Add office photos
Employer?
Claim Account for FREE

Cisco

4.2
based on 1.7k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

300+ Interview Questions and Answers

Updated 17 Dec 2024
Popular Designations

Q101. How did you build a sourcing strategy, what were the steps?

Ans.

To build a sourcing strategy, I followed these steps:

  • Identified the business needs and goals

  • Conducted market research to identify potential suppliers

  • Evaluated supplier capabilities and performance

  • Negotiated contracts and pricing

  • Developed a supplier relationship management plan

  • Monitored supplier performance and made adjustments as needed

Add your answer

Q102. A triangle ABC is given, a line DE is paralel to base side and that cuts the triangle. The ratio of area of triangle to the area of trapezium .given DE/BC=3/5

Ans.

The question asks about the ratio of the area of a triangle to the area of a trapezium formed by a parallel line cutting the triangle.

  • The given line DE is parallel to the base side of triangle ABC.

  • The ratio of DE to BC is 3:5.

  • We need to find the ratio of the area of triangle ABC to the area of the trapezium formed by DE and the base side of the triangle.

Add your answer

Q103. What is the need for IPv6?

Ans.

IPv6 is needed due to the exhaustion of IPv4 addresses and the need for more unique IP addresses.

  • IPv6 provides a significantly larger address space compared to IPv4.

  • It allows for the allocation of unique IP addresses to every device connected to the internet.

  • IPv6 supports improved security features and better network performance.

  • It enables the growth of Internet of Things (IoT) devices and services.

  • Transitioning to IPv6 ensures the long-term sustainability of the internet.

Add your answer

Q104. What is an arraylist in Java?

Ans.

An ArrayList is a dynamic array in Java that can grow or shrink in size during runtime.

  • ArrayList is a class in Java's Collection framework.

  • It implements the List interface and allows duplicate elements.

  • Elements can be added or removed using methods like add(), remove(), etc.

  • It can also be sorted using the sort() method.

  • Example: ArrayList names = new ArrayList<>();

  • names.add("John"); names.add("Mary"); names.remove(0);

Add your answer
Discover null interview dos and don'ts from real experiences
Q105. MCQ Questions

Average level Questions
Networking and CCNA: 5
Programming: 5
Database:5
Mathematics: 5
System Design and OS : 5

Number Of MCQs - 25

Add your answer
Q106. OOPS Question

What does a Static member in C++ mean?

Add your answer
Are these interview questions helpful?
Q107. MCQ Questions

LR (2 questions)
Aptitude like Permutations and Combinations, Basic Arithmetic, Calendar Questions (4 questions)
Networking (6 questions)
Output Based (2 questions)
C/C++ (2 questions)
OS ( 4 questions)...read more

Add your answer

Q108. Generate a spiral for given matrix in clockwise direction

Ans.

Generate a spiral order traversal of a given matrix in clockwise direction

  • Initialize variables for top, bottom, left, right boundaries

  • Iterate through the matrix in a spiral order while adjusting boundaries

  • Add elements to the result array in the spiral order

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. Can you mention the biggest bid you conducted and what was the outcome?

Ans.

I led a bid for a software implementation project worth $5 million, resulting in a successful contract with a major client.

  • Led bid for $5 million software implementation project

  • Negotiated contract terms with major client

  • Ensured project met client's requirements and deadlines

Add your answer

Q110. How PING works? ICMP protocol.so add ICMP header to ip payload field and stuff.

Add your answer

Q111. What are specific terms in the technology (Authentication mechanism, how they work, how servers communicate)

Ans.

Authentication mechanisms in technology involve various methods for verifying the identity of users and ensuring secure communication between servers.

  • Authentication mechanisms include passwords, biometrics, two-factor authentication, and digital certificates.

  • Servers communicate using protocols such as HTTPS, SSL/TLS, SSH, and OAuth.

  • Authentication mechanisms work by verifying the credentials provided by the user against stored data or by generating and validating digital signa...read more

Add your answer

Q112. Explain the DS which is well suited to implement UNIX commands like PWD, LS, MKDIR, CD in an imaginary OS. No code required. Just the DS

Add your answer
Q113. Basic HR Questions

1. Introduction

2. why Cisco?

Add your answer

Q114. struct s1 { struct { struct {int x;}s2}s3}y; How to access x? ANS: y.s3.s2.x

Ans.

To access x, use the following syntax: y.s3.s2.x

  • Accessing x requires navigating through the nested structures

  • Start with y, then access s3, followed by s2, and finally x

Add your answer

Q115. Which tool use for configuration of routers

Ans.

The tool commonly used for configuring routers is a command-line interface (CLI).

  • Command-line interface (CLI) is the primary tool for configuring routers.

  • CLI allows network engineers to enter commands to configure various settings on the router.

  • Examples of CLI tools for router configuration include Cisco IOS CLI, Juniper Junos CLI, and Huawei VRP CLI.

View 1 answer

Q116. what is your plan for honeymoontrip?

Ans.

I am not comfortable discussing my personal life in a professional interview.

  • I prefer to keep my personal life separate from my professional life.

  • I believe in maintaining a work-life balance.

  • I am fully committed to my work and will prioritize it over personal matters.

  • I appreciate the question, but I would rather not discuss my honeymoon plans.

Add your answer
Q117. Puzzle

Given two hourglass of 4 minutes and 7 minutes, the task is to measure 9 minutes.

Add your answer
Q118. OS Question

What is thrashing in OS?

Add your answer
Q119. C++ Question

What is namespace in C++?

Add your answer
Q120. C++ Question

Define storage class in C++. Name some.

Add your answer

Q121. What happens when we type www.google.com from host computer, host- >switch->router(s)->host path. Typical questions related to networking layers

Ans.

When typing www.google.com from a host computer, the request goes through the host, switch, router(s), and finally reaches the destination host.

  • The host computer sends a DNS query to resolve the domain name www.google.com to an IP address.

  • The switch forwards the DNS query to the router, which determines the next hop towards the destination.

  • The router(s) route the request through various networks until it reaches the destination host, in this case, Google's servers.

  • The respons...read more

Add your answer
Q122. OOPS Question

What is Static variable in C ?

Add your answer

Q123. main() { printf(?as?); printf(?hi?); printf(?is ?); } wat will b printed. 10. main() { unsigned short a=-1; unsigned char b=a; printf(?%d %d ?,a,b); } wat is o/p of the program

Ans.

Answering two programming questions related to printf() function and data types.

  • In the first program, the output will be 'as hi is'.

  • In the second program, the output will be '-1 255'.

  • The first program uses printf() function to print three strings.

  • The second program demonstrates type conversion from unsigned short to unsigned char.

  • The value of -1 in unsigned short is converted to 255 in unsigned char.

Add your answer

Q124. Explain ARP. why is udp used? Explain PORT addressing.

Add your answer

Q125. Mention the layers in OSI stack

Ans.

OSI stack has 7 layers that define how data is transmitted over a network.

  • OSI stands for Open Systems Interconnection

  • Each layer has a specific function and communicates with adjacent layers

  • Layers are: Physical, Data Link, Network, Transport, Session, Presentation, Application

Add your answer

Q126. Write the code to reverse linked list using recursion

Ans.

Code to reverse linked list using recursion

  • Create a recursive function to traverse the linked list

  • Swap the next and previous nodes in each recursive call

  • Return the new head of the reversed linked list

Add your answer

Q127. Find the next greater element using stack

Ans.

Using stack to find the next greater element in an array

  • Create an empty stack to store indices of elements

  • Iterate through the array from right to left

  • Pop elements from stack until a greater element is found or stack is empty

Add your answer

Q128. System Design - Design a multi user job scheduler

Ans.

A multi user job scheduler allows multiple users to schedule and manage their tasks efficiently.

  • Implement a centralized job scheduling system that can handle multiple users and their tasks simultaneously

  • Include features such as task prioritization, deadline management, and resource allocation

  • Use a database to store user information, task details, and scheduling algorithms

  • Provide a user-friendly interface for users to create, edit, and monitor their scheduled tasks

Add your answer

Q129. What are the Cisco tools you have worked on?

Ans.

I have worked on Cisco tools such as Cisco Unified Communications Manager (CUCM) and Cisco Webex Teams.

  • Cisco Unified Communications Manager (CUCM)

  • Cisco Webex Teams

View 1 answer

Q130. There are set of coins of {50,25,10,5,1} paise in a box.Write a program to find the number of ways a 1 rupee can be created by grouping the paise

Ans.

The program finds the number of ways to create 1 rupee using different coins.

  • Use a recursive function to iterate through all possible combinations of coins

  • Start with the largest coin and subtract its value from the target amount

  • Repeat the process with the remaining coins until the target amount becomes zero

  • Count the number of successful combinations

Add your answer
Q131. Assignment

Had to submit a video on the given topic

Add your answer

Q132. What are certificates, how they work in the communication. TLS etc...

Ans.

Certificates are digital documents used to verify the identity of a website or server in secure communication.

  • Certificates are issued by a Certificate Authority (CA) to verify the identity of the website or server.

  • TLS (Transport Layer Security) is a protocol that uses certificates to secure communication over the internet.

  • Certificates contain information such as the public key of the website/server and the digital signature of the CA.

  • When a user connects to a website, the web...read more

Add your answer

Q133. How www.google.com typed in browser works??(abt dns server,etc)

Add your answer
Q134. Networking Question

What is NAT router?

Add your answer

Q135. Find the maximum element inside singly linkedlist

Ans.

Find the maximum element in a singly linked list.

  • Traverse the list and keep track of the maximum element seen so far.

  • Compare each element with the current maximum and update if necessary.

  • Return the maximum element at the end of the traversal.

Add your answer
Q136. Networking Question

Describe the OSI Reference Model

Add your answer

Q137. What is need of ip address , when MAC address is thr

Add your answer

Q138. C program to count the no. of elements which are repeating more than size/2 times in an array

Add your answer

Q139. What is the point of BST?

Ans.

BST is a data structure used for efficient searching, insertion and deletion of elements in a sorted manner.

  • BST stands for Binary Search Tree.

  • It has a root node and every node has at most two children.

  • The left subtree of a node contains only nodes with keys lesser than the node's key.

  • The right subtree of a node contains only nodes with keys greater than the node's key.

  • BST allows for efficient searching, insertion and deletion of elements in O(log n) time complexity.

  • Example: S...read more

Add your answer
Q140. OOPS Question

“Java is not a pure OO language”. Justify this statement.

Add your answer

Q141. #define maxval 5 (programming / computer science engineering technical questions) int main (void) { int i=1; if(i-maxval) { printf(?inside?); } else { printf(?out?); } find o/p???

Add your answer

Q142. main() { int a; printf(?%d?,scanf(%d,&amp;a)); } whats o/p of this pgm. What will be printed ans :0

Add your answer

Q143. Why ARP is used? Different types of ARP

Ans.

ARP is used to map a network address (such as an IP address) to a physical address (such as a MAC address).

  • ARP stands for Address Resolution Protocol

  • It is used to resolve IP addresses to MAC addresses

  • There are two types of ARP: ARP Request and ARP Reply

  • ARP Request is used to find the MAC address of a device with a known IP address

  • ARP Reply is used to respond to an ARP Request with the MAC address of the device

  • ARP is important for communication between devices on a network

Add your answer

Q144. Tell about scheduling algos(round robin etc),context switching

Add your answer

Q145. How to create multiple network in a shorttime

Ans.

Use network automation tools like Ansible or Python scripts to quickly create multiple networks.

  • Utilize network automation tools like Ansible or Python scripts

  • Create templates for network configurations to speed up the process

  • Use network virtualization technologies like VLANs or VXLANs to segment networks

  • Leverage cloud-based network services for rapid deployment

  • Consider using network automation platforms like Cisco DNA Center or Juniper Contrail

Add your answer

Q146. main() { unsigned short a=-1; unsigned char b=a; printf(?%d %d ?,a,b); } wat is o/p of the program a. 65535 -1 b. 65535 65535 c. -1 -1

Add your answer

Q147. Performance improvements in Angular

Ans.

Performance improvements in Angular can be achieved through lazy loading, AOT compilation, and optimizing change detection.

