Filter interviews by
I was interviewed in Oct 2016.
I am a recent graduate with a degree in engineering, seeking a trainee position to further develop my skills and contribute to the field.
Recent graduate with a degree in engineering
Seeking a trainee position to further develop skills
Passionate about contributing to the field
Strong problem-solving and analytical skills
Experience with CAD software and project management
Completed internships at engineering firms
Excellent
My favorite subject is Mechanical Engineering.
I enjoy studying the principles of mechanics and how they apply to real-world applications.
I find the design and analysis of machines and structures fascinating.
I am particularly interested in thermodynamics and fluid mechanics.
I have a passion for understanding how things work and finding innovative solutions to engineering problems.
The flowsheet of a methanol plant involves several steps including synthesis gas production, purification, methanol synthesis, and distillation.
The first step in the methanol plant flowsheet is the production of synthesis gas, which is a mixture of carbon monoxide and hydrogen.
The synthesis gas is then purified to remove impurities such as sulfur compounds and carbon dioxide.
Next, the purified synthesis gas is fed into...
Shell and tube heat exchangers are used for heat transfer between two fluids, while condensers in ACs are specifically designed to convert vapor into liquid.
Shell and tube heat exchangers have a shell (outer vessel) and tubes (inner vessels) for fluid flow.
They are used in various industries for applications such as cooling, heating, and condensing.
Condensers in ACs are a type of heat exchanger that specifically conver...
Heat is transferred in a cooling tower through a combination of evaporation, convection, and radiation.
Evaporation: Water is sprayed into the cooling tower, and as it evaporates, it absorbs heat from the surrounding air.
Convection: The warm water from industrial processes is circulated through the cooling tower, and as it comes into contact with the air, heat is transferred through convection.
Radiation: Heat is also tr...
Volumetric efficiency of a compressor is the ratio of actual volume of air delivered to the theoretical volume it should deliver.
Volumetric efficiency is expressed as a percentage.
It measures how well a compressor is able to deliver the desired volume of air.
Factors affecting volumetric efficiency include compressor design, speed, temperature, and pressure.
Volumetric efficiency can be improved by optimizing compressor ...
Discharge pressure increases at the outlet of a reciprocating compressor due to compression of the gas.
During the compression process, the gas molecules are forced into a smaller volume, resulting in an increase in pressure.
The reciprocating motion of the compressor piston compresses the gas in the cylinder, leading to an increase in pressure.
The discharge valve of the compressor prevents the compressed gas from flowin...
The wet bulb temperature should be more in an air conditioned room than in ambient temperature.
The wet bulb temperature is a measure of the lowest temperature that can be achieved by evaporative cooling.
In an air conditioned room, the air is typically drier and the evaporation rate is higher, leading to a lower wet bulb temperature.
In ambient temperature, the air is usually more humid, resulting in a higher wet bulb te
Bernoulli's principle explains the relationship between fluid speed and pressure, while Archimedes' principle explains buoyancy.
Bernoulli's principle states that as the speed of a fluid increases, its pressure decreases.
This principle is commonly observed in the lift generated by an airplane wing or the flow of water through a pipe.
Archimedes' principle states that an object immersed in a fluid experiences an upward bu...
Water cannot be used instead of air cooled condensers due to several reasons.
Water is a poor conductor of heat compared to air, resulting in less efficient heat transfer.
Using water as a coolant requires a constant supply of water, which may not be feasible in all locations.
Water cooling systems are more complex and expensive to install and maintain compared to air cooling systems.
Water cooling systems pose a higher ri...
Chemical engineering is applied in cooking to optimize processes, enhance food quality, and ensure safety.
Chemical engineers develop and improve food processing techniques.
They optimize heat transfer and mass transfer in cooking processes.
Chemical engineers design and improve food packaging materials to ensure food safety.
They develop and implement quality control measures to maintain consistent food quality.
Chemical e...
Wet and dry bulb temperature are used to measure humidity and determine the level of moisture in the air.
Wet bulb temperature is the lowest temperature that can be reached by evaporating water into the air.
Dry bulb temperature is the temperature of the air measured by a regular thermometer.
The difference between wet and dry bulb temperatures can be used to calculate relative humidity.
Wet bulb temperature is lower than ...
Increasing reflux ratio reduces condenser duty.
Higher reflux ratio means more liquid is returned to the column.
This increases the liquid flow rate in the column.
As a result, less vapor needs to be condensed in the condenser.
Reduced condenser duty leads to lower energy consumption.
Example: If the reflux ratio is doubled, the condenser duty may be halved.
Top trending discussions
posted on 2 Feb 2025
I was interviewed in Jan 2025.
I was interviewed in Jan 2025.
posted on 25 Jan 2025
I was interviewed in Dec 2024.
A standardized assessment that measures a person's skills, cognitive abilities, and potential to perform in a specific role.
For example, a โน10 LPA CTC could mean an in-hand salary of โน70,000โโน75,000 per month, depending on deductions and benefits.
โจ ๐ฃ๐ฟ๐ผ ๐ง๐ถ๐ฝ: Always request a detailed salary structure during negotiationsโitโs your roadmap to making informed decisions
๐๐ง๐ ๐๐ ๐๐ป-๐๐ฎ๐ป๐ฑ ๐ฆ๐ฎ๐น๐ฎ๐ฟ๐: ๐ง๐ต๐ฒ ๐ฅ๐ฒ๐ฎ๐น๐ถ๐๐ ๐๐ต๐ฒ๐ฐ๐ธ ๐๐๐ฒ๐ฟ๐ ๐ฃ๐ฟ๐ผ๐ณ๐ฒ๐๐๐ถ๐ผ๐ป๐ฎ๐น ๐ก๐ฒ๐ฒ๐ฑ๐!
Weโve all been thereโexcitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
posted on 18 Dec 2024
I applied via Naukri.com and was interviewed in Dec 2024.ย There were 2 interview rounds.
Split horizon is a technique used in computer networking to prevent routing loops by not advertising routes back to the same interface they were learned from.
Split horizon is used in distance-vector routing protocols like RIP to prevent routing loops.
It works by not advertising routes back to the same interface they were learned from.
Split horizon with poison reverse takes this a step further by advertising the route w...
BGP stands for Border Gateway Protocol, used to exchange routing information between different networks.
BGP is an exterior gateway protocol used to make routing decisions on the internet.
It operates by exchanging routing information between different autonomous systems (AS).
BGP uses TCP port 179 for communication.
BGP routers maintain a table of IP prefixes and their paths to reach them.
BGP can be configured to influenc...
There are two types of BGP: eBGP and iBGP. eBGP has an AD value of 20, while iBGP has an AD value of 200.
eBGP (External BGP) - AD value: 20
iBGP (Internal BGP) - AD value: 200
Routing protocol is a set of rules used by routers to determine the best path for data packets to travel.
Routing protocols help routers communicate with each other to dynamically update routing tables.
Types of routing protocols include distance-vector (e.g. RIP), link-state (e.g. OSPF), and hybrid (e.g. EIGRP).
Distance-vector protocols determine the best path based on hop count.
Link-state protocols use a more complex a...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology map
It supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)
OSPF divides the network into areas to re
Preventing loop avoidance in BGP involves using loop prevention mechanisms like AS Path and Route Reflectors.
Use AS Path attribute to prevent loops by tracking the path a route has taken through AS numbers.
Implement Route Reflectors to avoid loops in BGP by controlling the route propagation within a cluster.
Utilize BGP Confederations to divide the network into smaller autonomous systems to prevent loops.
Regularly monit...
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how data is transferred from one computer to another over a network.
The seven layers of OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has speci...
Traceroute is a network diagnostic tool used to track the path packets take from one networked device to another.
Traceroute sends packets with increasing TTL values to determine the path to a destination.
Each router along the path sends back an ICMP Time Exceeded message, allowing traceroute to map the route.
The final destination sends an ICMP Port Unreachable message, indicating the end of the route.
Traceroute helps i...
The presence of '*****' in a traceroute indicates that the router is blocking the ICMP packets used by traceroute.
The '*****' indicates that the router is not responding to the ICMP packets sent by the traceroute tool.
This could be due to the router being configured to block ICMP traffic for security reasons.
It can also be caused by a firewall or network filtering rules blocking the ICMP packets.
In some cases, the '***...
BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Established.
Idle - Initial state when BGP is not yet established
Connect - Attempting to establish a TCP connection
Active - Waiting for a TCP connection to be completed
OpenSent - Sent an Open message to peer
OpenConfirm - Received an Open message and waiting for confirmation
Established - BGP peers are fully established and can exchange routing information
The new router can be configured remotely using a laptop or mobile device with access to the network.
Access the router's web interface by entering its IP address in a web browser
Login using default credentials or credentials provided by the company
Configure basic settings such as SSID, password, and security settings
Update firmware if necessary
Test the connection to ensure it is working properly
CE and PE routers are types of routers used in MPLS networks. CE routers connect to customer networks while PE routers connect to provider networks.
CE routers (Customer Edge) connect to customer networks and are responsible for exchanging routes with customer devices.
PE routers (Provider Edge) connect to provider networks and are responsible for exchanging routes with other PE routers in the MPLS network.
CE routers are...
The command to assign an IP address on a Juniper router interface is 'set interface <interface_name> unit <unit_number> family inet address <ip_address/mask>'
Use the 'set' command to configure the interface
Specify the interface name and unit number
Use the 'family inet' statement to configure an IPv4 address
Specify the IP address and subnet mask
Parameters for BGP neighbourship include AS number, IP address, subnet mask, and BGP version.
AS number must match on both neighbors
IP address must be reachable between neighbors
Subnet mask should be the same on both neighbors
BGP version should be compatible between neighbors
tftp stands for Trivial File Transfer Protocol, a simple protocol used for transferring files over a network.
tftp is a lightweight protocol used for transferring files between devices on a network.
It operates on UDP port 69.
tftp does not require user authentication, making it less secure compared to FTP.
It is commonly used for booting devices over a network, such as in diskless workstations or routers.
An example of tft...
Loop avoidance mechanism in BGP prevents routing loops by using loop prevention mechanisms like AS path attribute and route reflectors.
BGP uses AS path attribute to prevent routing loops by not accepting routes with its own AS number in the path.
Route reflectors are used in BGP to avoid loops in route propagation within a cluster of routers.
BGP Confederations can also be used to prevent loops by dividing the AS into sm
Traceroute is a network diagnostic tool used to track the path packets take from source to destination IP.
Traceroute sends packets with increasing TTL values to elicit ICMP Time Exceeded responses from routers along the path.
The source IP is the IP address of the device initiating the traceroute, while the destination IP is the IP address of the target device.
Traceroute displays the IP addresses of the routers in the p...
Public IP is the address assigned to a device that is directly accessible over the internet, while private IP is used within a private network.
Public IP is unique and can be accessed from anywhere on the internet
Private IP is used within a local network and is not directly accessible from the internet
Public IP is assigned by the Internet Service Provider (ISP)
Private IP addresses are typically in the ranges of 192.168.
To configure a router with support of a non tech guy onsite, provide step-by-step instructions and visual aids.
Create a simple, easy-to-follow guide with step-by-step instructions.
Use visual aids such as diagrams or videos to demonstrate the process.
Provide clear explanations of each step and troubleshoot common issues.
Offer remote support or a helpline for additional assistance if needed.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters network traffic based on rules set by the administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and Windows Firewall
Routers connect multiple networks together while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers can determine the best path for data to travel between networks, while...
MPLS stands for Multiprotocol Label Switching, a technique used in telecommunications networks to direct data packets along predefined paths.
MPLS is used to improve network performance and efficiency by quickly routing data packets based on labels instead of IP addresses.
It allows for traffic engineering, quality of service (QoS) prioritization, and virtual private network (VPN) services.
MPLS operates at layer 2.5 of t...
FTP and TFTP are protocols used for transferring files over a network.
FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet.
TFTP (Trivial File Transfer Protocol) is a simpler version of FTP that uses UDP instead of TCP for file transfer.
FTP requires authentication (username and password) for access, while TFTP does not ...
based on 5 reviews
Rating in categories
Design Engineer
6
salaries
| โน4.5 L/yr - โน9 L/yr |
Senior Engineer
3
salaries
| โน8.5 L/yr - โน13.4 L/yr |
Designer
3
salaries
| โน7.5 L/yr - โน13.5 L/yr |
Chief Engineer
3
salaries
| โน21.5 L/yr - โน25 L/yr |
KPMG India
PwC
Deloitte
Ernst & Young