Filter interviews by
OSI layers refer to the Open Systems Interconnection model, which is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and interacts with adjacent layers to facilitate communication betwee...
Networking is the practice of connecting computers and other devices to share resources and information.
Networking involves the physical connection of devices through cables or wireless connections.
It also includes the configuration of network settings to enable communication between devices.
Networking allows for sharing of resources such as files, printers, and internet connections.
Examples of networking technolo...
Working procedure on outages involves identifying the issue, troubleshooting, and resolving the problem.
Identify the issue through monitoring tools or user reports
Troubleshoot the problem by analyzing logs and network configurations
Resolve the issue by implementing a solution or escalating to higher-level support
Communicate updates and resolution to stakeholders
Perform post-mortem analysis to prevent future outage...
Following up with carrier partner involves regular communication and coordination to ensure smooth operations and timely issue resolution.
Regular communication to ensure smooth operations
Coordination to resolve issues in a timely manner
Tracking performance metrics to identify areas for improvement
Collaborating on network upgrades and expansions
Providing feedback on carrier partner's services
Negotiating contracts a...
Monitoring tools are essential for tracking network performance, identifying issues, and ensuring optimal operation of network systems.
Network monitoring tools help in real-time tracking of network traffic and performance.
Examples include SolarWinds, Nagios, and PRTG Network Monitor.
They can alert administrators to potential issues before they affect users.
Monitoring tools often provide visual dashboards for easy ...
MPLS is a protocol used in telecommunications for efficient packet forwarding. Layer 1 troubleshooting involves physical connectivity issues. Routing involves determining the best path for data packets. Switching involves forwarding data packets within a network.
MPLS (Multiprotocol Label Switching) is a protocol used to efficiently route data packets within a network.
Layer 1 troubleshooting involves identifying an...
BGP and OSPF are routing protocols used in computer networks.
BGP (Border Gateway Protocol) is used to exchange routing information between different autonomous systems (AS).
OSPF (Open Shortest Path First) is used to find the shortest path between routers within the same autonomous system (AS).
BGP is a path-vector protocol while OSPF is a link-state protocol.
BGP is used in large-scale networks while OSPF is used in...
I applied via Referral and was interviewed before Nov 2023. There were 2 interview rounds.
Networking is the practice of connecting computers and other devices to share resources and information.
Networking involves the physical connection of devices through cables or wireless connections.
It also includes the configuration of network settings to enable communication between devices.
Networking allows for sharing of resources such as files, printers, and internet connections.
Examples of networking technologies ...
OSI layers refer to the Open Systems Interconnection model, which is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and interacts with adjacent layers to facilitate communication between dev...
I appeared for an interview before May 2023.
MPLS is a protocol used in telecommunications for efficient packet forwarding. Layer 1 troubleshooting involves physical connectivity issues. Routing involves determining the best path for data packets. Switching involves forwarding data packets within a network.
MPLS (Multiprotocol Label Switching) is a protocol used to efficiently route data packets within a network.
Layer 1 troubleshooting involves identifying and res...
I applied via Naukri.com and was interviewed before Jan 2021. There were 3 interview rounds.
BGP and OSPF are routing protocols used in computer networks.
BGP (Border Gateway Protocol) is used to exchange routing information between different autonomous systems (AS).
OSPF (Open Shortest Path First) is used to find the shortest path between routers within the same autonomous system (AS).
BGP is a path-vector protocol while OSPF is a link-state protocol.
BGP is used in large-scale networks while OSPF is used in smal...
Monitoring tools are essential for tracking network performance, identifying issues, and ensuring optimal operation of network systems.
Network monitoring tools help in real-time tracking of network traffic and performance.
Examples include SolarWinds, Nagios, and PRTG Network Monitor.
They can alert administrators to potential issues before they affect users.
Monitoring tools often provide visual dashboards for easy analy...
Following up with carrier partner involves regular communication and coordination to ensure smooth operations and timely issue resolution.
Regular communication to ensure smooth operations
Coordination to resolve issues in a timely manner
Tracking performance metrics to identify areas for improvement
Collaborating on network upgrades and expansions
Providing feedback on carrier partner's services
Negotiating contracts and pr...
Working procedure on outages involves identifying the issue, troubleshooting, and resolving the problem.
Identify the issue through monitoring tools or user reports
Troubleshoot the problem by analyzing logs and network configurations
Resolve the issue by implementing a solution or escalating to higher-level support
Communicate updates and resolution to stakeholders
Perform post-mortem analysis to prevent future outages
Top trending discussions
I applied via Campus Placement and was interviewed in Dec 2016. There were 3 interview rounds.
Program to reverse an integer
Convert the integer to a string
Reverse the string
Convert the reversed string back to an integer
I have worked on various projects including a web application for inventory management and a mobile app for task tracking.
Developed a web application using React for inventory management, allowing users to track stock levels and generate reports.
Created a mobile app using Flutter for task tracking, enabling users to create, assign, and track tasks in real-time.
Collaborated with a team of developers to integrate APIs an...
Yes, I am interested in studying further to enhance my skills and knowledge in software engineering.
Interested in pursuing a Master's degree in Computer Science
Enrolling in online courses to learn new technologies and programming languages
Attending workshops and conferences to stay updated with industry trends
Reverse a linked list without using extra memory
Iterate through the linked list and change the next pointers to reverse the list
Use three pointers - prev, current, and next - to keep track of the reversed list
Start with prev and current pointing to null and the head of the linked list respectively
While traversing the list, update the next pointer of the current node to point to the previous node
Move prev and current po...
Data structures are fundamental concepts in software engineering that organize and store data efficiently.
Arrays: Simple and efficient for storing and accessing elements.
Linked Lists: Dynamic and flexible, efficient for insertion and deletion.
Stacks: LIFO structure, useful for managing function calls and undo operations.
Queues: FIFO structure, ideal for managing tasks and scheduling.
Trees: Hierarchical structure, used ...
The difference is that 'int arr[5]' creates an array on the stack, while 'malloc(5*sizeof(int))' allocates memory on the heap.
int arr[5] creates an array of 5 integers on the stack, which is a fixed-size memory allocation.
malloc(5*sizeof(int)) dynamically allocates memory on the heap, allowing for variable-size memory allocation.
The memory allocated with malloc must be explicitly freed with free() to avoid memory leaks...
I am a passionate software engineer with a strong background in computer science and experience in developing innovative solutions.
Completed a Bachelor's degree in Computer Science from XYZ University
Proficient in programming languages such as Java, Python, and C++
Worked on various projects including a mobile app for tracking fitness goals
Familiar with Agile development methodologies and version control systems like Gi...
In 5 years, I see myself as a senior software engineer leading a team of developers on innovative projects.
Continuing to enhance my technical skills and knowledge through ongoing learning and certifications
Taking on more leadership responsibilities and mentoring junior team members
Contributing to the development of cutting-edge software solutions for the company
Possibly pursuing opportunities for advancement within the...
I tend to overthink details and can be overly critical of my own work.
Overthinking details can lead to delays in completing tasks
Being overly critical can hinder progress and confidence
Yes, I am interested in studying further to enhance my skills and stay updated with the latest technologies.
I believe continuous learning is essential in the fast-paced tech industry
Further studies can help me specialize in a specific area of software engineering
Advanced degrees or certifications can open up new career opportunities
I appeared for an interview before Mar 2021.
Round duration - 40 minutes
Round difficulty - Easy
Technical round with questions based on DSA.
Create a program to reverse a given integer N
. The output should be the reversed integer.
If a number has trailing zeros, their reversed version should not inclu...
Reverse a given integer while excluding trailing zeros.
Create a program to reverse the given integer by converting it to a string and then reversing it.
Remove any trailing zeros from the reversed string before converting it back to an integer.
Handle the constraints of the input integer being between 0 and 10^8.
Example: For input 1230, the output should be 321.
You are given a Singly Linked List of integers. Your task is to reverse the Linked List by changing the links between nodes.
The first line of input contai...
Reverse a given singly linked list by changing the links between nodes.
Iterate through the linked list and reverse the links between nodes.
Use three pointers to keep track of the current, previous, and next nodes.
Update the links while traversing the list to reverse it.
Return the head of the reversed linked list.
new int[5] is C++ specific and initializes the array with default values, while malloc(5 * sizeof(int)) is a C function and does not initialize the array.
new int[5] is C++ specific and calls constructors for each element in the array.
malloc(5 * sizeof(int)) is a C function and does not call constructors, leaving the array uninitialized.
new int[5] returns a pointer to the first element of the array, while malloc(5 * siz...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Implement a shopping cart system using data structures and algorithms.
Use a data structure like a hash map to store items and their quantities in the cart.
Implement functions to add, remove, and update items in the cart.
Consider implementing functions to calculate total price, apply discounts, and handle checkout process.
Normal dsa Basics and aptitude.
I applied via Campus Placement and was interviewed before Jun 2023. There were 3 interview rounds.
Find the number of subarrays whose sum is divisible by K.
Use prefix sum technique to calculate the sum of subarrays efficiently.
Keep track of the remainders of prefix sums when divided by K.
Use a hashmap to store the count of each remainder.
For each prefix sum, check how many previous prefix sums have the same remainder.
Add the count of subarrays with the same remainder to the total count.
based on 2 interview experiences
Difficulty level
Duration
based on 17 reviews
Rating in categories
Network Analyst
173
salaries
| ₹3 L/yr - ₹7 L/yr |
Network Engineer
50
salaries
| ₹3 L/yr - ₹6.5 L/yr |
Network Technician
45
salaries
| ₹3 L/yr - ₹9 L/yr |
Service Delivery Coordinator
19
salaries
| ₹3.2 L/yr - ₹5.5 L/yr |
Engineer
16
salaries
| ₹3.8 L/yr - ₹6 L/yr |
Indus Towers
BT Business
Nvidia
Colt Technology Services