i
IBM
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
posted on 8 Jun 2021
I applied via Recruitment Consultant and was interviewed in May 2021. There were 4 interview rounds.
Network topologies refer to the arrangement of various elements in a network.
There are several types of network topologies, including bus, star, ring, mesh, and hybrid.
Bus topology involves connecting all devices to a single cable.
Star topology involves connecting all devices to a central hub or switch.
Ring topology involves connecting devices in a circular manner.
Mesh topology involves connecting devices to each other...
posted on 3 Jun 2020
I applied via Naukri.com and was interviewed in May 2020. There was 1 interview round.
posted on 10 May 2021
I applied via Referral and was interviewed in Apr 2021. There were 5 interview rounds.
DSL stands for Digital Subscriber Line, a technology that provides high-speed internet access over traditional copper telephone lines.
DSL uses existing telephone lines to transmit digital data
It provides faster internet speeds than dial-up connections
There are different types of DSL, such as ADSL, VDSL, and SDSL
DSL requires a DSL modem to connect to the internet
DSL is widely available in urban and suburban areas
Example...
A router is a networking device that forwards data packets between computer networks.
Routers operate at the network layer of the OSI model.
They use routing tables to determine the best path for data to travel.
Routers can connect different types of networks, such as LANs and WANs.
Examples of routers include Cisco, Netgear, and TP-Link.
Routers can also provide security features such as firewalls and VPNs.
Basic troubleshooting tips for internet problems
Check if other devices are able to connect to the internet
Restart the router/modem
Check for any loose cables or connections
Clear browser cache and cookies
Disable any VPN or proxy settings
Run a virus scan on the device
Contact the internet service provider for assistance
IP address is a unique identifier assigned to devices on a network. MAC address is a unique identifier assigned to network interfaces.
IP address stands for Internet Protocol address and is used to identify devices on a network
MAC address stands for Media Access Control address and is used to identify network interfaces
IP address is a 32-bit number, usually represented in dotted decimal notation (e.g. 192.168.0.1)
MAC ad...
The basic structure of home internet includes a modem, router, and devices connected to the network.
The modem connects to the internet service provider's network and converts the signal to one that can be used by the router.
The router creates a local network and allows multiple devices to connect to the internet.
Devices such as computers, smartphones, and smart home devices connect to the router via Wi-Fi or Ethernet c...
posted on 26 Jun 2021
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
I have worked on CPI optimization and analysis for various software projects.
Implemented CPI reduction techniques like loop unrolling, pipelining, and cache optimization.
Analyzed CPI using performance profiling tools like perf and Intel VTune.
Worked on CPI optimization for a video encoding software, resulting in a 20% performance improvement.
Collaborated with hardware engineers to optimize CPI for a new processor archi...
To connect S4 HANA ECC system to CPI system, use SAP Cloud Connector and configure the connection in CPI.
Install and configure SAP Cloud Connector on the server where the S4 HANA ECC system is installed.
Create a destination in SAP Cloud Connector for the CPI system.
Configure the destination in CPI using the Cloud Connector details.
Test the connection to ensure successful integration.
To configure SFTP adapter, follow these steps:
Create a communication channel with SFTP adapter type
Provide the SFTP server details like hostname, port, username, password, and remote directory
Configure the sender/receiver agreement with the communication channel
Test the connection and transfer files
Certificates authentication and encryption/decryption mechanisms are used in CPI for secure data transfer.
Certificates are used to authenticate the sender and receiver of data in CPI.
Encryption/decryption mechanisms are used to secure the data during transfer.
CPI supports various encryption algorithms such as AES, RSA, and SHA.
Certificates can be uploaded to CPI and used in communication channels for secure data transf
posted on 18 Jun 2021
I applied via campus placement at Don Bosco Institute of Technology, Bangalore and was interviewed in Dec 2020. There were 5 interview rounds.
Real-time examples of OOP concepts
Inheritance: A car is a vehicle, inheriting properties of a vehicle
Polymorphism: A shape can be a square or a circle, both implementing the same area method
Abstraction: A TV remote has buttons to perform actions, but the user doesn't need to know how it works internally
Encapsulation: A bank account has private data like balance, which can only be accessed through public methods
SQL query to print rows with no match in a second table
Use LEFT JOIN to join the two tables
Filter the rows where the second table's primary key is NULL
SELECT the columns from the first table
HashMap is a data structure that stores key-value pairs and allows fast retrieval of values based on keys.
HashMap is part of the Java Collections Framework.
It uses hashing to store and retrieve elements.
It allows null values and null keys.
It is not synchronized by default, but can be made synchronized using Collections.synchronizedMap() method.
Example: HashMap
Final, finally and finalise are related to completion or conclusion, but have different meanings and usage.
Final is an adjective used to describe the last or ultimate stage of something.
Finally is an adverb used to indicate the end of a process or event after a long wait or delay.
Finalise is a verb used to complete or finish something, often with a formal or official process.
Examples: The final exam, finally finished t
Different types of DBMS, DB languages & difference between drop, delete & truncate.
Types of DBMS: Relational, NoSQL, Object-oriented, Hierarchical, Network, etc.
Database languages: SQL, PL/SQL, T-SQL, etc.
DROP: Deletes a table and its data, cannot be rolled back.
DELETE: Deletes rows from a table, can be rolled back.
TRUNCATE: Deletes all rows from a table, cannot be rolled back.
posted on 24 May 2021
I applied via Recruitment Consultant and was interviewed in Apr 2021. There was 1 interview round.
posted on 21 Jun 2021
I applied via Recruitment Consultant and was interviewed in May 2021. There were 4 interview rounds.
posted on 15 Jul 2021
posted on 6 Apr 2021
posted on 11 Oct 2020
Debugging SPFx in SharePoint involves using browser developer tools and Visual Studio Code.
Use browser developer tools to inspect and debug client-side code
Use Visual Studio Code to debug server-side code
Set breakpoints in code to pause execution and inspect variables
Use console.log() statements to output information to the console
Use the SharePoint Workbench to test and debug web parts
Use the gulp serve command to run...
based on 2 reviews
Rating in categories
Application Developer
11.5k
salaries
| ₹5.5 L/yr - ₹23.6 L/yr |
Software Engineer
5.4k
salaries
| ₹4.8 L/yr - ₹22.6 L/yr |
Advisory System Analyst
5.2k
salaries
| ₹9.2 L/yr - ₹27 L/yr |
Senior Software Engineer
5k
salaries
| ₹8 L/yr - ₹30 L/yr |
Senior Systems Engineer
4.6k
salaries
| ₹5.6 L/yr - ₹18.5 L/yr |
Oracle
TCS
Cognizant
Accenture