i
IBM
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Monster and was interviewed in Mar 2021. There were 3 interview rounds.
Node agent is a process that manages a single node in a distributed system. DS env is a set of environment variables for a WebSphere Application Server instance.
Node agent is responsible for starting and stopping application servers on a node.
DS env contains information about the server environment, such as classpath and JVM settings.
Node agents and DS env are commonly used in WebSphere Application Server environments.
...
Prevent data leakage by implementing access controls, encryption, monitoring, and employee training.
Implement access controls to limit who can access sensitive data
Use encryption to protect data in transit and at rest
Monitor network activity for suspicious behavior
Train employees on data security best practices
Regularly update software and security protocols
Perform regular security audits to identify vulnerabilities
Upgrade from 11.7.0 to 11.7.1 involves downloading the new version and running the upgrade script.
Download the 11.7.1 version from the vendor's website
Backup the current system and database
Run the upgrade script provided with the new version
Verify the upgrade was successful by checking system functionality
Configuration and mount points are crucial for efficient Linux server management.
Configuration files are located in /etc directory
Mount points are directories where file systems are mounted
Common mount points include /, /boot, /home, /var, /tmp
fstab file is used to configure mount points at boot time
Users can be added to groups and projects through the system management console.
Access the system management console
Navigate to the user management section
Select the user(s) to add to the group or project
Choose the group or project to add the user(s) to
Save changes
I applied via Campus Placement and was interviewed before Mar 2020. There was 1 interview round.
Triggers are database objects that automatically execute in response to certain events or changes in data.
Triggers are used to enforce business rules or data integrity.
They can be used to audit changes to data.
Triggers can be set to execute before or after an event, such as an insert, update, or delete operation.
They can be defined on tables, views, or schemas.
Examples of triggers include sending an email notification ...
I applied via Naukri.com and was interviewed in Sep 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Jul 2021. There was 1 interview round.
I applied via Campus Placement and was interviewed in Jan 2021. There were 3 interview rounds.
Swap two numbers with and without temporary variable
Without temporary variable: Use addition and subtraction
With temporary variable: Use a third variable to store the value of one of the numbers
Example without temporary variable: a=5, b=7; a=a+b; b=a-b; a=a-b;
Example with temporary variable: a=5, b=7; temp=a; a=b; b=temp;
I applied via Naukri.com and was interviewed before Jan 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2020. There was 1 interview round.
I applied via Walk-in and was interviewed in Aug 2020. There were 4 interview rounds.
based on 7 reviews
Rating in categories
Application Developer
11.9k
salaries
| ₹5.7 L/yr - ₹25.9 L/yr |
Software Engineer
5.6k
salaries
| ₹7.1 L/yr - ₹22.1 L/yr |
Advisory System Analyst
5.2k
salaries
| ₹9.5 L/yr - ₹28.4 L/yr |
Senior Software Engineer
4.9k
salaries
| ₹8 L/yr - ₹32 L/yr |
Software Developer
4.8k
salaries
| ₹11.6 L/yr - ₹32 L/yr |
Oracle
TCS
Cognizant
Accenture