i
Filter interviews by
Effective strategies for balancing work and personal life include setting boundaries, prioritizing tasks, and practicing self-care.
Set clear boundaries: Define work hours and stick to them to avoid burnout. For example, avoid checking emails after 6 PM.
Prioritize tasks: Use tools like the Eisenhower Matrix to distinguish between urgent and important tasks, ensuring focus on what truly matters.
Practice self-care: E...
Exceptions in Java are events that disrupt the normal flow of program execution, allowing for error handling.
Java uses a robust exception handling mechanism with try, catch, and finally blocks.
There are two main types of exceptions: checked exceptions (e.g., IOException) and unchecked exceptions (e.g., NullPointerException).
Checked exceptions must be either caught or declared in the method signature using 'throws'...
A palindrome is a string that reads the same forwards and backwards, such as 'racecar' or 'level'.
Definition: A palindrome is a word, phrase, or sequence that is the same when read forwards and backwards. Example: 'madam'.
Character Ignoring: Palindromes can ignore spaces, punctuation, and capitalization. Example: 'A man, a plan, a canal, Panama!'
Even and Odd Lengths: Palindromes can have even or odd lengths. Examp...
STL MAPS are associative containers that store elements formed by a combination of a key value and a mapped value.
STL MAPS are implemented as red-black trees for efficient searching, insertion, and deletion.
Elements in a map are always sorted based on the key value.
Example: std::map<int, string> myMap; myMap[1] = 'one';
Netcracker is a leading provider of BSS, OSS, and SDN/NFV solutions for service providers around the world.
Netcracker offers comprehensive solutions for business support systems (BSS), operations support systems (OSS), and software-defined networking (SDN) / network functions virtualization (NFV).
Netcracker has a strong track record of working with major service providers globally, including telecommunications com...
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Polymorphism allows for flexibility and reusability in code.
It enables a single interface to be used for different data types or classes.
Examples include method overriding in inheritance and method overloading within a class.
Memory leaks occur when a program fails to release memory it no longer needs, leading to inefficient memory usage.
Memory leaks can occur when a program dynamically allocates memory but forgets to deallocate it.
Common causes of memory leaks include not freeing memory after use, using incorrect deallocation functions, and circular references.
Memory leaks can lead to performance issues, crashes, and system instabilit...
I harden my Linux server by implementing security measures to protect against potential threats.
Regularly update the operating system and software to patch vulnerabilities
Disable unnecessary services and ports to reduce attack surface
Implement strong password policies and use SSH keys for authentication
Set up a firewall to control incoming and outgoing traffic
Monitor logs for suspicious activities and set up intru...
Script to echo a line repeatedly
Use a loop to echo the line multiple times
Specify the number of times to repeat the line
Example: for i in {1..5}; do echo 'Hello, World!'; done
One performance tuning parameter is swappiness, which controls how often the system swaps data to disk.
To set swappiness temporarily, use the 'sysctl' command: sysctl vm.swappiness=10
To set swappiness permanently, edit the '/etc/sysctl.conf' file and add 'vm.swappiness=10'
Another performance tuning parameter is 'dirty_ratio' which controls the percentage of system memory that can be filled with dirty pages before ...
I appeared for an interview in Jan 2025.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Polymorphism allows for flexibility and reusability in code.
It enables a single interface to be used for different data types or classes.
Examples include method overriding in inheritance and method overloading within a class.
A double linked list allows traversal in both directions, enhancing flexibility in data manipulation.
A double linked list consists of nodes, each containing data and two pointers (next and previous).
Example of a node structure in C++: struct Node { int data; Node* next; Node* prev; };
Insertion can be done at the beginning, end, or any specific position by adjusting pointers.
Example of insertion at the beginning: newNod...
