i
Infinite Computer Solutions
Filter interviews by
I applied via Naukri.com and was interviewed in Dec 2023. There was 1 interview round.
STP stands for Spanning Tree Protocol.
STP is a network protocol used to prevent loops in Ethernet networks.
It works by creating a loop-free logical topology by blocking redundant paths.
STP elects a root bridge and calculates the shortest path to it for each network segment.
It uses Bridge Protocol Data Units (BPDU) to exchange information between switches.
STP is defined by the IEEE 802.1D standard.
The main function of the Root bridge switch is to control the flow of data traffic in a spanning tree network.
The Root bridge switch is elected as the central point of the spanning tree network.
It determines the shortest path for data traffic to reach all other switches in the network.
The Root bridge switch sends Bridge Protocol Data Units (BPDUs) to other switches to exchange information and maintain the spanning tree...
The IP address works at Layer 3 of the OSI model. Assigning an IP address on a Layer 2 switch is not possible.
IP addresses are used for network layer communication (Layer 3)
Layer 2 switches operate at the data link layer (Layer 2)
Layer 2 switches use MAC addresses for communication within a local network
IP addresses are assigned to devices connected to Layer 2 switches, not to the switch itself
DNS uses port number 53. It works by translating domain names into IP addresses and vice versa.
DNS stands for Domain Name System.
Port number 53 is used for both TCP and UDP protocols.
DNS works by resolving domain names to their corresponding IP addresses.
It uses a hierarchical distributed database system.
DNS queries and responses are sent over port 53.
DNS operates through a client-server model.
Example: When you type a ...
DHCP DORA process is the sequence of steps followed by a client to obtain an IP address from a DHCP server.
DORA stands for Discover, Offer, Request, and Acknowledge.
Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.
Offer: DHCP servers respond with DHCP Offer messages containing IP address lease information.
Request: Client selects one DHCP Offer and sends a DHCP Request message to reques...
2G, 3G, and 5G are different generations of mobile network technology.
2G refers to second-generation mobile network technology, which primarily provided voice and basic data services.
3G refers to third-generation mobile network technology, which introduced faster data speeds and enabled mobile internet access.
5G refers to fifth-generation mobile network technology, which offers significantly faster data speeds, lower l...
The HTTPS port number is 443.
HTTPS uses port 443 for secure communication.
It is the default port for secure HTTP connections.
HTTPS encrypts data using SSL/TLS protocols.
Examples: https://www.example.com:443 or https://192.168.0.1:443
The HTTP port number is 80.
The default port number for HTTP is 80.
It is used for communication between web servers and clients.
Other common port numbers for HTTP include 8080 and 8888.
SSH port number is 22. SSH service is used for secure remote access and secure file transfer.
SSH port number is 22 by default
SSH stands for Secure Shell
SSH service provides secure remote access to servers
It encrypts the data transmitted over the network
SSH service is used for secure file transfer (SFTP) and remote command execution
It provides authentication and encryption for secure communication
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
Layer 1 (Physical): Deals with the physical transmission of data over the network.
Layer 2 (Data Link): Provides error-free transmission of data frames between nodes on the same network.
Layer 3 (Network): Handles routing and logical addressing to enable data transfer between different networks.
Layer 4 (Tra...
The TCP/IP model is a network protocol suite that defines how data is transmitted over the internet.
The TCP/IP model consists of four layers: Network Interface, Internet, Transport, and Application.
It is used in the current scenario because it provides a standardized framework for communication between devices on a network.
The TCP/IP model allows for reliable and efficient data transmission, ensuring that data packets ...
DTP (Dynamic Trunking Protocol) is a Cisco proprietary protocol used to negotiate trunking between switches.
DTP is used to automatically negotiate trunking on a link between Cisco switches.
It allows switches to dynamically form trunk links without manual configuration.
DTP operates in three modes: dynamic auto, dynamic desirable, and trunk.
Dynamic auto mode waits for the other end to initiate trunking.
Dynamic desirable ...
I have worked on various router devices and vendors.
Cisco routers (e.g. Cisco 2900 series)
Juniper routers (e.g. Juniper MX series)
Huawei routers (e.g. Huawei NE series)
MikroTik routers (e.g. MikroTik RB series)
What people are saying about Infinite Computer Solutions
I applied via Naukri.com and was interviewed in Feb 2021. There were 3 interview rounds.
Remove duplicate objects from an array of multiple objects.
Create a new array to store unique objects
Loop through the original array and check if the object already exists in the new array
If not, add it to the new array
Return the new array
Maintain state by using a global variable or a state management system.
Use a global variable to store the state and access it whenever needed.
Use a state management system like Redux or MobX to manage the state.
Avoid using local variables or closures to store state as they will be lost when the code is repeated.
Consider using object-oriented programming principles to encapsulate state within objects.
Use functional prog...
Design patterns are reusable solutions to common software problems. Android system uses various design patterns.
MVC (Model-View-Controller) pattern is used in Android to separate UI logic from business logic.
Singleton pattern is used to ensure only one instance of a class is created.
Observer pattern is used to notify changes in data to multiple components.
Builder pattern is used to simplify complex object creation.
Adap...
posted on 5 Feb 2021
I applied via Recruitment Consulltant and was interviewed before Jul 2021. There were 3 interview rounds.
Mine sweeper logic for a box click
To delete an element from a linked list, update the pointers of the previous node to skip the node to be deleted.
Traverse the linked list to find the node to be deleted
Update the 'next' pointer of the previous node to skip the node to be deleted
Free the memory allocated to the node to be deleted
Some of the top questions asked at the Infinite Computer Solutions Network Support Engineer interview -
based on 1 interview
Interview experience
Software Engineer
1.4k
salaries
| ₹3 L/yr - ₹12.2 L/yr |
Senior Software Engineer
1.3k
salaries
| ₹6.8 L/yr - ₹22.5 L/yr |
Technical Lead
833
salaries
| ₹9.8 L/yr - ₹28.9 L/yr |
Associate Software Engineer
750
salaries
| ₹2.5 L/yr - ₹8.5 L/yr |
Softwaretest Engineer
601
salaries
| ₹3 L/yr - ₹11 L/yr |
Sutherland Global Services
Optum Global Solutions
Hexaware Technologies
FIS