Filter interviews by
I applied via Campus Placement and was interviewed in Aug 2024. There were 9 interview rounds.
The ISO model, also known as OSI model, is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The ISO model stands for International Organization for Standardization model.
It helps in understanding how different networking protocols work together.
Each layer in the model has specific functions and interacts with adjacent layers.
Examples of layers include p...
Fat 16 has a maximum volume size of 2GB and a maximum file size of 2GB, while Fat 32 has a maximum volume size of 2TB and a maximum file size of 4GB.
Fat 16 has a maximum volume size of 2GB, while Fat 32 has a maximum volume size of 2TB.
Fat 16 has a maximum file size of 2GB, while Fat 32 has a maximum file size of 4GB.
Fat 16 uses 16-bit file allocation table entries, while Fat 32 uses 32-bit file allocation table entrie...
IP stands for Internet Protocol. It is a set of rules that governs the format of data sent over the internet.
IP is a unique address assigned to each device connected to a network.
There are two versions of IP - IPv4 and IPv6.
IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses.
IPv6 uses a 128-bit address scheme allowing for a total of 2^128 addresses.
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.
IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
IPv4 supports around 4.3 billion unique addresses, while IPv6 supports an astronomical number of unique addresses (2^128).
IPv4 uses ARP (Address Resolution Protocol) for mapping IP addresses to M...
Loopback IP is a special IP address used to send data back to the same device for testing and troubleshooting purposes.
Loopback IP address is 127.0.0.1 in IPv4 and ::1 in IPv6
It is often used for testing network connectivity on a device without needing an external network
Loopback IP is commonly used in troubleshooting network issues
Subletting is the act of a tenant renting out all or part of a rented property to another party.
Subletting involves the original tenant renting out the property to a subtenant.
The subtenant pays rent to the original tenant, who in turn pays rent to the landlord.
Subletting may require permission from the landlord, depending on the terms of the lease agreement.
The original tenant remains responsible for the lease agreeme
Hub broadcasts data to all devices, while switch forwards data only to the intended device.
Hub operates at physical layer, while switch operates at data link layer.
Hub is a passive device, while switch is an active device.
Hub has one collision domain, while switch has multiple collision domains.
Hub is slower than switch in data transmission.
Example: Hub - Ethernet Hub, Switch - Ethernet Switch
Types of network cables include Ethernet cables, fiber optic cables, and coaxial cables.
Ethernet cables are commonly used for wired networks, with categories like Cat5e, Cat6, and Cat7.
Fiber optic cables use light to transmit data and are known for high speed and long distance capabilities.
Coaxial cables are often used for cable TV and internet connections, with RG6 and RG59 being common types.
Protocol is a set of rules that governs the communication between devices in a network.
Protocol defines the format, timing, sequencing, and error checking of data transmission.
Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.
Protocols ensure that devices can communicate effectively and understand each other's data.
Topology refers to the arrangement of various elements in a network, including nodes and connecting lines.
Topology defines how devices are connected in a network
Common topologies include bus, ring, star, mesh, and hybrid
Each topology has its own advantages and disadvantages
Examples: Bus topology - all devices connected to a single cable; Star topology - all devices connected to a central hub
A cross cable is used to connect two similar devices, like two computers or two switches, directly without the need for a hub or switch.
Used to connect similar devices directly
Does not require a hub or switch in between
Commonly used for connecting two computers or two switches
Straight cables are used to connect a computer to a switch or router.
Straight cables are used to connect a computer to a switch or router
They have the same pin layout on both ends
Examples include connecting a computer to a network switch or router
A MAC address is a unique identifier assigned to network interfaces for communications on a network.
MAC stands for Media Access Control.
It is a 48-bit address typically written as six groups of two hexadecimal digits separated by colons or hyphens.
MAC addresses are used to uniquely identify devices on a network.
They are assigned by the manufacturer and are usually hardcoded into the network interface hardware.
Example:
Troubleshooting network issues involves identifying, isolating, and resolving connectivity problems.
