, and Python, while JavaScript is an example of an object-based language.

Add your answer

Q41. Explain what happens underneath when you enter a URL in the browser

Ans.

Entering a URL in the browser triggers a series of events to retrieve and display the requested webpage.

  • The browser checks the cache for a previously stored copy of the webpage

  • If not found, the browser sends a request to the DNS server to resolve the domain name to an IP address

  • The browser then sends a request to the web server at the IP address for the webpage

  • The web server responds with the requested webpage

  • The browser renders the webpage and displays it to the user

Add your answer

Q42. What is virtual memory? What is its size in relation to main memory?

Ans.

Virtual memory is a memory management technique that allows a computer to use more memory than physically available.

  • Virtual memory is created by using hard disk space as an extension of RAM.

  • It allows running more programs than the physical memory can handle.

  • The size of virtual memory is typically larger than the size of main memory.

  • Virtual memory is divided into pages, which are swapped in and out of main memory as needed.

  • Examples of virtual memory include Windows pagefile an...read more

Add your answer

Q43. Subtree Node Count Problem

We are provided with a tree containing 'N' nodes, numbered from 0 to N-1. The objective is to determine the total number of nodes within each subtree of the provided tree. Specificall...read more

Add your answer

Q44. Binary Tree Traversals

You are provided with a binary tree consisting of integer-valued nodes. The task is to compute the In-Order, Pre-Order, and Post-Order traversals for the given binary tree.

Input:

The inp...read more
Add your answer

Q45. What is the difference between anycast, unicast, and multicast?

Ans.

Anycast, unicast, and multicast are different ways of routing network traffic.

  • Unicast is one-to-one communication between a sender and a receiver.

  • Anycast is one-to-nearest communication where the sender sends a message to the nearest receiver.

  • Multicast is one-to-many communication where the sender sends a message to a group of receivers.

  • Anycast is used for load balancing and finding the nearest server.

  • Unicast is used for regular client-server communication.

  • Multicast is used f...read more

Add your answer

Q46. 1.Two routers are connected,Ospf is enabled but link is down, what are the specific methods to link up

Ans.

To link up two routers with OSPF enabled but link down, specific methods include checking physical connections, verifying OSPF configurations, and troubleshooting network issues.

  • Check physical connections and ensure cables are properly connected and not damaged

  • Verify OSPF configurations and ensure that the routers are configured with the same OSPF process ID and network type

  • Troubleshoot network issues by checking for any network outages or misconfigurations

  • Use tools such as p...read more

View 2 more answers

Q47. JS Interview: How async works in javascript given that it is single threaded?

Ans.

Async in JS allows non-blocking code execution despite being single-threaded.

  • JS uses event loop to handle async operations

  • Callbacks, Promises, and Async/Await are used for async programming

  • setTimeout() and setInterval() are examples of async functions

  • JS runtime delegates async tasks to the browser or Node.js environment

  • Async code can improve performance and user experience

Add your answer

Q48. In a tournament with N teams, where in one team can play only one match per day, develop an algo which schedules the matches in the tournament. Each team shall play with the other team once(same as designing th...

read more
Ans.

An algorithm to schedule matches in a tournament with N teams, where each team plays only one match per day.

  • Create a round-robin schedule where each team plays every other team once.

  • Start by assigning each team a number.

  • Generate a schedule by pairing teams based on their numbers.

  • Optimize the schedule by minimizing the number of days required.

  • Consider using a graph-based approach to find the optimal schedule.

Add your answer

Q49. Explain why MAC addresses are required despite having IP addresses

Ans.

MAC addresses are required for identifying devices on a local network, while IP addresses are used for identifying devices on a global network.

  • MAC addresses are used for communication within a local network

  • IP addresses are used for communication across different networks

  • MAC addresses are assigned by the manufacturer and cannot be changed

  • IP addresses can be assigned dynamically or statically

  • MAC addresses are used in the data link layer of the OSI model

  • IP addresses are used in ...read more

Add your answer

Q50. What are the new flags which RSTP BPDU's introduces?

Ans.

RSTP BPDU introduces two new flags: TCN and Proposal.

