Faster and better experience!
Filter interviews by
I applied via Referral and was interviewed before Apr 2023. There was 1 interview round.
TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is a set of rules governing the exchange of data over the internet.
TCP/IP is a suite of communication protocols used to connect devices on the internet.
It provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received.
TCP ensures that data is reliably transmitted between devices, while IP...
Network topology refers to the layout of a network and how different nodes are connected.
Types include star, bus, ring, mesh, and hybrid topologies
Star topology has a central hub with nodes connected to it
Bus topology uses a single cable that all nodes connect to
Ring topology connects nodes in a circular fashion
Mesh topology has every node connected to every other node
Hybrid topology is a combination of two or more dif
Cybersecurity is essential to protect sensitive data, prevent cyber attacks, ensure privacy, and maintain trust in digital systems.
Prevents unauthorized access to sensitive data
Protects against cyber attacks such as malware, ransomware, and phishing
Ensures privacy of personal and confidential information
Maintains trust in digital systems and online transactions
Helps organizations comply with regulations and standards l
Cybersecurity attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's data and demands payment for decryption.
DDoS attacks: flooding a network or server wi...
I applied via Recruitment Consulltant and was interviewed before Apr 2023. There was 1 interview round.
A LAN network is a local area network that connects computers and devices within a limited area such as a home, office, or school.
LAN networks are typically used for sharing resources like printers, files, and internet connections within a small area.
LAN networks are usually faster and more secure than wide area networks (WANs).
Examples of LAN network technologies include Ethernet, Wi-Fi, and Token Ring.
HDCP (High-bandwidth Digital Content Protection) is a form of digital copy protection that prevents unauthorized duplication of content.
Ensure that both the source device (e.g. Blu-ray player) and the display device (e.g. TV) support HDCP.
Use HDMI cables that are HDCP compliant.
Check the settings on both devices to enable HDCP if necessary.
If HDCP errors occur, try power cycling both devices and ensuring all connection...
I applied via Approached by Company and was interviewed before May 2021. There were 2 interview rounds.
posted on 12 Mar 2022
I applied via Job Fair and was interviewed before Mar 2021. There were 3 interview rounds.
In this round, we have questions from time relation, blood relation, programming questions. Around 45 questions in 30 minutes,
In this round, we have two programming questions. Both are hacker rank easy to medium level.
posted on 10 May 2020
I applied via Recruitment Consultant and was interviewed in Apr 2020. There were 4 interview rounds.
posted on 20 May 2021
I applied via Referral and was interviewed in Nov 2020. There were 4 interview rounds.
Math , gk, english
AI
I applied via Campus Placement and was interviewed in Feb 2023. There were 2 interview rounds.
Tuples are immutable sequences of elements. A string can be converted to a tuple using the tuple() function.
Tuples are similar to lists but are immutable
Elements of a tuple are enclosed in parentheses ()
A string can be converted to a tuple using the tuple() function
Each character in the string becomes an element in the tuple
Left join is a type of join operation in SQL that returns all the rows from the left table and matching rows from the right table.
Left join is performed using the 'left join' keyword in SQL
In Python, left join can be performed using the 'merge' function from the pandas library
Syntax: pd.merge(left_dataframe, right_dataframe, how='left', on='key_column')
Example: pd.merge(df1, df2, how='left', on='id')
HashMap is a data structure that stores key-value pairs and provides constant time complexity for basic operations.
HashMap allows quick access to values based on their keys
Keys must be unique and values can be duplicated
HashMap is not thread-safe and requires synchronization for concurrent access
Java's HashMap implementation uses hashing to distribute keys across buckets
posted on 16 Nov 2021
I applied via Referral and was interviewed in Oct 2021. There was 1 interview round.
based on 3 interviews
Interview experience
based on 32 reviews
Rating in categories
Help Desk Engineer
115
salaries
| ₹1 L/yr - ₹3.5 L/yr |
Network Engineer
103
salaries
| ₹1.4 L/yr - ₹4.8 L/yr |
Network Support Engineer
90
salaries
| ₹1.4 L/yr - ₹4.3 L/yr |
IT Helpdesk Engineer
72
salaries
| ₹1 L/yr - ₹3.5 L/yr |
Helpdesk Support Engineer
38
salaries
| ₹1.9 L/yr - ₹3.2 L/yr |
Saama Technologies
Jumio
DISYS
Data-Core Systems