Start by checking physical connections and cables
Use network monitoring tools to identify any issues
Check network configurations and settings
Isolate the issue by testing connectivity with different devices
Update firmware and software as needed
Consider potential interference from other devices or networks
Consult with coll...
To create a shared file, you can use a file sharing service or set up a shared network drive.
Use a file sharing service like Google Drive, Dropbox, or OneDrive
Set up a shared network drive on a server or NAS device
Assign permissions to users to access the shared file
Subnetmask is a 32-bit number used to divide an IP address into network and host portions.
Subnetmask is used in conjunction with IP addresses to determine the network and host portions of an address.
It is represented in decimal format (e.g. 255.255.255.0) or CIDR notation (e.g. /24).
Subnetmask helps in routing packets to the correct destination within a network.
It is essential for creating subnets within a larger netwo
Types of NIC include Ethernet, Wi-Fi, and Bluetooth. MAC address is a unique identifier assigned to network interfaces for communication.
Types of NIC: Ethernet, Wi-Fi, Bluetooth
MAC address is a unique identifier for network interfaces
MAC address is a 48-bit hexadecimal number
MAC address is assigned by the manufacturer
Firmware is a type of software that is embedded into hardware devices to control their basic functions.
Firmware is a specific type of software that is designed to control the hardware it is embedded in.
It is stored in non-volatile memory, such as ROM or flash memory.
Firmware is responsible for booting up the hardware device and providing basic functionality.
Examples of firmware include BIOS in computers, firmware in ro
I applied via Naukri.com and was interviewed in Mar 2023. There were 3 interview rounds.
I applied via Approached by Company and was interviewed before Aug 2023. There were 2 interview rounds.
My notice period is 30 days.
My notice period is 30 days.
I am required to give a 30-day notice before leaving my current position.
I need to work for 30 more days before I can leave my current job.
What people are saying about Konverge Technologies
posted on 6 Jan 2023
I applied via Approached by Company and was interviewed in Mar 2022. There were 4 interview rounds.
Konverge Technologies interview questions for popular designations
I applied via Naukri.com and was interviewed before Jun 2023. There was 1 interview round.
Goods return entry is the process of recording the return of goods from a customer in the accounting system.
Goods return entry involves debiting the sales returns account and crediting the accounts receivable account.
It is important to document the reason for the return and the condition of the goods returned.
The entry should also include any applicable taxes or fees associated with the return.
Example: Debit Sales Retu
I applied via Approached by Company and was interviewed in Mar 2022. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Jan 2022. There were 2 interview rounds.
UTP stands for Unshielded Twisted Pair cable, which is a type of copper cable used in networking.
UTP cables are commonly used in Ethernet networks
They come in different categories such as Cat5, Cat6, and Cat7
UTP cables have four pairs of twisted wires that help reduce interference
They are cheaper and easier to install compared to shielded cables
There are different types of fiber cables such as single-mode, multimode, and plastic optical fiber (POF).
Single-mode fiber cable has a smaller core and is used for long-distance communication.
Multimode fiber cable has a larger core and is used for shorter distances.
Plastic optical fiber (POF) is used for short-distance communication and is cheaper than other types of fiber cables.
Fiber cables can also be categorized b...
I applied via Naukri.com and was interviewed before Jul 2021. There were 2 interview rounds.
Palindrome code should be designed to check if a given string is the same forwards and backwards.
Create a function that takes a string as input
Remove any spaces and punctuation from the string
Reverse the string and compare it to the original string to check if it is a palindrome
Interview experience
based on 68 reviews
Rating in categories
7-8 Yrs
₹ 22-24 LPA
Network Engineer
47
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Desktop Support Engineer
38
salaries
| ₹2 L/yr - ₹3.5 L/yr |
Network Security Engineer
17
salaries
| ₹3 L/yr - ₹9.8 L/yr |
HR Executive
15
salaries
| ₹2.5 L/yr - ₹3.3 L/yr |
System Administrator
11
salaries
| ₹3 L/yr - ₹5.2 L/yr |
TCS
Infosys
Wipro
HCLTech