  • TCN (Topology Change Notification) flag is used to indicate a topology change in the network.

  • Proposal flag is used to speed up the convergence process by allowing a switch to immediately transition to the forwarding state.

  • TCN flag is set by the root bridge and propagated to all switches in the network.

  • Proposal flag is set by a switch and sent to the root bridge.

  • Both flags are included in the BPDU message.

  • TCN flag triggers a...read more

View 1 answer

Q51. Remove Duplicates from String Problem Statement

You are provided a string STR of length N, consisting solely of lowercase English letters.

Your task is to remove all duplicate occurrences of characters in the s...read more

Add your answer

Q52. main() { int *i; int s=(int *)malloc(10*sizeof(int)); for (i=0;i&lt;10;i++) { printf(?%d?,i*i) } whats the output?

Ans.

The code will not compile due to type mismatch in malloc and incorrect usage of pointers.

  • Use correct type casting in malloc, like int *s = (int *)malloc(10*sizeof(int));

  • Correct the for loop syntax to iterate over the array elements, like for (i=0; i<10; i++)

  • Use correct syntax for printf function, like printf("%d", i*i);

View 1 answer

Q53. Program to print the elements of a binary tree in spiral order

Ans.

Program to print binary tree elements in spiral order

  • Use two stacks to keep track of nodes at odd and even levels

  • Push nodes from left to right in odd level stack and right to left in even level stack

  • Pop nodes from the stack alternatively and print them

  • Repeat until both stacks are empty

Add your answer
Q54. What is an IP address and how many bits are required to represent it?
Add your answer

Q55. Given two numbers m and n, write a method to return the first number r that is divisible by both (e.g., the least common multiple). ANS:Define q to be 1. for each prime number p less than m and n: find the larg...

read more
Ans.

The method returns the least common multiple (LCM) of two numbers m and n.

  • The method uses prime factorization to find the LCM.

  • It iterates through all prime numbers less than m and n.

  • For each prime number, it finds the largest power of the prime that divides both m and n.

  • The method then multiplies the current LCM by the prime raised to the maximum power.

  • Finally, it returns the computed LCM.

Add your answer

Q56. Mention the number of bits in IPv4 and IPv6 addresses

Ans.

IPv4 has 32 bits and IPv6 has 128 bits.

  • IPv4 addresses are in the format of xxx.xxx.xxx.xxx where each xxx is an 8-bit number.

  • IPv6 addresses are in the format of xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx where each xxxx is a 16-bit number.

  • IPv6 addresses allow for a much larger number of unique addresses than IPv4.

Add your answer

Q57. 1. Write a program to find second largest in an integer array. 2. Write a program to find denomination to get amount as 1976 for below {2000, 1000,500,200,100,50,20,10,5,1} If Amount :1976 Then it should return...

read more
Ans.

Programs to find second largest in an integer array and denomination to get amount.

  • For finding the second largest number, sort the array in descending order and return the second element.

  • For finding the denomination, loop through the array of denominations and keep dividing the amount until it becomes zero.

  • Use integer division to get the number of notes of each denomination.

View 1 answer

Q58. Explain inheritance and abstraction with a concrete example

Ans.

Inheritance is a way to create new classes based on existing ones. Abstraction is a way to hide implementation details.

  • Inheritance allows a subclass to inherit properties and methods from a superclass.

  • Abstraction allows a class to provide a simplified interface to its users while hiding its implementation details.

  • For example, a Car class can inherit properties and methods from a Vehicle class, while also implementing its own unique features.

  • Abstraction can be seen in a TV rem...read more

Add your answer

Q59. A user is unable to SSH the server, how do you troubleshoot this?

Ans.

To troubleshoot SSH issue, check network connectivity, firewall settings, SSH configuration, and user permissions.

  • Check if the server is reachable over the network

  • Verify if the SSH service is running on the server

  • Check if the firewall is blocking SSH traffic

  • Verify SSH configuration on the server

  • Check if the user has the necessary permissions to access the server

  • Check SSH logs for any errors or warnings

Add your answer
Q60. Can you describe how a website sends data to a server?
Add your answer

Q61. How Does DHCP Work please describe us within 2 minutes

Ans.

DHCP is a network protocol that automatically assigns IP addresses to devices on a network.

  • DHCP stands for Dynamic Host Configuration Protocol.

  • It allows devices to obtain IP addresses, subnet masks, default gateways, and other network configuration settings automatically.

  • DHCP uses a client-server model, where the DHCP server assigns IP addresses to clients.

  • The DHCP server maintains a pool of available IP addresses and leases them to clients for a specific period of time.

  • When ...read more

View 4 more answers

Q62. Design an algorithm that, given a list of n elements in an array, finds all the elements that appear more than n/3 times in the list. The algorithm should run in linear time ( n &gt;=0 ) You are expected to use co...

read more
Ans.

Algorithm to find elements appearing more than n/3 times in an array in linear time

  • Divide the array into three equal parts

  • Iterate through the array and count the occurrences of each element in each part

  • Check if the count of any element is greater than n/3

  • Return the elements that meet the condition

Add your answer

Q63. Can you use a variable in a file using extern which is defined as both static and global in base file?

Ans.

No, it is not possible to use a variable defined as both static and global in base file using extern.

  • A variable cannot be both static and global at the same time.

  • Static variables have file scope and cannot be accessed from other files using extern.

  • Global variables can be accessed from other files using extern, but cannot be static.

  • Therefore, it is not possible to use a variable defined as both static and global in base file using extern.

Add your answer
Q64. What are the different types of semaphores?
Add your answer

Q65. arrays base address is 1000?.array is a[5][4]..then what is the correct address of a[4][3]? ans:1056

Ans.

The correct address of a[4][3] in the given array is 1056.

  • The base address of the array is 1000.

  • Each element in the array occupies a certain amount of memory.

  • To calculate the address of a specific element, we need to consider the size of each element and the dimensions of the array.

Add your answer

Q66. JS interview: What is event bubble and capture?

Ans.

Event bubble and capture are two ways of propagating events in the DOM tree.

  • Event bubble is the default behavior where an event is first captured by the innermost element and then propagated to the outer elements.

  • Event capture is the opposite of event bubble where an event is first captured by the outermost element and then propagated to the inner elements.

  • Both event bubble and capture can be used together to handle events in a more controlled way.

  • Event.stopPropagation() meth...read more

Add your answer
Q67. What is the difference between IPv4 and IPv6?
Add your answer
Q68. What is the use of a router and how does it differ from a gateway?
Add your answer
Q69. How would you compete with Google if you wanted to create a search engine?
Add your answer

Q70. How TCP works? How does it handle cognition?

Ans.

TCP is a protocol that ensures reliable communication by establishing a connection, managing data transfer, and handling errors.

  • TCP establishes a connection between two devices before data transfer begins.

  • It breaks data into packets and numbers them for sequencing.

  • It uses acknowledgments and retransmissions to ensure all packets are received.

  • TCP handles flow control by adjusting the transmission rate based on receiver's capacity.

  • It also handles congestion control by detecting...read more

Add your answer
Q71. How does C++ support polymorphism?
Add your answer
Q72. What happens when you boot your system?
Add your answer

Q73. How do you implement a queue using as stacks

Ans.

Implement a queue using two stacks by using one stack for enqueue operation and another stack for dequeue operation.

  • Use one stack for enqueue operation by pushing elements onto it.

  • Use another stack for dequeue operation by popping elements from it. If the dequeue stack is empty, transfer all elements from the enqueue stack to the dequeue stack.

  • Maintain the order of elements by transferring elements between the two stacks as needed.

Add your answer
Q74. Explain why MAC addresses are necessary even though we have IP addresses.
Add your answer

Q75. What happens when you type google.com on your web browser?

Ans.

When you type google.com on your web browser, it sends a request to Google's server and loads the website.

  • The browser sends a DNS request to resolve the domain name 'google.com' to an IP address

  • The browser establishes a TCP connection with Google's server

  • The browser sends an HTTP request to the server for the homepage of google.com

  • The server responds with the HTML code for the homepage

  • The browser renders the HTML code and displays the webpage

Add your answer

Q76. If you are not having a sizeof operator in C, how will you get to know the size of an int ?

Ans.

Use the sizeof operator on a variable of type int to get its size.

  • Use sizeof operator on a variable of type int

  • Size of int is typically 4 bytes

  • Size may vary depending on the system architecture

Add your answer

Q77. When we declare union in C, how is the size of union allocated in the memory?

Ans.

Size of union in C is allocated based on the size of the largest member.

  • The size of the union is equal to the size of the largest member.

  • The memory allocated for a union is shared by all its members.

  • Unions are used to save memory when only one member is accessed at a time.

Add your answer
Q78. What is the difference between abstraction and inheritance?
Add your answer
Q79. Why do we need the Friend class and function in Object-Oriented Programming?
Add your answer

Q80. What is the need for IPv6?

Ans.

IPv6 is needed due to the exhaustion of IPv4 addresses and the need for more unique IP addresses.

  • IPv6 provides a significantly larger address space compared to IPv4.

  • It allows for the allocation of unique IP addresses to every device connected to the internet.

  • IPv6 supports improved security features and better network performance.

  • It enables the growth of Internet of Things (IoT) devices and services.

  • Transitioning to IPv6 ensures the long-term sustainability of the internet.

Add your answer

Q81. What is an arraylist in Java?

Ans.

An ArrayList is a dynamic array in Java that can grow or shrink in size during runtime.

  • ArrayList is a class in Java's Collection framework.

  • It implements the List interface and allows duplicate elements.

  • Elements can be added or removed using methods like add(), remove(), etc.

  • It can also be sorted using the sort() method.

  • Example: ArrayList names = new ArrayList<>();

  • names.add("John"); names.add("Mary"); names.remove(0);

Add your answer
Q82. What is memory protection in operating systems?
Add your answer
Q83. What is priority inversion?
Add your answer

Q84. one packet is 64bytes..no of pkts send is 16000..then total no of bytes sent is ans 1024000

Add your answer

Q85. Generate a spiral for given matrix in clockwise direction

Ans.

Generate a spiral order traversal of a given matrix in clockwise direction

  • Initialize variables for top, bottom, left, right boundaries

  • Iterate through the matrix in a spiral order while adjusting boundaries

  • Add elements to the result array in the spiral order

Add your answer

Q86. What is the boundary problem in allocation of size of structures?

Ans.

Boundary problem refers to the difficulty in deciding the optimal size of structures to allocate resources.

  • It involves determining the trade-off between the benefits of larger structures and the costs of building and maintaining them.

  • The problem is particularly relevant in fields such as architecture, civil engineering, and urban planning.

  • For example, in urban planning, deciding the optimal size of roads, buildings, and parks can have a significant impact on the quality of li...read more

Add your answer

Q87. How PING works? ICMP protocol.so add ICMP header to ip payload field and stuff.

Ans.

PING works by sending ICMP echo request packets to a destination host and waiting for ICMP echo reply packets in response.

  • PING uses the ICMP protocol to send echo request packets to a destination host.

  • The destination host responds with ICMP echo reply packets if it is reachable.

  • PING measures the round-trip time for the packets to travel to the destination and back.

  • PING can also be used to check network connectivity and diagnose network issues.

Add your answer
Q88. What is the ARP protocol?
Add your answer

Q89. what is your plan for honeymoontrip?

Ans.

I am not comfortable discussing my personal life in a professional interview.

  • I prefer to keep my personal life separate from my professional life.

  • I believe in maintaining a work-life balance.

  • I am fully committed to my work and will prioritize it over personal matters.

  • I appreciate the question, but I would rather not discuss my honeymoon plans.

Add your answer

Q90. How to motivate a customer if case is on Escalation edge ?

Ans.

Motivating a customer on escalation edge

  • Show empathy and understanding of their frustration

  • Provide regular updates on the progress of the case

  • Offer solutions or workarounds to mitigate the issue

  • Highlight the importance of resolving the issue for their business

  • Escalate the case to higher management if necessary

  • Thank them for their patience and cooperation

Add your answer

Q91. Difference between ArrayList and LinkedList. Different ways to iterate in list. (Syntax) List set map difference. Write an abstract class and its implementation. Challanges faced during automation. Different ty...

read more
Ans.