  • Lazy loading: load modules only when needed

  • AOT compilation: pre-compile templates for faster rendering

  • Optimizing change detection: use OnPush strategy, avoid unnecessary bindings

  • Use trackBy function for ngFor loops

  • Use pure pipes instead of impure pipes

  • Use ngZone.runOutsideAngular() for heavy computations

  • Use Web Workers for parallel processing

  • Minimize HTTP...read more

Add your answer
Q148. Networking Question

Explain what is DNS.

Add your answer

Q149. What are the linux commands do you know ?

Ans.

I know various Linux commands for file management, process management, networking, and system administration.

  • File management: ls, cd, cp, mv, rm, mkdir, touch

  • Process management: ps, top, kill, nice, renice

  • Networking: ping, traceroute, netstat, ifconfig, ssh

  • System administration: sudo, apt-get, systemctl, journalctl, crontab

Add your answer
Q150. Networking Question

Osi model with example at each layer transfer

Add your answer

Q151. What are differences between RIP and OSPF Protocol

Ans.

RIP and OSPF are routing protocols used in computer networks.

  • RIP is a distance-vector protocol while OSPF is a link-state protocol.

  • RIP uses hop count as the metric while OSPF uses cost.

  • OSPF supports VLSM and CIDR while RIP does not.

  • OSPF is more scalable and efficient for larger networks than RIP.

  • RIP broadcasts its routing table updates while OSPF uses multicast.

  • OSPF has a faster convergence time than RIP.

  • RIP is simpler to configure and troubleshoot than OSPF.

Add your answer

Q152. What are the major procurement and customer related aspects

Ans.

Major procurement and customer related aspects include supplier management, cost control, quality assurance, and customer satisfaction.

  • Supplier management involves selecting reliable suppliers, negotiating contracts, and maintaining relationships.

  • Cost control focuses on reducing expenses through strategic sourcing, competitive bidding, and contract management.

  • Quality assurance ensures that products and services meet specified standards and requirements.

  • Customer satisfaction i...read more

Add your answer

Q153. When the looping state ments are used? What are branching statements explain breafly?

Ans.

Looping statements are used to execute a block of code repeatedly. Branching statements alter the flow of control in a program.

  • Looping statements are used when we want to execute a block of code repeatedly until a certain condition is met.

  • Examples of looping statements include for, while, and do-while loops.

  • Branching statements are used to alter the normal flow of control in a program.

  • Examples of branching statements include if-else statements, switch statements, and the brea...read more

Add your answer

Q154. Differences between Public IP and Private IP

Ans.

Public IP is a unique address assigned to a device on the internet, while Private IP is used within a local network.

  • Public IP is globally unique and can be accessed from anywhere on the internet.

  • Private IP is used within a local network and is not accessible from the internet.

  • Public IP is assigned by the Internet Service Provider (ISP) to identify a device on the internet.

  • Private IP is assigned by a local network administrator to identify devices within the network.

  • Public IP ...read more

View 1 answer
Q155. OOPS Question

Explain all the main Object Oriented programming Concepts

Add your answer
Q156. Java Question

Difference between ArrayList and LinkedList

Add your answer

Q157. How do you select the appropriate learning algorithm for a problem?

Ans.

Selecting the appropriate learning algorithm involves considering the problem's characteristics and requirements.

  • Understand the problem's nature, such as classification, regression, clustering, etc.

  • Consider the size of the dataset and the computational resources available.

  • Evaluate the complexity of the relationships within the data.

  • Experiment with different algorithms and compare their performance using metrics like accuracy, precision, recall, etc.

  • Choose algorithms based on ...read more

Add your answer
Q158. OS Question

Synchronization in Operating System in detail

Add your answer

Q159. What are all the components needed in a home networking system

Ans.

Components needed in a home networking system include modem, router, switch, access point, and network cables.

  • Modem: connects to the internet service provider and converts the signal for use by the network.

  • Router: directs network traffic between devices and manages the IP addresses.

  • Switch: connects multiple devices within the network and allows them to communicate with each other.

  • Access Point: provides wireless connectivity for devices to connect to the network.

  • Network cables...read more

Add your answer

Q160. Unsorted array and a position ‘P’. Return the element that is likely to come to the given location upon sorting the array. Do it 0(n)

Add your answer
Q161. System Design Question

Design a basic hash map.

Add your answer

Q162. What is difference between mutex semaphore?

Ans.

Mutex is a locking mechanism to ensure exclusive access to a shared resource, while semaphore is a signaling mechanism to control access to a shared resource.

  • Mutex allows only one thread to access the shared resource at a time, while semaphore can allow multiple threads to access the shared resource simultaneously.

  • Mutex is binary, meaning it has only two states - locked and unlocked, while semaphore can have multiple states depending on the number of threads allowed to access...read more

Add your answer

Q163. Any knowledge of Networks/DS?

Ans.

Yes

  • Knowledge of network protocols and architectures

  • Understanding of data structures and algorithms

  • Experience with network troubleshooting and analysis

  • Familiarity with network security and encryption

  • Proficiency in network programming and socket programming

Add your answer

Q164. #define clrscr() 100 main() { clrscr(); printf(?%d?,clrscr()); }

Ans.

The code snippet defines a macro called clrscr() and then calls it in the main function.

  • The macro clrscr() is defined as 100, so when it is called, it will be replaced with 100.

  • The printf statement will print the value returned by clrscr(), which is 100.

  • The output of the code will be '100'.

Add your answer

Q165. How would you build a pipeline for a Machine learning project?

Ans.

To build a pipeline for a Machine learning project, you need to collect data, preprocess it, train the model, evaluate its performance, and deploy it.

  • Collect relevant data from various sources

  • Preprocess the data by cleaning, transforming, and normalizing it

  • Split the data into training and testing sets

  • Train the machine learning model using the training data

  • Evaluate the model's performance using the testing data

  • Fine-tune the model if necessary

  • Deploy the model into production en...read more

Add your answer

Q166. #define a 3+3 #define b 11-3 main() { printf(?%d?,a*b); } wat is o/p?????

Ans.

This is a programming question involving preprocessor directives and printf function.

  • The preprocessor directives #define a 3+3 and #define b 11-3 will be replaced by their respective values during compilation.

  • The main function will print the result of a*b, which is equivalent to 6*8.

  • Therefore, the output will be 48.

  • The printf function will print the integer value of 48.

Add your answer

Q167. What is a microservice?

Ans.

A microservice is a small, independent, and loosely coupled service that performs a specific business function.

  • Microservices are designed to be small and focused on a single task or business function.

  • They communicate with each other through APIs.

  • Each microservice can be developed, deployed, and scaled independently.

  • Examples include user authentication service, payment processing service, and notification service.

Add your answer

Q168. how to reverse the link list? find all possible sub sequences in a given array

Ans.

Reverse a linked list and find all possible subsequences in a given array.

  • To reverse a linked list, iterate through the list and change the next pointers of each node to the previous node.

  • To find all possible subsequences in an array, use recursion and generate all possible combinations of elements.

  • For example, given the array [1, 2, 3], the possible subsequences are [], [1], [2], [3], [1, 2], [1, 3], [2, 3], [1, 2, 3].

View 1 answer

Q169. HTTP header format ?

Ans.

HTTP headers are key-value pairs sent between the client and server to provide additional information about the request or response.

  • HTTP headers consist of a key-value pair separated by a colon, with each pair separated by a new line

  • Headers are used to provide information such as content type, content length, caching directives, authentication credentials, etc.

  • Example: 'Content-Type: application/json'

Add your answer

Q170. Which LAN switching is used in catalyst 5000

Ans.

Catalyst 5000 uses shared memory LAN switching.

  • Catalyst 5000 uses a shared memory architecture for LAN switching.

  • This allows for high-speed switching between ports.

  • The shared memory architecture also allows for advanced features like VLANs and QoS.

  • Examples of Catalyst 5000 models include the 5500 and 5002.

  • These switches were popular in the 1990s and early 2000s.

Add your answer
Q171. Puzzle

Measure 4L using 3L and 5L cans .

Add your answer

Q172. How will you make sure that Jira issues are not moved ahead

Ans.

Regularly review and prioritize Jira issues, set clear deadlines, communicate with team members, and track progress.

  • Regularly review and prioritize Jira issues to ensure they are not moved ahead without proper consideration.

  • Set clear deadlines for each Jira issue to prevent unnecessary delays.

  • Communicate effectively with team members to ensure everyone is on the same page regarding the status of Jira issues.

  • Track progress regularly to identify any issues or bottlenecks that m...read more

Add your answer

Q173. 3. Suggest a Data Structure that will help in scheduling football matches and makes sure each team has played with every other team.

Ans.

Use a round-robin tournament scheduling algorithm with a matrix data structure.

  • Create a matrix where rows represent teams and columns represent opponents.

  • Fill in the matrix such that each team plays every other team exactly once.

  • Use the round-robin tournament scheduling algorithm to generate the match schedule.

  • Ensure that each team plays with every other team by checking the matrix for any missing matches.

Add your answer
Q174. Basic HR Question

Location preferences: banglore, chennai, Pune

Add your answer

Q175. What happens when a user opens a browser and type in url and go?

Ans.

When a user opens a browser and types in a URL and hits enter, the browser sends a request to the server hosting the website specified in the URL.

  • Browser resolves the domain name to an IP address using DNS

  • Browser sends a request to the server at that IP address

  • Server processes the request and sends back the webpage content

  • Browser renders the webpage for the user to view

Add your answer

Q176. Write a function to write a word to particular sector

Ans.

A function to write a word to a particular sector.

  • Create a function that takes a word and a sector as parameters

  • Use the sector to determine the starting position in the array

  • Write the word to the array starting from the specified sector

  • Return the updated array

Add your answer

Q177. Derive a mathematical equation to calculate the angle between two handa of clock

Add your answer

Q178. Bridges are used in which layer?

Ans.

Bridges are used in the network layer of the OSI model.

  • Bridges are used to connect two or more network segments or LANs.

  • They operate at the data link layer (Layer 2) of the OSI model.

  • Bridges use MAC addresses to forward data packets between segments.

  • They can filter and forward network traffic based on MAC addresses.

  • Examples of bridges include Ethernet bridges and wireless bridges.

Add your answer

Q179. What are he layers of the OSI model?

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • Layer 1: Physical - deals with the physical connection of devices

  • Layer 2: Data Link - responsible for error-free transfer of data between devices

  • Layer 3: Network - handles routing of data between different networks

  • Layer 4: Transport - ensures reliable delivery of data between applications

  • Layer 5: Session - establishes and manages connections between applications

  • Layer 6: Presentation - translates dat...read more

Add your answer

Q180. main() { printf(?as?); printf(?bhi?); printf(?isn?); } what will b printed

Add your answer

Q181. Write the of a c program for printing numbers into words such as 123 (one hundred and twenty three)

Ans.

A C program to convert numbers into words, using an array of strings.

  • Create an array of strings to store the words for each digit

  • Use modulus and division to extract each digit from the number

  • Use conditional statements to determine the appropriate word for each digit

  • Combine the words for each digit to form the final output

Add your answer

Q182. what is git and few commands related to it

Ans.

Git is a version control system used for tracking changes in code. It allows collaboration and easy management of codebase.

  • git init - initializes a new git repository

  • git add - adds changes to the staging area

  • git commit - commits changes to the repository

  • git push - pushes changes to a remote repository

  • git pull - pulls changes from a remote repository

  • git branch - lists all branches in the repository

  • git merge - merges changes from one branch to another

Add your answer

Q183. ++Spanning tree and Troubleshooting of switching network

Ans.

Explanation of Spanning Tree Protocol and troubleshooting techniques for switching networks.

  • Spanning Tree Protocol (STP) is used to prevent loops in a network by blocking redundant paths.

  • Troubleshooting STP involves checking for blocked ports, incorrect root bridge selection, and misconfigured priority values.

  • Other common issues in switching networks include VLAN mismatches, port security violations, and broadcast storms.

  • Tools such as packet captures, show commands, and netwo...read more

Add your answer

Q184. what is call apply bind

Ans.

call, apply, and bind are methods in JavaScript used to manipulate the context of a function.

  • call - calls a function with a given 'this' value and arguments provided individually.

  • apply - calls a function with a given 'this' value and arguments provided as an array.

  • bind - creates a new function that, when called, has its 'this' keyword set to the provided value.

Add your answer

Q185. When we malloc sm size where does it reside

Add your answer

Q186. What is the use of agile in change management?

Ans.

Agile methodology helps change managers to adapt to changing requirements and deliver value faster.

  • Agile principles can be applied to change management to increase flexibility and responsiveness.

  • It allows for iterative and incremental changes, reducing the risk of failure.

  • Agile promotes collaboration and communication between stakeholders, leading to better outcomes.

  • It emphasizes continuous improvement and learning, enabling change managers to adapt to new challenges.

  • Examples...read more

Add your answer

Q187. Representation of stack and queue using linked list and then perform insertion and deletion

Add your answer

Q188. Models in software engg?. Explain extreme programming

Add your answer

Q189. main() { int ret; ret=fork(); ret=fork(); ret=fork(); ret=fork(); if(!ret) printf(

Ans.

The code snippet demonstrates the use of the fork() function to create multiple child processes.

  • The fork() function is used to create a new process by duplicating the existing process.

  • Each time fork() is called, it creates a new child process that starts executing from the same point as the parent process.

  • In the given code, fork() is called four times, resulting in a total of 16 processes (including the original parent process).

  • The if(!ret) condition checks if the current pro...read more

Add your answer
Q190. Puzzle

It was all on my master's thesis

Add your answer

Q191. Sorting an array and merging

Ans.

Sorting an array of strings and merging them into a single string

  • Use a sorting algorithm like quicksort or mergesort to sort the array of strings

  • After sorting, merge the sorted strings into a single string using a loop or built-in functions like join()

Add your answer

Q192. Calculate the number of bits set to 1 in a binary number

Add your answer

Q193. do you know any competitors of cisco

Ans.

Yes, some of the competitors of Cisco are Juniper Networks, Huawei, and Arista Networks.

  • Juniper Networks is a networking equipment company that provides networking solutions to enterprises and service providers.

  • Huawei is a Chinese multinational technology company that offers networking and telecommunications equipment and services.

  • Arista Networks is a computer networking company that specializes in data center switches and cloud networking solutions.

Add your answer

Q194. What is formula of inventory turnover ratio

Ans.

Inventory turnover ratio formula is Cost of Goods Sold divided by Average Inventory.

  • Inventory turnover ratio measures how quickly a company sells its inventory.

  • It indicates the efficiency of a company's inventory management.

  • A higher ratio is better as it means the company is selling its inventory quickly.

  • Formula: Inventory turnover ratio = Cost of Goods Sold / Average Inventory

  • Example: If a company has a COGS of $500,000 and an average inventory of $100,000, the inventory tur...read more

Add your answer
Q195. Puzzle

Two wire burning puzzle .

Add your answer

Q196. meta classes in python

Ans.

Meta classes are classes that define the behavior of other classes.

  • Meta classes are used to customize the behavior of classes.

  • They can be used to add or modify attributes and methods of classes.

  • They can also be used to enforce certain rules or restrictions on classes.

  • In Python, the default meta class is 'type'.

  • Example: class MyMeta(type): pass

Add your answer

Q197. What is IFRS and how to implement it

Ans.

IFRS stands for International Financial Reporting Standards, a set of accounting standards developed by the International Accounting Standards Board (IASB).

  • IFRS is used by companies across the globe to ensure consistency and transparency in financial reporting.

  • Implementation of IFRS involves understanding the standards, making necessary adjustments to financial statements, and training staff on the new requirements.

  • Companies may need to invest in new accounting software or hi...read more

Add your answer
Q198. Puzzle

Total water in earth ?

Add your answer

Q199. What is Python?how if state ments are used?

Ans.

Python is a high-level, interpreted programming language known for its simplicity and readability.

  • Python is used for web development, data analysis, artificial intelligence, and more.

  • It uses if statements for conditional execution of code.

  • Example: if x > 5: print('x is greater than 5')

  • Python also supports elif and else statements for more complex conditions.

Add your answer
Q200. OS Question

Explain Piping in Unix/Linux

Add your answer
1
2
3
4

More about working at Cisco

Top Rated Large Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 169 interviews in the last 1 year
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 384 Interview Questions
3.9
 • 302 Interview Questions
3.9
 • 189 Interview Questions
3.6
 • 178 Interview Questions
4.0
 • 148 Interview Questions
3.7
 • 133 Interview Questions
View all
Top Cisco Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter