Filter interviews by
Adtech refers to technologies used for advertising, including data analytics, targeting, and programmatic buying.
Adtech encompasses tools for managing and optimizing digital advertising campaigns.
Examples include Demand-Side Platforms (DSPs) like The Trade Desk for programmatic buying.
Ad networks like Google Ads connect advertisers with publishers to display ads.
Data analytics in adtech helps in audience segmentat...
Work-life balance is essential for productivity and mental health, fostering a sustainable work environment.
Promotes mental well-being: A balanced life reduces stress and burnout, leading to better job performance.
Increases productivity: Employees who maintain a healthy balance tend to be more focused and efficient.
Encourages creativity: Time away from work allows for fresh perspectives and innovative ideas.
Suppor...
A packet travels over two systems by following the OSI model for network communication and the TCP/IP model for internet communication.
Packet is created at the application layer in the OSI model
It then moves down through the transport, network, data link, and physical layers in the OSI model
At the TCP/IP model, the packet moves through the application, transport, internet, and network access layers
Each layer adds ...
Isolate infected mail server, scan for virus, remove virus, restore from backup if necessary.
Isolate infected mail server from network to prevent spread of virus
Scan mail server with antivirus software to detect and remove virus
Restore mail server from backup if necessary to ensure no data loss
Inform mail users about the situation and advise on any necessary actions
Implement security measures to prevent future inf...
Electricity is generated at power plants using various sources like coal, natural gas, or renewable energy. It is then transmitted through power lines to homes and businesses. In a computer, electricity is converted into readable form through components like the power supply, motherboard, and processor.
Electricity is generated at power plants using sources like coal, natural gas, or renewable energy
It is transmitt...
The tool or command to resume copying data from where it left off in a Linux server is rsync.
Use rsync command with the --partial and --progress options to resume copying data from where it left off.
Example: rsync --partial --progress source_directory/ destination_directory/
Firewalls are security systems that monitor and control incoming and outgoing network traffic. IPS and IDS are intrusion prevention and detection systems that analyze network traffic for malicious activity.
Firewalls act as a barrier between a trusted internal network and untrusted external networks.
IPS (Intrusion Prevention System) actively monitors network traffic for potential threats and takes action to prevent...
Routers connect multiple networks, switches connect devices within a network, L3 switches combine routing and switching functions, repeaters amplify signals, hubs simply broadcast data to all connected devices.
Routers connect multiple networks and make decisions about the best path for data to travel.
Switches connect devices within a network and use MAC addresses to forward data to the correct destination.
L3 switc...
Work-life balance is essential for overall well-being and productivity.
Work-life balance helps prevent burnout and improves mental health.
Setting boundaries between work and personal life is important.
Flexible work arrangements can help achieve better work-life balance.
Regular breaks and time off are crucial for maintaining balance.
Balancing work commitments with personal interests and relationships is key.
Adtech refers to technologies used for advertising, including data analytics, targeting, and programmatic buying.
Adtech encompasses tools for managing and optimizing digital advertising campaigns.
Examples include Demand-Side Platforms (DSPs) like The Trade Desk for programmatic buying.
Ad networks like Google Ads connect advertisers with publishers to display ads.
Data analytics in adtech helps in audience segmentation a...
Work-life balance is essential for productivity and mental health, fostering a sustainable work environment.
Promotes mental well-being: A balanced life reduces stress and burnout, leading to better job performance.
Increases productivity: Employees who maintain a healthy balance tend to be more focused and efficient.
Encourages creativity: Time away from work allows for fresh perspectives and innovative ideas.
Supports pe...
I applied via Walk-in and was interviewed before Aug 2023. There were 3 interview rounds.
I have stayed in my current job for a long time because I have found it fulfilling and challenging.
I have been able to grow and develop my skills within the company
I have built strong relationships with my colleagues and enjoy the work environment
I have been given opportunities for advancement and new challenges within the same company
I am seeking new challenges and opportunities for growth. My salary expectation is competitive based on my experience and skills.
Seeking new challenges and opportunities for growth
Looking for a more dynamic work environment
Salary expectation is competitive based on experience and skills
Electricity is generated at power plants using various sources like coal, natural gas, or renewable energy. It is then transmitted through power lines to homes and businesses. In a computer, electricity is converted into readable form through components like the power supply, motherboard, and processor.
Electricity is generated at power plants using sources like coal, natural gas, or renewable energy
It is transmitted th...
Firewalls are security systems that monitor and control incoming and outgoing network traffic. IPS and IDS are intrusion prevention and detection systems that analyze network traffic for malicious activity.
Firewalls act as a barrier between a trusted internal network and untrusted external networks.
IPS (Intrusion Prevention System) actively monitors network traffic for potential threats and takes action to prevent them...
Isolate infected mail server, scan for virus, remove virus, restore from backup if necessary.
Isolate infected mail server from network to prevent spread of virus
Scan mail server with antivirus software to detect and remove virus
Restore mail server from backup if necessary to ensure no data loss
Inform mail users about the situation and advise on any necessary actions
Implement security measures to prevent future infectio...
A packet travels over two systems by following the OSI model for network communication and the TCP/IP model for internet communication.
Packet is created at the application layer in the OSI model
It then moves down through the transport, network, data link, and physical layers in the OSI model
At the TCP/IP model, the packet moves through the application, transport, internet, and network access layers
Each layer adds its o...
Routers connect multiple networks, switches connect devices within a network, L3 switches combine routing and switching functions, repeaters amplify signals, hubs simply broadcast data to all connected devices.
Routers connect multiple networks and make decisions about the best path for data to travel.
Switches connect devices within a network and use MAC addresses to forward data to the correct destination.
L3 switches c...
The tool or command to resume copying data from where it left off in a Linux server is rsync.
Use rsync command with the --partial and --progress options to resume copying data from where it left off.
Example: rsync --partial --progress source_directory/ destination_directory/
I applied via Approached by Company and was interviewed before Aug 2023. There were 3 interview rounds.
Aptitude and Technical
DP related questions
I applied via Walk-in and was interviewed before Mar 2023. There were 2 interview rounds.
90 Mintutes, Easy Aptitude Questions and DSA Questions
Top trending discussions
I applied via Walk-in and was interviewed before Jun 2021. There were 2 interview rounds.
HR told about the company on the first day, how it works, told the rules, showed the management and a lot
I applied via Campus Placement and was interviewed before Feb 2020. There were 4 interview rounds.
Yes, algorithms and pseudocodes are still important in IT Services.
Algorithms are used in various fields of IT such as machine learning, data analysis, and cryptography.
Pseudocodes are used to plan and design algorithms before coding them.
Understanding algorithms and pseudocodes is essential for software engineers to write efficient and optimized code.
Examples of algorithms include sorting algorithms, search algorithms...
I applied via Referral and was interviewed in Dec 2020. There were 4 interview rounds.
I applied via Company Website and was interviewed before Sep 2021. There were 2 interview rounds.
2 coding questions which are of easy level
Some of the top questions asked at the Infomo interview -
based on 5 interview experiences
Difficulty level
Duration
Data Engineer
11
salaries
| ₹8.6 L/yr - ₹20.2 L/yr |
Software Developer
8
salaries
| ₹4.8 L/yr - ₹12 L/yr |
Data Scientist
6
salaries
| ₹7.5 L/yr - ₹22 L/yr |
Software Development Engineer 1
6
salaries
| ₹9.2 L/yr - ₹16.8 L/yr |
Software Engineer
4
salaries
| ₹5 L/yr - ₹9.6 L/yr |
TCS
Accenture
Wipro
Cognizant