Questions related to Java and automation testing

  • ArrayList is implemented as a resizable array, while LinkedList is implemented as a doubly linked list

  • For loop, enhanced for loop, Iterator, ListIterator can be used to iterate through a list

  • List is an ordered collection, Set is an unordered collection, Map is a collection of key-value pairs

  • Abstract class cannot be instantiated, its implementation is done by extending it and providing implementation for its abstract methods

  • Chall...read more

Add your answer

Q92. How did you build a sourcing strategy, what were the steps?

Ans.

To build a sourcing strategy, I followed these steps:

  • Identified the business needs and goals

  • Conducted market research to identify potential suppliers

  • Evaluated supplier capabilities and performance

  • Negotiated contracts and pricing

  • Developed a supplier relationship management plan

  • Monitored supplier performance and made adjustments as needed

Add your answer

Q93. A triangle ABC is given, a line DE is paralel to base side and that cuts the triangle. The ratio of area of triangle to the area of trapezium .given DE/BC=3/5

Ans.

The question asks about the ratio of the area of a triangle to the area of a trapezium formed by a parallel line cutting the triangle.

  • The given line DE is parallel to the base side of triangle ABC.

  • The ratio of DE to BC is 3:5.

  • We need to find the ratio of the area of triangle ABC to the area of the trapezium formed by DE and the base side of the triangle.

Add your answer

Q94. Explain the DS which is well suited to implement UNIX commands like PWD, LS, MKDIR, CD in an imaginary OS. No code required. Just the DS

Ans.

A trie data structure is well suited to implement UNIX commands like PWD, LS, MKDIR, CD in an imaginary OS.

  • Trie data structure allows for efficient storage and retrieval of strings, making it ideal for storing and executing UNIX commands.

  • Each node in the trie represents a character in the command, allowing for quick traversal and execution.

  • Trie can handle commands with common prefixes efficiently, reducing the overall storage and lookup time.

  • Example: Storing commands like 'PW...read more

Add your answer
Q95. What does a static member in C++ mean?
Add your answer

Q96. main() { int a; printf(?%d?,scanf(%d,&amp;a)); } whats o/p of this pgm. What will be printed ans :0

Ans.

The program will print 0 as the output.

  • The scanf function returns the number of input items successfully matched and assigned, which in this case will be 0 as there is no input provided.

  • The printf function will print the return value of scanf, which is 0.

Add your answer

Q97. Can you mention the biggest bid you conducted and what was the outcome?

Ans.

I led a bid for a software implementation project worth $5 million, resulting in a successful contract with a major client.

  • Led bid for $5 million software implementation project

  • Negotiated contract terms with major client

  • Ensured project met client's requirements and deadlines

Add your answer

Q98. What are specific terms in the technology (Authentication mechanism, how they work, how servers communicate)

Ans.

Authentication mechanisms in technology involve various methods for verifying the identity of users and ensuring secure communication between servers.

  • Authentication mechanisms include passwords, biometrics, two-factor authentication, and digital certificates.

  • Servers communicate using protocols such as HTTPS, SSL/TLS, SSH, and OAuth.

  • Authentication mechanisms work by verifying the credentials provided by the user against stored data or by generating and validating digital signa...read more

Add your answer

Q99. Mention the layers in OSI stack

Ans.

OSI stack has 7 layers that define how data is transmitted over a network.

  • OSI stands for Open Systems Interconnection

  • Each layer has a specific function and communicates with adjacent layers

  • Layers are: Physical, Data Link, Network, Transport, Session, Presentation, Application

Add your answer

Q100. Write the code to reverse linked list using recursion

Ans.

Code to reverse linked list using recursion

  • Create a recursive function to traverse the linked list

  • Swap the next and previous nodes in each recursive call

  • Return the new head of the reversed linked list

Add your answer
1
2
3

More about working at Cisco

Top Rated Large Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Xylem Learning

based on 269 interviews
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 271 Interview Questions
3.9
 • 168 Interview Questions
4.0
 • 166 Interview Questions
3.9
 • 140 Interview Questions
3.7
 • 133 Interview Questions
View all
Top Cisco Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter