i
Deepija Telecom
Filter interviews by
Samba server is a software that allows file and print sharing between Unix/Linux and Windows systems.
Enables file and printer sharing between Unix/Linux and Windows systems
Provides seamless integration of Windows clients with Unix/Linux servers
Supports common networking protocols like SMB/CIFS
Allows users to access shared files and printers across different operating systems
Default port of ssh is 22 and the location of ssh configuration file is typically /etc/ssh/sshd_config
Default port of ssh is 22
Location of ssh configuration file is typically /etc/ssh/sshd_config
I appeared for an interview before Feb 2024.
I applied via Company Website and was interviewed in Jan 2023. There were 3 interview rounds.
An IP switch router is a network device that combines the functions of a switch and a router, allowing for efficient data transmission and routing across networks.
An IP switch router combines the features of a switch and a router.
It can efficiently transmit data packets within a local network (switching) and between different networks (routing).
IP switch routers use IP addresses to determine the destination of data pac...
Networking is the practice of connecting devices and systems to share resources and communicate, while configuration involves setting up and customizing these devices and systems.
Networking involves connecting devices and systems to create a network.
Configuration involves setting up and customizing devices and systems for optimal performance.
Networking enables resource sharing and communication between devices.
Configur...
Multiple choices for technical support questions
I applied via Naukri.com and was interviewed before Nov 2023. There was 1 interview round.
Deepija Telecom interview questions for designations
I applied via Indeed and was interviewed before Apr 2022. There were 2 interview rounds.
I applied via Instahyre and was interviewed in Aug 2022. There were 3 interview rounds.
Some kind of cognitive test. Test was easy but a bit practice is necessary. 40 qstns in 20 mins.
Types of qstns :
1. comparing images and find the odd one.(around 10 qstns).
2. question on ratios.
3. Qstns on pi chart and bar graphs (like what is the percentage of certain portion out of whole).
4. Qstns on average (basic).
Advice: prepare the resources shared by HR.
I appeared for an interview before Apr 2021.
Round duration - 90 minutes
Round difficulty - Easy
It was on online objective test consisting of 4 sections: Aptitude, Technical MCQs, Code snippet based MCQs and Coding part.
Given a string 'STR' consisting solely of the characters “{”, “}”, “(”, “)”, “[” and “]”, determine if the parentheses are balanced.
The first line contains an...
The task is to determine if a given string of parentheses is balanced or not.
Iterate through the characters of the string and use a stack to keep track of opening parentheses.
When encountering an opening parenthesis, push it onto the stack. When encountering a closing parenthesis, check if it matches the top of the stack.
If the stack is empty at the end or there are unmatched parentheses, the string is not balanced.
Exa...
Determine if a given singly linked list of integers is a palindrome. Return true
if it is a palindrome, otherwise return false
.
1 -> 2 -> ...
Check if a given singly linked list of integers is a palindrome.
Use two pointers to find the middle of the linked list.
Reverse the second half of the linked list.
Compare the first half with the reversed second half to determine if it is a palindrome.
Round duration - 60 minutes
Round difficulty - Easy
This was a technical and managerial round. The interviewer gave me a situation where I am in testing team and I found that customer requirement was drop down list at a place but developer has used bullet selection, and is not ready to change it. How will you manage? I gave some good replies and he was convinced.
A virtual function is a function in a base class that is declared using the keyword 'virtual' and can be overridden by a function with the same signature in a derived class.
Virtual functions allow for dynamic polymorphism in object-oriented programming.
They are used to achieve runtime polymorphism by enabling late binding.
Virtual functions are declared in a base class and can be overridden in derived classes.
Example: v...
Level order traversal of a binary tree in spiral form involves alternating between left and right while traversing each level.
Start by pushing the root node into a queue.
While the queue is not empty, pop a node, print its value, and push its children into the queue.
For each level, alternate between popping nodes from the queue and printing their values from left to right or right to left.
Continue this process until all
Abstract classes in C++ are classes that cannot be instantiated and are designed to be base classes for other classes.
Abstract classes may contain pure virtual functions, making them incomplete and unable to be instantiated.
Derived classes must implement all pure virtual functions from the abstract class in order to be concrete classes.
Abstract classes can have non-virtual functions and member variables like regular cl...
Round duration - 60 minutes
Round difficulty - Easy
This was also a technical round. He asked to optimize the code I wrote in coding round. Then he asked me a few puzzles and questions on OOPS, OS and DBMS.
ACID properties are a set of properties that guarantee the reliability of transactions in database management systems.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that either all operations in a transaction are completed successfully or none of them are.
Consistency ensures that the database remains in a consistent state before and after the transaction.
Isolation ensures that the e...
Paging and segmentation are memory management techniques in operating systems.
Paging divides physical memory into fixed-size blocks called pages, while segmentation divides logical memory into variable-size segments.
Paging allows for efficient memory allocation and management, while segmentation provides protection and sharing of memory.
Paging is simpler to implement but can lead to internal fragmentation, while segmen...
Concurrency control is a technique used in databases to manage simultaneous access and modification of data by multiple users or processes.
Concurrency control ensures that transactions are executed in a way that maintains data consistency and integrity.
Techniques like locking, timestamp ordering, and optimistic concurrency control are used to implement concurrency control.
For example, in a banking system, concurrency c...
String Buffer is synchronized and thread-safe, while String Builder is not synchronized and faster.
String Buffer is synchronized, making it thread-safe for use in multi-threaded environments.
String Builder is not synchronized, resulting in faster performance but not thread-safe.
String Builder is preferred for single-threaded operations, while String Buffer is preferred for multi-threaded operations.
Smart pointers in C++ are objects that act like pointers but provide automatic memory management.
Smart pointers help prevent memory leaks by automatically managing memory allocation and deallocation.
Examples include unique_ptr, shared_ptr, and weak_ptr.
unique_ptr is used for exclusive ownership, shared_ptr for shared ownership, and weak_ptr to prevent circular references.
Mutex is used for exclusive access to a resource, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary and allows only one thread to access the resource at a time.
Semaphore can have a count greater than one, allowing multiple threads to access the resource simultaneously.
Mutex is typically used for protecting critical sections of code, while semaphore is used for synchronizat...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Program for snake traversal of binary tree
Use a stack to keep track of nodes to be visited
Start with the root node and push it onto the stack
While the stack is not empty, pop a node and print its value
If the level is even, push the left child first and then the right child onto the stack
If the level is odd, push the right child first and then the left child onto the stack
Code to check if linked list is palindrome without using any other data structure and in a single traversal.
Traverse the linked list using two pointers, one slow and one fast
Reverse the first half of the linked list while traversing
Compare the reversed first half with the second half of the linked list
based on 5 interviews
1 Interview rounds
based on 24 reviews
Rating in categories
Technical Support Engineer
111
salaries
| ₹1.2 L/yr - ₹5.6 L/yr |
Software Engineer
57
salaries
| ₹2.2 L/yr - ₹4.5 L/yr |
Software Developer
35
salaries
| ₹2.3 L/yr - ₹5 L/yr |
Business Analyst
27
salaries
| ₹2 L/yr - ₹5.5 L/yr |
Senior Software Engineer
17
salaries
| ₹3.6 L/yr - ₹6.5 L/yr |
BrowserStack
Amagi Media Labs
Fingent
RxLogix Corporation