Filter interviews by
I applied via Recruitment Consultant and was interviewed in May 2021. There were 5 interview rounds.
Explaining the differences between const and var, their accessibility, and other related concepts.
const is a keyword used to declare a variable that cannot be reassigned.
var is a keyword used to declare a variable with function scope.
let is a keyword used to declare a variable with block scope.
Accessibility refers to the scope of a variable and where it can be accessed from.
Other related concepts include hoisting, clos
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
Hurix Systems interview questions for popular designations
Get interview-ready with Top Hurix Systems Interview Questions
I applied via Naukri.com and was interviewed before Jul 2021. There was 1 interview round.
I was interviewed before Jun 2021.
Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not.
Types of testing include unit testing, integration testing, system testing, acceptance testing, and regression testing.
Unit testing involves testing individual units or components of the software.
Integration testing involves testing the interaction between different components...
I applied via Naukri.com and was interviewed before Feb 2019. There were 3 interview rounds.
IP address ranges are divided into classes: A, B, C, D, and E.
Class A: 1.0.0.0 to 126.0.0.0
Class B: 128.0.0.0 to 191.255.0.0
Class C: 192.0.0.0 to 223.255.255.0
Class D: 224.0.0.0 to 239.255.255.255
Class E: 240.0.0.0 to 255.255.255.255
There are different types of backups, including full, incremental, and differential backups.
Full backup: A complete backup of all data and files.
Incremental backup: Only backs up the changes made since the last backup.
Differential backup: Backs up all changes made since the last full backup.
Scheduled backups: Regularly scheduled backups to ensure data is protected.
Offsite backups: Storing backups in a separate location...
A VPN is a virtual private network that allows secure remote access to a private network over the internet.
VPN creates a secure and encrypted connection between the user's device and the private network.
It masks the user's IP address and location, providing anonymity and privacy.
VPN can be used to access restricted content and bypass internet censorship.
Examples of VPNs include OpenVPN, NordVPN, and ExpressVPN.
VMware ESXi is a type-1 hypervisor used for virtualization.
ESXi is a bare-metal hypervisor that runs directly on server hardware.
It allows multiple virtual machines to run on a single physical server.
ESXi is a popular choice for enterprise-level virtualization.
Other types of hypervisors include type-2 hypervisors like VirtualBox and VMware Workstation.
Another type of hypervisor is the container hypervisor, which is use
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting allows for better network management and more efficient use of IP addresses.
It involves creating a subnet mask to determine the network and host portions of an IP address.
Subnetting can be done using binary arithmetic or by using online subnet calculators.
Example: A network with IP address 192.168.1.0 can be subnetted into smaller netwo
Top trending discussions
based on 6 interviews
Interview experience
based on 169 reviews
Rating in categories
Test Engineer
51
salaries
| ₹0 L/yr - ₹0 L/yr |
Softwaretest Engineer
46
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Manager
38
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
34
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
27
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
Tech Mahindra