Upload Button Icon Add office photos

Jasmin Infotech

Compare button icon Compare button icon Compare

Filter interviews by

Jasmin Infotech Support Staff Interview Questions and Answers

Updated 26 Sep 2024

Jasmin Infotech Support Staff Interview Experiences

1 interview found

Support Staff Interview Questions & Answers

user image Anonymous

posted on 26 Sep 2024

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
More than 8 weeks
Result
No response

I applied via Job Fair and was interviewed before Sep 2023. There was 1 interview round.

Round 1 - HR 

(2 Questions)

  • Q1. Self intro and your project
  • Q2. About your background

Interview Preparation Tips

Topics to prepare for Jasmin Infotech Support Staff interview:
  • Java
Interview preparation tips for other job seekers - Some new

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Coding Test 

30min, DSA related question

Round 2 - Technical 

(2 Questions)

  • Q1. BGP state machine
  • Q2. Evpn vxlan topology explanation
  • Ans. 

    EVPN VXLAN topology explanation

    • EVPN (Ethernet VPN) is a technology used to extend Layer 2 connectivity across a Layer 3 network

    • VXLAN (Virtual Extensible LAN) is a tunneling protocol used to overlay virtualized Layer 2 networks over Layer 3 networks

    • EVPN VXLAN topology combines the benefits of both technologies to provide scalable and flexible network virtualization

    • It allows for efficient communication between virtual ma...

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via LinkedIn and was interviewed in Jan 2024. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Design a routing table with insert delete and forward functionality. Define its class also
  • Ans. 

    Design a routing table with insert, delete, and forward functionality in a defined class.

    • Create a class called RoutingTable with methods for insert, delete, and forward

    • Use a data structure like a hash table or tree to store routing information

    • Implement insert method to add new routes, delete method to remove routes, and forward method to look up and forward packets

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Can be solved with trie max prefix matching based

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - HR 

(2 Questions)

  • Q1. Introduce yourself politely .
  • Q2. Be flexible with work

Interview Preparation Tips

Interview preparation tips for other job seekers - All the best

I was interviewed before May 2021.

Round 1 - Video Call 

(2 Questions)

Round duration - 45 minutes
Round difficulty - Easy

Technical Interview round with questions on DSA

  • Q1. 

    Level Order Traversal of Binary Tree

    Given a Binary Tree of integers, your task is to return the level order traversal of the tree.

    Input:

    The first line contains an integer 'T' which denotes the number...
  • Ans. 

    A queue can be used to do level order traversal of the tree. For each node, first visit the node and then push its children nodes in the FIFO queue. 
    printLevelorder(tree)
    1) Create an empty queue q
    2) temp_node = root /*start from root*/
    3) Loop while temp_node is not NULL
    a) print temp_node->data.
    b) Enqueue temp_node’s children 
    (first left then right children) to q
    c) Dequeue a node from q.
    Time Complexity: O(n...

  • Answered Anonymously
  • Q2. 

    Swap Adjacent Bit Pairs Problem Statement

    Given an integer N, your task is to compute the number that results from swapping each even position bit of N's binary representation with its adjacent odd bit to...

  • Ans. 
    1. Let oddPositionBits and evenPositionBits be the two variables that store the value of bits at odd positions and even positions respectively.
    2. Set oddPositionBits as the Bitwise AND of N and 0x55555555.
    3. Set evenPositionBits as the Bitwise AND of N and 0xAAAAAAAA.
    4. Left shift oddPositionBits by 1 bit and right shift evenPositionBits by 1 bit. In this step, we are swapping the positions of the odd bits and the even bits.
    5. Let an...
  • Answered Anonymously
Round 2 - Video Call 

(3 Questions)

Round duration - 60 minutes
Round difficulty - Easy

Technical round with questions on Networking.

  • Q1. What are the various components of an IP packet header?
  • Ans. 

    Following are various components/fields of IP packet header
    Version: The first IP header field is a 4-bit version indicator. In IPv4, the value of its four bits is set to 0100, which indicates 4 in binary. 
    Internet Header Length: Internet header length, shortly known as IHL, is 4 bits in size. It is also called HELEN (Header Length). This IP component is used to show how many 32-bit words are present in the header.
    ...

  • Answered Anonymously
  • Q2. What is the difference between TCP and UDP?
  • Ans. 

    TCP reads data as streams of bytes, and the message is transmitted to segment boundaries. UDP messages contain packets that were sent one by one. It also checks for integrity at the arrival time.
    TCP messages make their way across the internet from one computer to another. UDP is not connection-based, so one program can send lots of packets to another.
    TCP rearranges data packets in the specific order. UDP protocol has n...

  • Answered Anonymously
  • Q3. What are the various components of a TCP segment header?
  • Ans. 

    Source port : 16 Bit number which identifies the Source Port number (Sending Computer's TCP Port).

    Destination port : 16 Bit number which identifies the Destination Port number (Receiving Port).

    Sequence number : 32 Bit number used for byte level numbering of TCP segments. If you are using TCP, each byte of data is assigned a sequence number. If SYN flag is set (during the initial three way handshake connection initiatio...

  • Answered Anonymously

Interview Preparation Tips

Eligibility criteriaAbove 7 CGPAJuniper Networks interview preparation:Topics to prepare for the interview - Data Structures, Algorithms, Networking, Aptitude, OOPSTime required to prepare for the interview - 5 monthsInterview preparation tips for other job seekers

Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.

Application resume tips for other job seekers

Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.

Final outcome of the interviewRejected

Skills evaluated in this interview

Interview Questionnaire 

10 Questions

  • Q1. Bit manipulation programs?
  • Q2. IP packet header and meaning of each field and usage of each field
  • Ans. 

    IP packet header fields and their usage

    • Version: indicates the IP version being used (IPv4 or IPv6)

    • Header Length: specifies the length of the IP header

    • Type of Service: used to prioritize packets

    • Total Length: specifies the total length of the IP packet

    • Identification: used to identify fragments of a larger packet

    • Flags: used to control fragmentation

    • Fragment Offset: used to reassemble fragmented packets

    • Time to Live: specifi...

  • Answered by AI
  • Q3. IP fragmentation
  • Q4. TCP packet header and meaning of each field and usage of each field
  • Ans. 

    TCP packet header fields and their usage

    • TCP packet header consists of 20 bytes

    • Fields include source and destination ports, sequence and acknowledgement numbers, flags, window size, and checksum

    • Source and destination ports identify the endpoints of the connection

    • Sequence and acknowledgement numbers are used for reliable data transfer

    • Flags indicate the purpose of the packet, such as SYN, ACK, FIN, RST

    • Window size is used ...

  • Answered by AI
  • Q5. Dictionary implementation program
  • Ans. 

    A program to implement a dictionary using an array of strings.

    • Use an array of strings to store the words and their definitions.

    • Implement functions to add, delete, and search for words.

    • Consider using a hash table for faster search times.

  • Answered by AI
  • Q6. Telephone directory implementation program
  • Ans. 

    Implement a telephone directory program using an array of strings.

    • Create an array of strings to store the directory

    • Implement functions to add, delete, and search for entries

    • Consider using a hash table for faster search times

    • Include error handling for invalid input

  • Answered by AI
  • Q7. Tcp Vs udp
  • Ans. 

    TCP is a reliable, connection-oriented protocol while UDP is a faster, unreliable, connectionless protocol.

    • TCP ensures data delivery and error checking while UDP does not.

    • TCP establishes a connection before data transfer while UDP does not.

    • TCP is used for applications that require reliable data transfer like email, file transfer, etc. while UDP is used for applications that require speed like online gaming, video strea

  • Answered by AI
  • Q8. Why security is important in a system?
  • Ans. 

    Security is important in a system to protect against unauthorized access, data breaches, and cyber attacks.

    • Prevents unauthorized access to sensitive data

    • Protects against data breaches and cyber attacks

    • Ensures confidentiality, integrity, and availability of data

    • Compliance with regulations and standards

    • Maintains trust and confidence of customers and stakeholders

  • Answered by AI
  • Q9. Level printing of a tree program
  • Ans. 

    Printing a tree in level order

    • Use a queue to store nodes in level order

    • Enqueue root node and print its value

    • Dequeue the node and enqueue its children

    • Repeat until queue is empty

  • Answered by AI
  • Q10. How do you swap two particular bits of an integer program?
  • Ans. 

    Swapping two particular bits of an integer program.

    • Use bitwise operators to get the values of the two bits to be swapped

    • Use XOR operator to swap the bits

    • Shift the bits back to their original positions

    • Example: Swapping 2nd and 5th bits of 8 (1000) gives 32 (100000)

    • Example code: num ^= (1 << bit1) | (1 << bit2);

  • Answered by AI

Skills evaluated in this interview

Jasmin Infotech Interview FAQs

How many rounds are there in Jasmin Infotech Support Staff interview?
Jasmin Infotech interview process usually has 1 rounds. The most common rounds in the Jasmin Infotech interview process are HR.

Tell us how to improve this page.

Jasmin Infotech Support Staff Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
LTIMindtree Interview Questions
3.8
 • 3k Interviews
Mphasis Interview Questions
3.4
 • 805 Interviews
Cisco Interview Questions
4.1
 • 396 Interviews
KPIT Technologies Interview Questions
3.4
 • 294 Interviews
View all
Senior Systems Engineer
251 salaries
unlock blur

₹5 L/yr - ₹18 L/yr

System Engineer
170 salaries
unlock blur

₹2.9 L/yr - ₹7.9 L/yr

Test Engineer
99 salaries
unlock blur

₹1.6 L/yr - ₹7.1 L/yr

Principal Engineer
97 salaries
unlock blur

₹7.6 L/yr - ₹20.1 L/yr

Validation Engineer
73 salaries
unlock blur

₹4.3 L/yr - ₹6 L/yr

Explore more salaries
Compare Jasmin Infotech with

HCLTech

3.5
Compare

TCS

3.7
Compare

Wipro

3.7
Compare

Tech Mahindra

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview