i
IBM
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Monster and was interviewed in Mar 2021. There were 3 interview rounds.
Node agent is a process that manages a single node in a distributed system. DS env is a set of environment variables for a WebSphere Application Server instance.
Node agent is responsible for starting and stopping application servers on a node.
DS env contains information about the server environment, such as classpath and JVM settings.
Node agents and DS env are commonly used in WebSphere Application Server environments.
...
Prevent data leakage by implementing access controls, encryption, monitoring, and employee training.
Implement access controls to limit who can access sensitive data
Use encryption to protect data in transit and at rest
Monitor network activity for suspicious behavior
Train employees on data security best practices
Regularly update software and security protocols
Perform regular security audits to identify vulnerabilities
Upgrade from 11.7.0 to 11.7.1 involves downloading the new version and running the upgrade script.
Download the 11.7.1 version from the vendor's website
Backup the current system and database
Run the upgrade script provided with the new version
Verify the upgrade was successful by checking system functionality
Configuration and mount points are crucial for efficient Linux server management.
Configuration files are located in /etc directory
Mount points are directories where file systems are mounted
Common mount points include /, /boot, /home, /var, /tmp
fstab file is used to configure mount points at boot time
Users can be added to groups and projects through the system management console.
Access the system management console
Navigate to the user management section
Select the user(s) to add to the group or project
Choose the group or project to add the user(s) to
Save changes
I applied via Company Website and was interviewed in Dec 2024. There were 2 interview rounds.
There are two main sections: foundation and advanced. The foundation section consists of three subsections: quantitative, reasoning, and verbal. If you pass the foundation section but do not clear the advanced section, you will be considered for either the ninja role or the digital role during the interview process. The advanced section includes advanced aptitude questions and two coding questions.
There were a total of seven sections: verbal ability, logical reasoning, arithmetic problems, verbal reasoning, puzzles, pseudocodes, and essay writing, with each section having its own cutoff scores.
I was interviewed in Oct 2024.
First round > General aptitude and versant test.
VDI can be managed by monitoring performance, updating software, optimizing resources, and ensuring security.
Monitor performance regularly to identify any issues or bottlenecks.
Update VDI software and patches to ensure system stability and security.
Optimize resources by balancing workloads and adjusting configurations as needed.
Ensure security measures are in place, such as encryption, access controls, and regular back...
I applied via Company Website and was interviewed in Oct 2024. There were 2 interview rounds.
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like the phone book of the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
DNS records are used to store information about a domain, such as the IP address of the server hosting the domain, mail server information, etc.
Common types of DNS records include A records (for IPv4 ad...
ESXi can be patched using VMware Update Manager, command line interface, or by manually downloading and applying patches.
Use VMware Update Manager to automate patching process
Use command line interface to manually apply patches
Download patches from VMware website and apply manually if needed
Seeking new challenges and opportunities for growth
Looking for a new challenge to further develop my skills and knowledge
Interested in exploring new technologies and projects
Seeking opportunities for career advancement and growth
Desire for a change in work environment or company culture
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 4 interview rounds.
Its moderate and nit that much difficult to attempt
Coding also moderate its not that much deep
Assignment is based on verbal communication
Family should be the 1st priority as they provide emotional support and love.
Family provides emotional support during tough times
Family offers unconditional love and care
Job can always be replaced, but family is irreplaceable
Java is a high-level programming language known for its portability, security, and versatility.
Java is an object-oriented language
It is platform-independent, meaning code can run on any device with a Java Virtual Machine (JVM)
Java is used for developing web applications, mobile apps, desktop applications, and more
I am a dedicated and experienced System Analyst with a strong background in IT and problem-solving skills.
Experienced in analyzing and designing software systems
Proficient in programming languages such as Java, C++, and SQL
Strong communication and teamwork skills
Detail-oriented and able to prioritize tasks effectively
I applied via TCS and was interviewed in Dec 2024. There was 1 interview round.
Hash technology is a method used to convert data into a fixed-size string of characters, typically used for data security and integrity.
Hash technology uses algorithms to generate a unique fixed-size string of characters from input data.
It is commonly used for data security, password storage, digital signatures, and data integrity verification.
Examples of hash algorithms include MD5, SHA-1, and SHA-256.
Blockchain is a decentralized, distributed ledger technology used to securely record transactions across multiple computers.
Decentralized database
Consensus mechanism
Immutable record of transactions
Cryptographic security
Smart contracts
Examples: Bitcoin, Ethereum
DML stands for Data Manipulation Language, used to manage data in a database.
DML is a subset of SQL (Structured Query Language) used to insert, update, delete, and retrieve data in a database.
Examples of DML commands include INSERT, UPDATE, DELETE, and SELECT.
DML is essential for managing and manipulating data within a database system.
Binary to decimal conversion involves multiplying each digit by 2 raised to the power of its position.
To convert binary to decimal, start from the rightmost digit and multiply each digit by 2 raised to the power of its position.
Add all the results together to get the decimal equivalent.
For example, to convert binary 1011 to decimal: 1*2^3 + 0*2^2 + 1*2^1 + 1*2^0 = 11.
Iterate through array and compare each element to find the maximum number.
Iterate through the array using a loop.
Compare each element to a variable storing the current maximum number.
Update the variable if a larger number is found.
Return the maximum number at the end.
Basic HTML code for inserting image and creating a table
Use <img> tag to insert an image with src attribute
Use <table>, <tr>, <td> tags to create a table structure
Specify image source and table content within respective tags
based on 7 reviews
Rating in categories
Application Developer
11.6k
salaries
| ₹5.5 L/yr - ₹23.7 L/yr |
Software Engineer
5.6k
salaries
| ₹5.3 L/yr - ₹22.3 L/yr |
Advisory System Analyst
5.2k
salaries
| ₹9.3 L/yr - ₹27.5 L/yr |
Senior Software Engineer
4.8k
salaries
| ₹8 L/yr - ₹30 L/yr |
Senior Systems Engineer
4.6k
salaries
| ₹5.7 L/yr - ₹19.1 L/yr |
Oracle
TCS
Cognizant
Accenture