Filter interviews by
I applied via Walk-in and was interviewed in Nov 2023. There were 2 interview rounds.
Active Directory is a directory service developed by Microsoft that provides a centralized location for managing and organizing network resources.
Active Directory is used to store information about users, computers, and other network objects in a hierarchical structure.
It allows administrators to manage and control access to network resources, such as files, printers, and applications.
Active Directory uses a domain-bas...
Group Policy is a feature in Windows that allows administrators to manage and control user and computer settings within a network.
Group Policy is used to enforce security settings, manage software installations, and configure user preferences.
It allows administrators to centrally manage and apply settings to multiple computers and users.
Group Policy settings are stored in Group Policy Objects (GPOs) and can be applied ...
DNS (Domain Name System) is a system that translates domain names into IP addresses. Subnet is a portion of a network.
DNS is used to resolve domain names to IP addresses
Subnet is a logical division of a network
DNS helps in accessing websites using domain names instead of IP addresses
Subnetting allows efficient use of IP addresses and helps in network management
I applied via Referral and was interviewed before May 2020. There was 1 interview round.
Digitech Services interview questions for popular designations
I applied via Naukri.com and was interviewed before Jul 2020. There were 4 interview rounds.
posted on 22 Aug 2021
I applied via Referral and was interviewed before Aug 2020. There were 5 interview rounds.
A friend function is a non-member function that has access to the private and protected members of a class.
Declared inside the class but defined outside the class scope
Can access private and protected members of the class
Not a member of the class but has access to its private members
Used to allow external functions to access and modify private data of a class
Can be declared as a friend in another class
atoi function converts a string to an integer in C.
The function takes a string as input and returns an integer.
Leading white spaces are ignored.
If the string contains non-numeric characters, the function stops conversion and returns the converted value.
The function returns 0 if the input string is not a valid integer.
Example: atoi('123') returns 123.
A program to print star pattern
Use nested loops to print the pattern
The outer loop controls the number of rows
The inner loop controls the number of stars to be printed in each row
Use print() or println() function to print the stars
Run time polymorphism is the ability of a program to determine the object type at runtime and call the appropriate method.
It is achieved through virtual functions and dynamic binding.
Allows for more flexible and extensible code.
Example: a base class Animal with virtual function makeSound() and derived classes Dog and Cat that override makeSound().
At runtime, if an Animal pointer points to a Dog object, calling makeSoun
Right outer join is a type of join operation that returns all the rows from the right table and the matching rows from the left table.
Right outer join is denoted by the RIGHT JOIN keyword in SQL.
It is used to combine rows from two tables based on a related column.
In the result set, unmatched rows from the right table will have NULL values for the columns of the left table.
A real-world scenario for using a right outer j...
Refrential integrity ensures that relationships between tables in a database remain consistent.
It is a database concept that ensures that foreign key values in one table match the primary key values in another table.
It prevents orphaned records in a database.
It maintains data consistency and accuracy.
For example, if a customer record is deleted, all related orders for that customer should also be deleted.
It is enforced...
Primary key uniquely identifies a record in a table, while Unique key ensures uniqueness of a column.
Primary key can't have null values, Unique key can have one null value
A table can have only one Primary key, but multiple Unique keys
Primary key is automatically indexed, Unique key is not necessarily indexed
Triggers are database objects that are automatically executed in response to certain events.
Triggers can be used to enforce business rules, audit changes, or replicate data.
There are two types of triggers: DML triggers and DDL triggers.
DML triggers are fired in response to DML statements (INSERT, UPDATE, DELETE).
DDL triggers are fired in response to DDL statements (CREATE, ALTER, DROP).
Swapping two character variables without using third
Use XOR operator to swap two variables without using third variable
Assign the XOR of both variables to the first variable
Assign the XOR of the first variable and second variable to the second variable
I appeared for an interview in Dec 2016.
posted on 31 May 2017
I have been actively involved in various extra curricular activities such as volunteering, sports, and leadership roles.
Volunteered at local animal shelter every weekend
Captain of the soccer team in high school
Organized charity events for underprivileged children
based on 4 interviews
Interview experience
based on 27 reviews
Rating in categories
Engineer- Customer Support
7
salaries
| ₹3.3 L/yr - ₹6 L/yr |
Customer Service Executive
5
salaries
| ₹1 L/yr - ₹3.5 L/yr |
Sales Executive
5
salaries
| ₹1.8 L/yr - ₹2.2 L/yr |
Network Engineer L1
5
salaries
| ₹1.1 L/yr - ₹2.4 L/yr |
Applications Engineer
4
salaries
| ₹7 L/yr - ₹11 L/yr |
Oracle
Amdocs
Automatic Data Processing (ADP)
24/7 Customer