Basic OOPS, OS, Output related MCQs
2 medium level codes in a time frame of 1 hour, mostly oops related or array/string
Double array real life example: storing student names in different classes
Each index of the main array represents a different class
Each sub-array contains the names of students in that class
Example: [['Alice', 'Bob'], ['Charlie', 'David']]
I am a detail-oriented software engineer with a passion for problem-solving and continuous learning.
Detail-oriented
Passionate about problem-solving
Continuous learner
I appeared for an interview in Jan 2025.
I harden my Linux server by implementing security measures to protect against potential threats.
Regularly update the operating system and software to patch vulnerabilities
Disable unnecessary services and ports to reduce attack surface
Implement strong password policies and use SSH keys for authentication
Set up a firewall to control incoming and outgoing traffic
Monitor logs for suspicious activities and set up intrusion ...
Script to echo a line repeatedly
Use a loop to echo the line multiple times
Specify the number of times to repeat the line
Example: for i in {1..5}; do echo 'Hello, World!'; done
sed command is used for text manipulation in Linux. Special permissions include setuid, setgid, and sticky bit.
sed command is used for text substitution and manipulation in Linux
Syntax: sed 's/pattern/replacement/g' filename
Special permissions in Linux include setuid, setgid, and sticky bit
Setuid: allows a user to execute a file with the permissions of the file owner
Setgid: allows a user to execute a file with the perm...
To get MAC based routing table, use 'ip neigh show' command. When pinging a server, kernel sends ICMP packets and updates ARP cache.
Use 'ip neigh show' command to display MAC based routing table
Kernel sends ICMP packets when pinging a server
Kernel updates ARP cache with MAC address of the server
One performance tuning parameter is swappiness, which controls how often the system swaps data to disk.
To set swappiness temporarily, use the 'sysctl' command: sysctl vm.swappiness=10
To set swappiness permanently, edit the '/etc/sysctl.conf' file and add 'vm.swappiness=10'
Another performance tuning parameter is 'dirty_ratio' which controls the percentage of system memory that can be filled with dirty pages before proce...
To check WWN number, use commands like 'lsscsi' or 'lsblk' in Linux.
Use 'lsscsi' command to list SCSI devices and their WWN numbers
Use 'lsblk' command to list block devices and their WWN numbers
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
Experienced Change Analyst with a strong background in process improvement and stakeholder engagement, driving successful organizational change.
Over 7 years of experience in change management across various industries, including IT and healthcare.
Led a successful change initiative that improved project delivery time by 30% through effective stakeholder communication.
Skilled in using change management frameworks like AD...
A change request is a formal proposal to modify any aspect of a project or system, often requiring approval.
Initiated when stakeholders identify a need for change.
Can involve changes in scope, budget, or timeline.
Example: A software update request to fix bugs or add features.
Requires assessment of impact on project deliverables.
Must be documented and approved through a change control process.
The release process in SDLC involves planning, scheduling, and controlling the build, testing, and deployment of software.
1. Planning: Define the scope and objectives of the release, including timelines and resources needed.
2. Build: Compile the code and create the software package that will be released.
3. Testing: Conduct various tests (unit, integration, system) to ensure the software meets quality standards.
4. Deplo...
The change life cycle outlines the stages of managing change within an organization effectively.
1. Identification: Recognizing the need for change, such as declining sales or new regulations.
2. Planning: Developing a strategy for implementing the change, including timelines and resources.
3. Implementation: Executing the change plan, such as introducing new software or processes.
4. Monitoring: Tracking the progress and ...
I would prioritize communication, assess risks, and seek approval before proceeding with any change.
Assess the situation: Understand the urgency and impact of the change.
Communicate: Inform relevant stakeholders about the proposed change.
Document: Keep a record of the request and any communications.
Seek approval: Always aim to get formal approval before implementing changes.
Example: If a system update is needed urgentl...
Yes, I am ITIL certified, which has equipped me with best practices for IT service management and process improvement.
ITIL certification enhances my understanding of service lifecycle management.
It provides frameworks for aligning IT services with business needs.
I have applied ITIL principles in previous roles to improve incident management processes.
My certification helps in implementing continuous service improvement...
As a Sr. Change Analyst, I managed change initiatives, ensuring smooth transitions and stakeholder engagement across projects.
Led change management strategies for multiple projects, resulting in a 30% increase in adoption rates.
Conducted impact assessments to identify potential risks and mitigation strategies, enhancing project success.
Facilitated training sessions for end-users, improving their understanding and usage...
I applied via Referral
I am a detail-oriented Manual Test Engineer with 5 years of experience in testing web and mobile applications.
Experienced in creating test cases and executing them manually
Proficient in identifying and documenting software defects
Skilled in regression testing and test automation tools like Selenium
Strong analytical and problem-solving skills
Excellent communication and teamwork abilities
Bug cycle is the process of identifying, reporting, fixing, retesting, and closing a software bug.
Bug is identified by tester during testing phase
Bug is reported to development team
Development team fixes the bug
Tester retests the bug fix
If bug is fixed, it is closed. If not, cycle repeats
I applied via Referral and was interviewed in Dec 2024. There were 2 interview rounds.
It was good experience
Custom hooks in React allow for reusable logic across components, enhancing code organization and maintainability.
Custom hooks are JavaScript functions that start with 'use'. Example: 'useFetch' for data fetching.
They can encapsulate stateful logic, making it reusable. Example: 'const [data, loading] = useFetch(url);'
Custom hooks can use other hooks like 'useState' and 'useEffect' to manage state and side effects.
They ...
Closures are functions that retain access to their lexical scope, even when executed outside that scope.
A closure is created when a function is defined inside another function.
Example: function outer() { let x = 10; return function inner() { return x; }; }
Closures can capture variables from their parent scope, allowing for data privacy.
They are often used in callbacks and event handlers to maintain state.
Example: let c...
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
Creating a custom React hook for managing form state and validation.
Define a function that uses 'useState' to manage form values.
Use 'useEffect' to handle validation logic based on form values.
Return an object containing form values, a function to update them, and validation errors.
Example: const useForm = (initialValues) => { /* hook logic */ };
Use the custom hook in a component: const { values, handleChange, error...
React Context API allows for state management and sharing data across components without prop drilling.
Create a Context using React.createContext().
Wrap your component tree with the Context Provider to make the context available.
Use the useContext hook in functional components to access context values.
Example: const MyContext = React.createContext();
Example: <MyContext.Provider value={/* some value */}>...</My...
I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jul 2024. There were 3 interview rounds.
The profile I was interviewed for was Senior Software Engineer- Cloud/Golang.
1st round had questions related to Golang and its paradigms. Questions were relevant to the role.
2nd roud had questions related to problem solving with Golang.
Implemented microservices architecture to improve scalability and maintainability of the project.
Decomposed monolithic application into smaller, independent services
Utilized containerization technology like Docker for easy deployment and scaling
Implemented service discovery and load balancing for better performance
Used API gateways for centralized access control and monitoring
Top trending discussions
Some of the top questions asked at the Netcracker Technology interview -
The duration of Netcracker Technology interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 103 interview experiences
Difficulty level
Duration
based on 872 reviews
Rating in categories
10-16 Yrs
₹ 20-40 LPA
10-18 Yrs
₹ 20-42 LPA
8-16 Yrs
Not Disclosed
Senior Software Engineer
1.1k
salaries
| ₹10.8 L/yr - ₹40 L/yr |
Software Engineer
840
salaries
| ₹9.9 L/yr - ₹18.9 L/yr |
QA Engineer
389
salaries
| ₹4 L/yr - ₹11 L/yr |
Technical Lead
360
salaries
| ₹23.7 L/yr - ₹42 L/yr |
Business Analyst
356
salaries
| ₹12 L/yr - ₹40 L/yr |
ITC Infotech
Xoriant
CitiusTech
HTC Global Services