i
Infosys BPM
Filter interviews by
Find a vowels in the given strings
Top trending discussions
I applied via Campus Placement and was interviewed before Apr 2020. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Apr 2020. There was 1 interview round.
I applied via Referral and was interviewed before Oct 2020. There were 3 interview rounds.
I applied via Company Website and was interviewed before Feb 2021. There were 2 interview rounds.
Codevita coding competition- 6 problem statements, need to solve at least 1 or 2 for shortlist for next round and also for interview
I applied via Company Website and was interviewed before Apr 2021. There were 2 interview rounds.
It's totally based on Basic understanding of concepts such as Linear arrangement, circular arrangement، blood relation, direction sense, ratio proportion, time, speed, distance
I applied via Company Website and was interviewed before Jul 2021. There were 2 interview rounds.
The first round is an aptitude online test that had Basics of Computer Science, Mathematics, English and then finally one basic program to code and compile like Palindrome.
Three panellists were present and it was a face-face round, Panellist 1 and 2 takes the technical discussions like classes, inheritance, oops concept, basic syntax, and such. Panellist 3 talks more about your resume skills, hobbies and the company overview.
I applied via Campus Placement and was interviewed in Nov 2020. There was 1 interview round.
The largest area in a histogram refers to the rectangle with the maximum area that can be formed within the histogram.
To find the largest area in a histogram, we can use the concept of a stack.
We iterate through each bar in the histogram and maintain a stack of bars in non-decreasing order of their heights.
If the current bar's height is greater than the height of the bar at the top of the stack, we push the current bar...
I applied via Recruitment Consultant and was interviewed in Dec 2018. There were 3 interview rounds.
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted, secure internal network and another network, such as the Internet.
It examines each packet of data that passes through it and determines whether to allow or block the traffic based on the set of rules.
Firewalls can be hardware or softwa...
BGP attributes are used to determine the best path for routing traffic between networks.
BGP attributes include: AS Path, Next Hop, Local Preference, MED, Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router on the path
Local Preference is used to indicate the preferred path for outbound traffic
MED (Multi-Exit Discriminator) is used to...
VPN stands for Virtual Private Network. It allows secure remote access to a private network over the internet.
VPN creates a secure and encrypted connection between the user's device and the private network.
It masks the user's IP address and location, providing anonymity and privacy.
VPN uses different protocols such as PPTP, L2TP, IPSec, and OpenVPN.
It can be used to access geographically restricted content, bypass cens...
Routing protocols are used to determine the best path for data to travel in a network.
Distance Vector protocols: RIP, IGRP, EIGRP
Link State protocols: OSPF, IS-IS
Hybrid protocols: BGP
Path Vector protocols: BGP
IGP vs EGP
VTP stands for VLAN Trunking Protocol, used to manage VLANs in a switched network.
VTP is a Cisco proprietary protocol.
It allows for easy VLAN management by propagating VLAN information across the network.
VTP operates in three modes: server, client, and transparent.
Server mode allows for VLAN creation, deletion, and modification.
Client mode receives and stores VLAN information.
Transparent mode forwards VTP messages but ...
Routers connect networks while firewalls protect networks from unauthorized access.
Routers direct traffic between networks while firewalls filter traffic based on predefined rules.
Routers operate at layer 3 of the OSI model while firewalls operate at layer 4 or higher.
Examples of routers include Cisco routers, while examples of firewalls include Fortinet firewalls.
Routers can be used to segment networks while firewalls...
based on 1 interview
Interview experience
Senior Processing Executive
12.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Process Specialist
8.5k
salaries
| ₹0 L/yr - ₹0 L/yr |
Processing Executive
5k
salaries
| ₹0 L/yr - ₹0 L/yr |
Account Assistant
3.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Accountant
3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Accenture
TCS
Wipro
HCLTech