Faster and better experience!
Filter interviews by
Clear (1)
Ping command sends packets of data to a specific IP address to test network connectivity.
Ping uses Internet Control Message Protocol (ICMP) to send and receive packets.
It measures the time taken for a packet to travel from the source to the destination and back.
Ping can be used to test network connectivity, troubleshoot network issues, and determine network latency.
Ping can also be used to determine the IP address of a...
nmap is a network exploration and security auditing tool.
nmap stands for Network Mapper
It is used to discover hosts and services on a computer network
It can be used to identify open ports, operating systems, and vulnerabilities
nmap can be run from the command line with various options and arguments
Examples: nmap -sP 192.168.1.0/24 (ping scan), nmap -sV target.com (version detection)
man command is used to display the manual pages for a command in Unix.
Man command provides detailed information about a command, including its syntax, options, and examples.
It can be used to search for commands and their descriptions using keywords.
Man pages are organized into sections, with each section covering a different topic.
To view the manual page for a command, type 'man' followed by the command name.
For exampl...
SSH reverse tunneling is a technique to access a remote machine behind a firewall or NAT.
It allows a user to connect to a remote machine that is not directly accessible from the internet.
The remote machine initiates the connection to the local machine, creating a tunnel for data transfer.
It is useful for remote administration, accessing local resources, and bypassing firewalls.
Example: accessing a home computer from wo...
I cannot answer this question as it goes against ethical hacking practices.
It is unethical and illegal to attempt to root a server without proper authorization.
As a Junior Trading System Engineer, it is important to prioritize ethical and legal practices in the workplace.
Instead, focus on learning about server security and how to prevent unauthorized access.
If you come across any vulnerabilities, report them to the app...
Top trending discussions
posted on 26 Jun 2017
I was interviewed before Jun 2016.
The question asks to construct a k-ary tree using the given k and DFS traversal string.
Iterate through the DFS traversal string
If the current character is 'P', create a parent node
If the current character is 'L', create a leaf node
Link the nodes according to the DFS traversal order
To determine if a graph has a node with n degree, iterate through all nodes and count their edges.
Iterate through each node in the graph
Count the number of edges connected to each node
If any node has n edges, then the graph has a node with n degree
I am a Senior Associate in the field of finance, specializing in investment management.
I have expertise in analyzing financial data and making investment recommendations.
I work closely with clients to understand their financial goals and risk tolerance.
I monitor market trends and economic indicators to make informed investment decisions.
I have experience in portfolio management and asset allocation.
I may hold certifica...
My ambition is to become a respected leader in my field, making a positive impact through innovative solutions and mentorship.
To continuously learn and grow in my role
To lead and inspire a team towards success
To contribute to the advancement of the organization and industry
To mentor and guide junior colleagues in their professional development
I was interviewed before Dec 2020.
Round duration - 60 Minutes
Round difficulty - Medium
This round was purely based on Data Structures and Algorithms . One has to be fairly comfortable in solving Algorithmic problems to pass this round . Both the questions asked were quite common and luckily I had already prepared them from CodeStudio and LeetCode.
Given a Binary Tree with 'N' nodes, where each node holds an integer value, your task is to compute the In-Order, Pre-Order, and Post-Order traversals of the binar...
Compute the In-Order, Pre-Order, and Post-Order traversals of a Binary Tree given in level-order format.
Implement functions to perform In-Order, Pre-Order, and Post-Order traversals of a Binary Tree.
Use level-order input to construct the Binary Tree.
Traverse the Binary Tree recursively to generate the required traversals.
Ensure proper handling of null nodes represented by -1 in the input.
Return the three traversals as
Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.
The first line of input is an intege...
Reverse a singly linked list by altering the links between nodes.
Iterate through the linked list and reverse the links between nodes
Use three pointers to keep track of the current, previous, and next nodes
Update the links between nodes to reverse the list
Return the head of the reversed linked list
Round duration - 45 Minutes
Round difficulty - Medium
This round basically tested some concepts from Data Structures and File Manipulation .
Given two arrays A
and B
with sizes N
and M
respectively, both sorted in non-decreasing order, determine their intersection.
The intersection of two arrays in...
The problem involves finding the intersection of two sorted arrays efficiently.
Use two pointers to iterate through both arrays simultaneously.
Compare elements at the pointers and move the pointers accordingly.
Handle cases where elements are equal and update the intersection array.
Return the intersection array as the result.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
posted on 3 Feb 2022
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There were 2 interview rounds.
posted on 23 Nov 2023
I applied via Naukri.com and was interviewed in May 2023. There were 3 interview rounds.
posted on 16 Sep 2024
I applied via Recruitment Consulltant and was interviewed in Mar 2024. There were 2 interview rounds.
DSA medium level questions were asked.
MakeMyTrip is a travel booking application that allows users to book flights, hotels, and holiday packages.
Include features like flight/hotel search, booking, payment gateway integration, and user profiles.
Implement filters for search results, reviews/ratings for hotels, and notifications for booking updates.
Integrate maps for location tracking, weather forecasts, and customer support chatbot.
Offer discounts, loyalty p...
posted on 9 Nov 2024
I applied via Recruitment Consulltant
posted on 15 Jan 2025
I applied via Job Portal and was interviewed in Jul 2024. There was 1 interview round.
P91 welding typically uses a low hydrogen type electrode.
Low hydrogen type electrode is commonly used in P91 welding
The electrode helps prevent hydrogen-induced cracking in the weld
Examples of low hydrogen electrodes include E7018 and E7016
PWHT stands for Post Weld Heat Treatment, a process used to relieve residual stresses and improve the mechanical properties of welded joints.
PWHT involves heating the welded joint to a specific temperature for a certain period of time, followed by controlled cooling.
The process helps to reduce hardness, increase ductility, and improve toughness of the welded joint.
PWHT is commonly used in industries such as oil and gas...
posted on 24 Mar 2021