Filter interviews by
I applied via Referral and was interviewed in Jun 2021. There was 1 interview round.
Windows 10 is the newer version of Windows operating system compared to Windows 9 which does not exist.
Windows 9 does not exist, it was skipped by Microsoft
Windows 10 has a different user interface compared to Windows 8 and 8.1
Windows 10 has more advanced security features compared to Windows 7
Windows 10 has a virtual assistant called Cortana
Windows 10 has a feature called Continuum that allows seamless transition betw
A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.
A domain is a logical grouping of network resources such as computers, printers, and servers.
It allows for centralized management of user accounts, security policies, and network resources.
Domains are commonly used in business and enterprise environments.
Examples of domain names include microsoft.c
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automatically assigning IP addresses to devices.
It allows devices to join a network and obtain an IP address without manual configuration.
DHCP servers can also assign other network configuration settings, such as subnet masks and default gate...
DNS stands for Domain Name System. It is a system that translates domain names into IP addresses.
DNS is like a phonebook for the internet
It helps to locate websites by translating domain names into IP addresses
DNS servers store information about domain names and their corresponding IP addresses
DNS can also be used for email routing and other network services
To change a domain, you need to purchase a new domain and update the DNS records.
Purchase a new domain from a domain registrar
Update the DNS records to point to the new domain
Redirect the old domain to the new domain
Update any links or references to the old domain
To configure Outlook in Exchange Server, follow these steps:
Open Outlook and click on File
Click on Add Account
Enter your email address and click on Connect
Enter your password and click on OK
Outlook will automatically configure the settings for Exchange Server
To repair a PST file in Outlook, use the Inbox Repair Tool (scanpst.exe).
Close Outlook before running the tool
Locate the scanpst.exe tool on your computer
Select the PST file you want to repair
Click on the 'Start' button to begin the repair process
Once the repair is complete, open Outlook and check if the issue is resolved
Configuring network in a computer involves setting up IP address, subnet mask, default gateway, and DNS server.
Open Network and Sharing Center
Click on Change adapter settings
Right-click on the network adapter and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and click Properties
Enter IP address, subnet mask, default gateway, and DNS server
Click OK to save changes
Top trending discussions
To copy Business phone on account to associated contacts and opportunities, use process builder or workflow rule.
Create a process builder or workflow rule on account object
Add criteria to check if Business phone is not null
Add immediate action to update Business phone on associated contacts and opportunities
Use field update action to update Business phone field on contacts and opportunities
Map the Business phone field
Yes, CRM deployment can be done using DevOps.
DevOps can automate the deployment process of CRM systems
Continuous integration and continuous deployment can be used for CRM deployment
DevOps tools like Jenkins, Ansible, and Puppet can be used for CRM deployment
DevOps can ensure faster and more efficient deployment of CRM systems
Data export service is a tool that allows users to export data from Dynamics 365 to an Azure SQL database or a CSV file.
Data export service is a cloud-based service provided by Microsoft.
It can be used to export data from Dynamics 365 to an Azure SQL database or a CSV file.
It can be scheduled to run automatically or manually.
It can be used to export data from both standard and custom entities.
It can be used to export d...
Use alternative method or optimize plugin to reduce time.
Optimize the plugin code to reduce execution time.
Use a different plugin that can perform the same operation faster.
Write custom code to achieve the same operation without using the plugin.
Break down the operation into smaller tasks and execute them in parallel.
Use caching to store results and avoid repeating the operation.
Consider upgrading hardware or increasin
I applied via Naukri.com and was interviewed in Dec 2020. There was 1 interview round.
The OSI model is a conceptual framework used to describe the communication functions of a network.
The model has 7 layers, each with a specific function.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer communicates with the layer above and below it.
The model helps ensure interoperability between different network devices and software.
Example: When you visit a web...
SSL offloading is a process of removing SSL encryption from incoming traffic and decrypting it before sending it to the backend servers.
SSL offloading is performed by a load balancer like F5 to reduce the processing load on backend servers.
It improves server performance and reduces latency by offloading SSL processing to a dedicated hardware or software.
F5 SSL offloading can be configured to support multiple SSL certif...
SNAT stands for Secure Network Address Translation and is a feature in F5 that allows for the translation of IP addresses.
SNAT is used to translate the source IP address of outgoing traffic to a different IP address.
This can be useful in scenarios where multiple devices are sharing a single public IP address.
SNAT can also be used to improve security by hiding the actual IP address of a device from the public internet.
F...
STP, HSRP, and FRRP are network protocols used for redundancy and failover. HSRP and VRRP are similar but HSRP is preferred.
STP (Spanning Tree Protocol) prevents loops in a network by disabling redundant links
HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) provide redundancy by allowing multiple routers to share a virtual IP address
FRRP (Fast Router Redundancy Protocol) is a Cisco propr...
The xlate table in ASA is used to keep track of translations between internal and external IP addresses. It is important for IPsec tunnel troubleshooting.
The xlate table is used to map internal IP addresses to external IP addresses
It is important for troubleshooting IPsec tunnels because it allows you to see if traffic is being translated correctly
You can view the xlate table using the 'show xlate' command in the ASA C...
I applied via Naukri.com
I applied via Naukri.com and was interviewed in Jan 2023. There were 4 interview rounds.
All about profit, percentages,desicion making, English grammar etc
I applied via Referral and was interviewed before May 2023. There was 1 interview round.
I applied via Referral and was interviewed before Jun 2021. There were 4 interview rounds.
I appeared for an interview in Sep 2020.
I applied via Campus Placement and was interviewed before Sep 2020. There were 3 interview rounds.
Python code to find the root of a number
Use the math module to access the sqrt() function
Use the ** operator to raise the number to the power of 1/n
Handle negative numbers by converting them to complex numbers
posted on 11 Mar 2022
I appeared for an interview before Mar 2021.
Round duration - 60 minutes
Round difficulty - Medium
21 students were shortlisted from the 1st MCQ round and in this round we were asked to write the codes (function only) of 3 questions in 1 hour time.
You are given a grid containing oranges where each cell of the grid can contain one of the three integer values:
Find the minimum time required to rot all fresh oranges in a grid.
Use Breadth First Search (BFS) to simulate the rotting process
Track the time taken to rot all oranges and return -1 if any fresh oranges remain
Handle edge cases like no fresh oranges or all oranges already rotten
Consider using a queue to efficiently process adjacent oranges
Given an array/list 'ARR' consisting of 'N' integers, your task is to find the majority element in the array. If there is no majority element present, return -1.
Find the majority element in an array, return -1 if no majority element exists.
Iterate through the array and keep track of the count of each element using a hashmap.
Check if any element's count is greater than floor(N/2) to determine the majority element.
Return the majority element or -1 if no majority element exists.
You are provided with a non-empty binary tree in which each node contains a non-negative integer value. Your task is to find and return the maximum ...
Find the maximum path sum between two leaf nodes in a binary tree.
Traverse the tree to find the maximum path sum between two leaf nodes.
Keep track of the maximum sum found so far.
Consider all possible paths between leaf nodes.
Handle cases where the tree has only a single leaf node.
Implement a recursive function to calculate the maximum path sum.
Round duration - 60 minutes
Round difficulty - Medium
This was a technical round with DSA based questions.
You are given a Singly Linked List of integers. The task is to find the N-th node from the end of the list.
If the given list is (1 -> -2 -&g...
Find the N-th node from the end of a Singly Linked List of integers.
Traverse the list to find the length L of the list.
Calculate the position of the N-th node from the beginning as L - N + 1.
Traverse the list again to reach the calculated position and return the node's value.
You are given a binary tree consisting of distinct integers and two nodes, X
and Y
. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes...
Find the Lowest Common Ancestor (LCA) of two nodes in a binary tree.
Traverse the binary tree to find the paths from the root to nodes X and Y.
Compare the paths to find the last common node, which is the LCA.
Handle cases where one node is an ancestor of the other or when one node is the LCA itself.
You are given a string of length N
. Your task is to reverse the string word by word. The input may contain multiple spaces between words and may have leading o...
Reverse words in a string while handling leading/trailing spaces and multiple spaces between words.
Split the input string by spaces to get individual words
Reverse the list of words
Join the reversed words with a single space in between
Handle leading/trailing spaces by stripping them before and after reversing
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions based on DSA
Given 'N' subjects, each containing a certain number of problems, and 'K' friends, assign subjects to friends such that each subject goes to exactly one friend, maintain...
Assign subjects to friends to minimize maximum workload, find minimum time for most loaded friend.
Sort subjects in descending order
Assign subjects to friends one by one until all subjects are assigned
The maximum workload will be the sum of problems assigned to the friend with the most problems
Return the maximum workload as the minimum time required
Grammar in compiler design defines the syntax and structure of a programming language.
Grammar specifies the rules for forming valid statements in a programming language.
It consists of a set of production rules that define how valid programs can be constructed.
There are different types of grammars such as context-free grammar, regular grammar, etc.
Example: In C programming language, the grammar specifies that a for loop...
A token in compiler design is a basic unit of syntax that the compiler can understand and process.
Tokens are the smallest units of a program that are meaningful to the compiler.
Examples of tokens include keywords, identifiers, operators, and punctuation symbols.
Tokens are generated by the lexical analysis phase of the compiler.
Tokens are used by the parser to build the abstract syntax tree of the program.
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DSA and Compiler Design mainly. He told me that you’ll be having your final HR round in some time. I knew that I was going well because he seemed to be quite satisfied with my answers.
You are given an arbitrary binary tree consisting of N nodes, each associated with an integer value from 1 to 9. Each root-to-leaf path can be considered a number formed by concat...
Find the total sum of all root to leaf paths in a binary tree formed by concatenating node values.
Traverse the binary tree from root to leaf nodes, keeping track of the current path sum
Add the current path sum to the total sum when reaching a leaf node
Use modulo (10^9 + 7) to handle large outputs
A regular language is a language that can be recognized by a finite automaton.
Regular languages can be described by regular expressions.
Regular languages are closed under union, concatenation, and Kleene star operations.
Examples of regular languages include the set of all strings over an alphabet that contain an even number of 'a's.
NP problems are decision problems that can be verified in polynomial time, while NP-Hard problems are at least as hard as the hardest problems in NP.
NP problems can be verified in polynomial time but not necessarily solved in polynomial time.
NP-Hard problems are at least as hard as the hardest problems in NP, but may not be in NP themselves.
Examples of NP problems include the subset sum problem and the traveling salesm...
Round duration - 30 minutes
Round difficulty - Easy
That was the round for which I’ve been waiting for hours
She was very friendly and nice to talk to. It didn’t seem that I was talking to the HR. It was more like talking to a friend. Finally we discussed about the pay-scale and work culture in Accolite.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
based on 1 review
Rating in categories
Technical Engineer
272
salaries
| ₹2.8 L/yr - ₹10.5 L/yr |
Engineer- Customer Support
169
salaries
| ₹1.4 L/yr - ₹5 L/yr |
Technical Support Engineer
137
salaries
| ₹1.9 L/yr - ₹9 L/yr |
Senior Technical Engineer
103
salaries
| ₹5.5 L/yr - ₹15 L/yr |
Desktop Support Engineer
89
salaries
| ₹1.5 L/yr - ₹3.3 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant