Filter interviews by
I applied via Campus Placement and was interviewed in Aug 2024. There were 9 interview rounds.
The ISO model, also known as OSI model, is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The ISO model stands for International Organization for Standardization model.
It helps in understanding how different networking protocols work together.
Each layer in the model has specific functions and interacts with adjacent layers.
Examples of layers include p...
Fat 16 has a maximum volume size of 2GB and a maximum file size of 2GB, while Fat 32 has a maximum volume size of 2TB and a maximum file size of 4GB.
Fat 16 has a maximum volume size of 2GB, while Fat 32 has a maximum volume size of 2TB.
Fat 16 has a maximum file size of 2GB, while Fat 32 has a maximum file size of 4GB.
Fat 16 uses 16-bit file allocation table entries, while Fat 32 uses 32-bit file allocation table entrie...
IP stands for Internet Protocol. It is a set of rules that governs the format of data sent over the internet.
IP is a unique address assigned to each device connected to a network.
There are two versions of IP - IPv4 and IPv6.
IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses.
IPv6 uses a 128-bit address scheme allowing for a total of 2^128 addresses.
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.
IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
IPv4 supports around 4.3 billion unique addresses, while IPv6 supports an astronomical number of unique addresses (2^128).
IPv4 uses ARP (Address Resolution Protocol) for mapping IP addresses to M...
Loopback IP is a special IP address used to send data back to the same device for testing and troubleshooting purposes.
Loopback IP address is 127.0.0.1 in IPv4 and ::1 in IPv6
It is often used for testing network connectivity on a device without needing an external network
Loopback IP is commonly used in troubleshooting network issues
Subletting is the act of a tenant renting out all or part of a rented property to another party.
Subletting involves the original tenant renting out the property to a subtenant.
The subtenant pays rent to the original tenant, who in turn pays rent to the landlord.
Subletting may require permission from the landlord, depending on the terms of the lease agreement.
The original tenant remains responsible for the lease agreeme
Hub broadcasts data to all devices, while switch forwards data only to the intended device.
Hub operates at physical layer, while switch operates at data link layer.
Hub is a passive device, while switch is an active device.
Hub has one collision domain, while switch has multiple collision domains.
Hub is slower than switch in data transmission.
Example: Hub - Ethernet Hub, Switch - Ethernet Switch
Types of network cables include Ethernet cables, fiber optic cables, and coaxial cables.
Ethernet cables are commonly used for wired networks, with categories like Cat5e, Cat6, and Cat7.
Fiber optic cables use light to transmit data and are known for high speed and long distance capabilities.
Coaxial cables are often used for cable TV and internet connections, with RG6 and RG59 being common types.
Protocol is a set of rules that governs the communication between devices in a network.
Protocol defines the format, timing, sequencing, and error checking of data transmission.
Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.
Protocols ensure that devices can communicate effectively and understand each other's data.
Topology refers to the arrangement of various elements in a network, including nodes and connecting lines.
Topology defines how devices are connected in a network
Common topologies include bus, ring, star, mesh, and hybrid
Each topology has its own advantages and disadvantages
Examples: Bus topology - all devices connected to a single cable; Star topology - all devices connected to a central hub
A cross cable is used to connect two similar devices, like two computers or two switches, directly without the need for a hub or switch.
Used to connect similar devices directly
Does not require a hub or switch in between
Commonly used for connecting two computers or two switches
Straight cables are used to connect a computer to a switch or router.
Straight cables are used to connect a computer to a switch or router
They have the same pin layout on both ends
Examples include connecting a computer to a network switch or router
A MAC address is a unique identifier assigned to network interfaces for communications on a network.
MAC stands for Media Access Control.
It is a 48-bit address typically written as six groups of two hexadecimal digits separated by colons or hyphens.
MAC addresses are used to uniquely identify devices on a network.
They are assigned by the manufacturer and are usually hardcoded into the network interface hardware.
Example:
Troubleshooting network issues involves identifying, isolating, and resolving connectivity problems.
Start by checking physical connections and cables
Use network monitoring tools to identify any issues
Check network configurations and settings
Isolate the issue by testing connectivity with different devices
Update firmware and software as needed
Consider potential interference from other devices or networks
Consult with coll...
To create a shared file, you can use a file sharing service or set up a shared network drive.
Use a file sharing service like Google Drive, Dropbox, or OneDrive
Set up a shared network drive on a server or NAS device
Assign permissions to users to access the shared file
Subnetmask is a 32-bit number used to divide an IP address into network and host portions.
Subnetmask is used in conjunction with IP addresses to determine the network and host portions of an address.
It is represented in decimal format (e.g. 255.255.255.0) or CIDR notation (e.g. /24).
Subnetmask helps in routing packets to the correct destination within a network.
It is essential for creating subnets within a larger netwo
Types of NIC include Ethernet, Wi-Fi, and Bluetooth. MAC address is a unique identifier assigned to network interfaces for communication.
Types of NIC: Ethernet, Wi-Fi, Bluetooth
MAC address is a unique identifier for network interfaces
MAC address is a 48-bit hexadecimal number
MAC address is assigned by the manufacturer
Firmware is a type of software that is embedded into hardware devices to control their basic functions.
Firmware is a specific type of software that is designed to control the hardware it is embedded in.
It is stored in non-volatile memory, such as ROM or flash memory.
Firmware is responsible for booting up the hardware device and providing basic functionality.
Examples of firmware include BIOS in computers, firmware in ro
Top trending discussions
I applied via Company Website and was interviewed before Dec 2020. There were 4 interview rounds.
I applied via Referral and was interviewed before Jan 2021. There was 1 interview round.
I applied via Campus Placement and was interviewed before Feb 2021. There were 3 interview rounds.
Aptitude round consists Logical reasoning, General Aptitude, Grammar related questions etc. All are moderate level questions.
OOPs is a programming paradigm that uses objects to represent real-world entities. Java is an OOPs language.
OOPs stands for Object-Oriented Programming System
Java is a class-based OOPs language
Encapsulation, Inheritance, Polymorphism, and Abstraction are the four pillars of OOPs
Objects have state and behavior
Java supports interfaces, which allow for multiple inheritance
Example: A car can be represented as an object wit...
Java solves machine dependency by using bytecode and virtual machine.
Java code is compiled into bytecode which is platform-independent
The bytecode is executed by the Java Virtual Machine (JVM) which is platform-specific
JVM translates bytecode into machine code for the specific platform
This allows Java code to run on any platform with a JVM installed
Example: A Java program compiled on Windows can run on Linux or Mac as
I applied via Campus Placement and was interviewed before May 2021. There were 2 interview rounds.
Numerical ability and logical reasoning followed by some coding mcqs
Printing 1 to 100 without for loop
Use recursion to print numbers from 1 to 99
Print 100 outside the recursion
Use a base case to stop recursion at 100
I applied via Campus Placement and was interviewed before Jun 2021. There were 2 interview rounds.
Simple aptitude test
I applied via Company Website and was interviewed before Jul 2021. There were 2 interview rounds.
Attended the codevita competition in final year of college.
I applied via Campus Placement and was interviewed before Aug 2021. There were 2 interview rounds.
It was a basic aptitude test.
I applied via Campus Placement and was interviewed before Jun 2021. There were 2 interview rounds.
I applied via Campus Placement and was interviewed before May 2021. There were 2 interview rounds.
- basic programming on C
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Network Engineer
48
salaries
| ₹0 L/yr - ₹0 L/yr |
Desktop Support Engineer
39
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Security Engineer
16
salaries
| ₹0 L/yr - ₹0 L/yr |
HR Executive
15
salaries
| ₹0 L/yr - ₹0 L/yr |
Business Development Executive
11
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech