Filter interviews by
I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.
Top trending discussions
I applied via Naukri.com and was interviewed in Sep 2020. There were 3 interview rounds.
I am flexible towards night shifts and can adjust my schedule accordingly.
I have experience working night shifts and understand the importance of being available for the job.
I am willing to adjust my personal schedule to accommodate night shifts.
I understand that night shifts may be necessary in certain industries and am prepared to work them if required.
I applied via Naukri.com and was interviewed in Aug 2021. There was 1 interview round.
I applied via Job Fair
Java 8 programs, string buffer and builder
About traffic in Banglore and the project
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
To get daily updated data to your email, you can use automated scripts or tools that fetch the data and send it to your email address.
Use a programming language like Python to write a script that fetches the data from a source and sends it to your email using SMTP.
Utilize APIs provided by the data source to retrieve the data and then use an email service's API to send it to your email address.
Use third-party tools like...
I applied via Walk-in and was interviewed in Mar 2021. There was 1 interview round.
C is a general-purpose programming language known for its efficiency and low-level control.
C was developed by Dennis Ritchie at Bell Labs in the 1970s.
It is widely used for system programming, embedded systems, and developing operating systems.
C is known for its simplicity, allowing direct memory manipulation and efficient code execution.
It influenced the development of many other programming languages, such as C++, Ja
Java is a high-level programming language known for its platform independence and object-oriented approach.
Java is widely used for developing desktop, web, and mobile applications.
It is known for its write once, run anywhere (WORA) principle.
Java programs are compiled into bytecode and executed on a Java Virtual Machine (JVM).
It supports multithreading, exception handling, and automatic memory management.
Popular framew...
Lambda is a function that allows you to write and use small, anonymous functions in programming languages.
Lambda functions are often used in functional programming languages.
They are anonymous, meaning they don't have a name.
Lambdas can be used as arguments to higher-order functions.
They are commonly used for tasks that require a short, one-time function.
Lambda functions can be written in various programming languages,
I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.
To disk scan, use tools like fsck or badblocks. To create LVM, use pvcreate, vgcreate, and lvcreate commands.
To disk scan, use fsck command to check and repair file system errors.
To scan for bad blocks on a disk, use badblocks command.
To create LVM, first initialize physical volumes (pvcreate), then create volume groups (vgcreate), and finally create logical volumes (lvcreate).
Example: fsck /dev/sda1
Example: badblocks ...
To troubleshoot a user not able to login, check for account lockouts, password issues, network connectivity, and system errors.
Check if the user's account is locked or disabled
Verify if the user's password has expired or needs to be reset
Ensure network connectivity is working properly
Check for any system errors or issues that may prevent login
Review system logs for any relevant error messages
Confirm if the user is usin
Bonding in Linux is a technique to combine multiple network interfaces into a single virtual interface for increased bandwidth and fault tolerance.
Install the bonding driver module
Configure the bonding interface in the network configuration file
Specify the bonding mode and options
Assign the physical interfaces to the bonding interface
Restart the network service to apply the changes
Disc LVM partitioning allows for flexible management of storage space by creating logical volumes on physical disks.
LVM stands for Logical Volume Manager.
It allows for dynamic allocation and resizing of storage space.
LVM partitions are created by combining physical volumes (disks) into volume groups, and then creating logical volumes within those groups.
Logical volumes can be resized, moved, or even span multiple physi...
To run a cronjob for a process, use the crontab command to create a cron job entry.
Use the crontab command to edit the cron table
Specify the schedule using the cron syntax
Specify the command or script to be executed
Save and exit the cron table to schedule the cron job
The patching process in my current organization involves regular updates and maintenance to ensure system security and performance.
Regularly scheduled patching cycles
Testing patches in a non-production environment before deployment
Applying patches to all systems, including servers, workstations, and network devices
Monitoring and tracking patch status
Documenting patching procedures and maintaining an inventory of patche...
To rollback patches through Yum, use the yum history command and the yum history undo command.
Use the 'yum history' command to view the history of installed packages and patches.
Identify the transaction ID of the patch you want to rollback.
Use the 'yum history undo
Confirm the rollback by reviewing the output and checking the system's package status.
To troubleshoot a server not able to login, check network connectivity, verify credentials, and review system logs.
Check network connectivity to ensure the server is reachable
Verify the correctness of login credentials
Review system logs for any error messages or indications of login failures
Restart the server if necessary
Check for any recent system updates or changes that may have caused the login issue
To create swap for a Linux server, use the 'mkswap' command to create a swap file or partition and then activate it using the 'swapon' command.
Use 'dd' command to create a swap file with desired size: 'dd if=/dev/zero of=/path/to/swapfile bs=1G count=4'
Set the correct permissions for the swap file: 'chmod 600 /path/to/swapfile'
Create swap space on the file: 'mkswap /path/to/swapfile'
Activate the swap space: 'swapon /pa...
Tar utility is used to create backups by compressing files and directories.
To create a backup using tar, use the 'tar' command followed by the appropriate options and arguments.
Specify the files or directories to be included in the backup.
Use the '-cvf' options to create a new tar archive file.
Specify the name of the archive file to be created.
To compress the backup, use the '-z' option for gzip compression or '-j' opt...
scp is a command-line tool used for securely transferring files between a local and remote Linux system.
scp stands for secure copy.
It uses SSH protocol for secure file transfer.
It can be used to copy files between local and remote systems, or between two remote systems.
Syntax: scp [options] [source] [destination]
Example: scp file.txt user@remote:/path/to/destination
yum is a package manager that resolves dependencies and installs packages from repositories, while rpm is a low-level package manager that directly installs packages.
yum is a high-level package manager that uses rpm as its underlying package management system.
yum can automatically resolve dependencies and install packages from repositories, while rpm requires manual dependency resolution.
yum can also update packages an...
To troubleshoot HTTPS not working, check certificate validity, firewall settings, and web server configuration.
Check if the SSL/TLS certificate is valid and properly installed
Verify if the web server is configured to listen on the correct HTTPS port (usually 443)
Ensure that the firewall allows incoming connections on the HTTPS port
Check if the SSL/TLS protocols and cipher suites are correctly configured
Inspect the web ...
These are common network protocols used for communication and file transfer.
SSH (Secure Shell) is a secure protocol used for remote login and secure file transfer.
HTTP (Hypertext Transfer Protocol) is used for transmitting web pages and other resources over the internet.
HTTPS (HTTP Secure) is the secure version of HTTP, encrypted with SSL/TLS.
FTP (File Transfer Protocol) is used for transferring files between a client ...
UDP is a connectionless protocol that provides fast, but unreliable communication. TCP is a connection-oriented protocol that ensures reliable communication.
UDP stands for User Datagram Protocol, while TCP stands for Transmission Control Protocol.
UDP is faster than TCP because it does not establish a connection before sending data.
UDP does not guarantee delivery of packets, while TCP ensures reliable delivery.
TCP uses ...
The network layers for network are a hierarchical structure that defines the communication process between devices.
The network layers are a way to organize and standardize the communication process in a network.
There are several models that define the network layers, such as the OSI model and the TCP/IP model.
Each layer has a specific function and interacts with the layers above and below it.
The layers provide abstract...
Troubleshooting steps for not being able to login through putty
Check network connectivity
Verify correct IP address and port number
Ensure SSH service is running on the server
Check firewall settings
Verify correct username and password
Check if the server is reachable and not down
Yes, I am familiar with scripting in bash and sh.
I have experience writing scripts in bash and sh.
I am comfortable with using variables, loops, conditionals, and functions in bash and sh scripts.
I have used bash and sh scripts for automating tasks, managing system configurations, and troubleshooting.
I am familiar with common commands and utilities in bash and sh, such as grep, sed, awk, and find.
I have written scripts ...
I applied via Naukri.com and was interviewed in Nov 2021. There was 1 interview round.
Answers to questions related to Java connection query, showing all tables in SQL, and basic query in Linux.
Java connection query is used to establish a connection between Java application and database.
To show all tables in SQL, use the command 'SHOW TABLES;' or 'SELECT table_name FROM information_schema.tables WHERE table_schema = 'database_name';'
Basic query in Linux includes commands like 'ls' to list files, 'cd' to ...
based on 9 reviews
Rating in categories
Desktop Support Engineer
364
salaries
| ₹1.2 L/yr - ₹4.2 L/yr |
Desktop Support Engineer L2
133
salaries
| ₹1.5 L/yr - ₹4.2 L/yr |
Network Engineer
132
salaries
| ₹1.9 L/yr - ₹4.6 L/yr |
Technical Support Engineer
57
salaries
| ₹1.5 L/yr - ₹3.6 L/yr |
System Administrator
43
salaries
| ₹2.1 L/yr - ₹4 L/yr |
Randstad
Team Lease
Innovsource Services
Teamware Solutions