Filter interviews by
I applied via LinkedIn and was interviewed in Nov 2024. There were 3 interview rounds.
Technology encompasses a wide range of tools, systems, and processes used to solve problems and achieve goals.
Technology includes hardware, software, networks, and telecommunications.
It is constantly evolving and improving to meet the needs of users.
Examples of technology include smartphones, computers, artificial intelligence, and cloud computing.
The case study involved troubleshooting a complex technical issue for a high-profile client.
Identifying the root cause of the issue
Collaborating with cross-functional teams to find a solution
Implementing and testing the solution
Providing ongoing support and monitoring for any further issues
Top trending discussions
posted on 29 Jul 2022
I applied via Recruitment Consulltant and was interviewed in Jun 2022. There were 3 interview rounds.
The role of a Cloud Support Engineer involves providing technical support to customers using cloud services, troubleshooting issues, and ensuring smooth operation of cloud infrastructure.
Provide technical support to customers using cloud services
Troubleshoot issues related to cloud infrastructure
Ensure smooth operation of cloud services
Collaborate with cross-functional teams to resolve technical issues
Document and comm
posted on 6 Jan 2025
Major incident management involves identifying, prioritizing, and resolving critical issues to minimize impact on business operations.
Establish a clear process for reporting and escalating major incidents.
Prioritize incidents based on impact and urgency to ensure timely resolution.
Communicate effectively with stakeholders to provide updates on incident status and resolution.
Document incidents and resolutions for future...
SLA is a formal agreement between a service provider and a customer, while OLA is an agreement between different teams within the same organization.
SLA is between a service provider and a customer, outlining the services provided, quality, responsibilities, etc.
OLA is between different teams within the same organization, defining the interdependent relationships and responsibilities.
SLA is external, OLA is internal.
SLA...
posted on 7 Aug 2024
3 Coding question- 1 easy, 2 medium
To list files, use command line tools like ls or dir.
Use 'ls' command in Unix/Linux systems to list files in a directory
Use 'dir' command in Windows systems to list files in a directory
Add options like -l for detailed listing or -a to show hidden files
Use wildcards like * to filter files based on patterns
grep is a basic pattern matching tool, while egrep is an extended version with more advanced pattern matching capabilities.
grep is a basic command-line utility for searching plain-text data sets for lines that match a regular expression pattern.
egrep is an extended version of grep that supports more advanced regular expression patterns.
egrep is equivalent to grep -E, which enables extended regular expressions.
egrep is ...
posted on 24 Sep 2023
I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where the pair will be stored.
If multiple key-value pairs hash to the same index, they are stored in a linked list at that index.
To retrieve a value...
HashMap is not thread-safe while ConcurrentHashMap is thread-safe.
HashMap is not thread-safe and can lead to ConcurrentModificationException if modified while iterating.
ConcurrentHashMap allows concurrent modifications without the need for external synchronization.
ConcurrentHashMap achieves thread-safety by dividing the map into segments, allowing multiple threads to operate on different segments concurrently.
Concurren...
No, main method in Java cannot be overridden.
Main method is a static method of a class and cannot be overridden.
Subclasses can have their own main method, but it will not be considered as the entry point of the program.
Example: public class SubClass extends MainClass { public static void main(String[] args) { // This is not the entry point of the program }}
Use the 'ls' command with the '-a' flag to find hidden files in Unix.
Use the command 'ls -a' to list all files, including hidden files.
Hidden files in Unix start with a dot (.) before the file name.
Example: 'ls -a' will display all files, including hidden files.
Use the sed command to replace a string in Unix
Use the following syntax: sed 's/original_string/new_string/g' filename
The 's' flag stands for substitute, 'g' flag stands for global (replace all occurrences)
Example: sed 's/hello/goodbye/g' file.txt
Senior Technical Consultant
6
salaries
| ₹10.6 L/yr - ₹26.7 L/yr |
Technical Consultant
5
salaries
| ₹9 L/yr - ₹16.5 L/yr |
Site Reliability Engineer
5
salaries
| ₹3.5 L/yr - ₹10 L/yr |
Associate Consultant
4
salaries
| ₹4 L/yr - ₹6 L/yr |
Associate Software Developer
4
salaries
| ₹3.5 L/yr - ₹4.4 L/yr |
Flipkart
Amazon
Reliance Industries
Tata Group