Add office photos
Engaged Employer

Motadata

3.5
based on 35 Reviews
Filter interviews by

10+ eGlobal HR Solutions Interview Questions and Answers

Updated 17 Sep 2024

Q1. How to check running process in Linux?

Ans.

To check running processes in Linux, use the 'ps' command.

  • Open the terminal and type 'ps' followed by any options or arguments.

  • Use 'ps aux' to display all running processes with detailed information.

  • Use 'ps -ef' to display all running processes with full information.

  • Use 'top' command to display real-time information about running processes.

  • Use 'htop' command to display running processes in a more user-friendly way.

  • Use 'pgrep' command to find the process ID of a running proces...read more

Add your answer

Q2. How to kill the process in Linux?

Ans.

To kill a process in Linux, you can use the 'kill' command followed by the process ID (PID) or the 'pkill' command followed by the process name.

  • Use the 'kill' command followed by the PID to terminate a specific process

  • Use the 'pkill' command followed by the process name to kill all processes with that name

  • You can send different signals to the process using the '-s' option with the 'kill' command

  • To forcefully kill a process, use the '-9' option with the 'kill' command

View 1 answer

Q3. How to change the ownership in Linux?

Ans.

To change ownership in Linux, use the chown command followed by the new owner and file/directory name.

  • Use the chown command followed by the new owner and file/directory name

  • To change ownership of a directory and its contents, use the -R option

  • To change group ownership, use the chgrp command

Add your answer

Q4. What is File System in Linux?

Ans.

File System in Linux is the way files are organized and stored on a Linux system.

  • File System is responsible for managing files and directories on a Linux system

  • It provides a hierarchical structure for organizing files and directories

  • The root directory is denoted by / and all other directories are subdirectories of the root directory

  • Different types of file systems are supported in Linux such as ext4, NTFS, FAT32, etc.

  • Commands like ls, cd, mkdir, rmdir, etc. are used to interac...read more

Add your answer
Discover eGlobal HR Solutions interview dos and don'ts from real experiences

Q5. How to check IP in Linux?

Ans.

To check IP in Linux, use the command 'ifconfig' or 'ip addr show'

  • Open the terminal and type 'ifconfig' or 'ip addr show'

  • Look for the IP address under the network interface section

  • Alternatively, use the command 'hostname -I' to display the IP address only

Add your answer

Q6. Explain SNMPWALK and all the versions of SNMP

Ans.

SNMPWALK is a tool used to retrieve information from SNMP-enabled devices. There are three versions of SNMP: SNMPv1, SNMPv2c, and SNMPv3.

  • SNMPWALK is a command-line tool used to retrieve information from SNMP-enabled devices.

  • It works by sending a series of SNMP GETNEXT requests to the device, starting at the root of the MIB tree.

  • SNMPv1 is the original version of SNMP and is the most widely supported. It uses community strings for authentication.

  • SNMPv2c is an updated version of...read more

Add your answer
Are these interview questions helpful?

Q7. What is WMI in Windows?

Ans.

WMI stands for Windows Management Instrumentation, a set of tools used to manage and monitor Windows systems.

  • WMI provides a standardized way for administrators to access and manage system information, configuration data, and performance statistics.

  • It can be used to remotely manage and monitor Windows systems, as well as automate administrative tasks.

  • WMI uses a query language called WQL (WMI Query Language) to retrieve information from the system.

  • Examples of tasks that can be ...read more

Add your answer

Q8. What are permissions in Linux?

Ans.

Permissions in Linux determine the access level of users and processes to files and directories.

  • There are three types of permissions: read, write, and execute.

  • Permissions are set for three types of users: owner, group, and others.

  • Permissions can be viewed and modified using the chmod command.

  • Examples of permission settings: 755 (rwxr-xr-x) for directories, 644 (rw-r--r--) for files.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is QA's main work ? What is different b/t bug & error?

Ans.

QA's main work is to ensure quality of software by testing and identifying bugs and errors.

  • QA's main work is to test software and identify bugs and errors

  • They ensure that the software meets the requirements and specifications

  • Bugs are coding mistakes that cause unexpected behavior

  • Errors are mistakes made by the user that cause the software to fail

  • QA engineers use various testing techniques to identify and report bugs and errors

Add your answer

Q10. System design : ATM machine using the best principals

Ans.

Design an ATM machine system using best principles

  • Use a layered architecture with separate components for UI, business logic, and data access

  • Implement security measures such as encryption for sensitive data

  • Include error handling and logging mechanisms for tracking and resolving issues

  • Design for scalability and performance to handle high volumes of transactions

  • Consider user experience and accessibility in the design

Add your answer

Q11. How hash fucntion is working in java?

Ans.

Hash functions in Java are used to convert an input into a fixed-size string of bytes, typically for data retrieval and security purposes.

  • Hash functions take an input (or 'key') and return a fixed-size string of bytes, known as the hash value.

  • In Java, the hashCode() method is commonly used to generate hash codes for objects.

  • Hash functions are used in data structures like HashMap to efficiently store and retrieve key-value pairs.

Add your answer

Q12. What is hash function in java?

Ans.

Hash function in Java is a function that converts an input (or 'key') into a unique numerical value, which is used to index data in hash tables.

  • Hash functions are used to quickly retrieve data in hash tables by converting keys into unique numerical values.

  • In Java, hash functions are commonly used in HashMap and HashSet to store and retrieve key-value pairs efficiently.

  • Examples of hash functions in Java include hashCode() method in Object class and MessageDigest class for cryp...read more

Add your answer

Q13. Difference between 4g and 5g

Ans.

5G is the next generation of mobile network technology, offering faster speeds, lower latency, and increased capacity compared to 4G.

  • 5G offers significantly faster download and upload speeds compared to 4G.

  • 5G has lower latency, meaning faster response times for data transmission.

  • 5G can support a larger number of connected devices in a given area compared to 4G.

  • 5G enables new technologies such as IoT, AR/VR, and autonomous vehicles that require high-speed, low-latency connecti...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at eGlobal HR Solutions

based on 7 interviews
Interview experience
4.3
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.2
 • 361 Interview Questions
3.9
 • 340 Interview Questions
3.8
 • 299 Interview Questions
3.8
 • 205 Interview Questions
3.6
 • 184 Interview Questions
View all
Top Motadata Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter