Filter interviews by
Dynamic routing uses routing protocols to automatically update routing tables, while static routing requires manual configuration of routes.
Dynamic routing protocols automatically update routing tables based on network changes
Static routing requires manual configuration of routes by the network administrator
Dynamic routing is more flexible and scalable, while static routing is simpler and more secure
Examples of dynamic...
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
I chose that because of my passion for the industry and the opportunity for growth.
Passion for the industry
Opportunity for growth
Alignment with my skills and interests
I applied via Referral and was interviewed in May 2024. There was 1 interview round.
I attended XYZ University for my college education.
Attended XYZ University for 4 years
Graduated with a Bachelor's degree in Computer Science
Participated in networking clubs and workshops
Took specialized courses in network engineering
I applied via Job Fair and was interviewed in Jun 2024. There was 1 interview round.
Memory flag is a parameter used to control the behavior of memory allocation in a program.
Memory flags are used to specify how memory should be allocated and managed by a program.
They can control aspects such as memory protection, allocation strategy, and caching behavior.
Examples of memory flags include READ_ONLY, NO_CACHE, and NO_EXECUTE.
Nti - National Training Institute interview questions for popular designations
Memory flag is a parameter used to control memory allocation and usage in software applications.
Memory flags can be used to specify characteristics of memory allocation, such as read-only or executable.
Examples of memory flags include PROT_READ, PROT_WRITE, and MAP_SHARED.
Memory flags are commonly used in systems programming to manage memory efficiently.
Memory flag is a parameter used to control memory allocation and usage in software applications.
Memory flags can be used to specify characteristics of memory allocation, such as read-only or executable.
Examples of memory flags include PROT_READ, PROT_WRITE, and PROT_EXEC in Linux systems.
Memory flags are commonly used in programming languages like C and C++ to manage memory allocation and access permissions.
Top trending discussions
posted on 31 Jan 2025
posted on 18 Jan 2025
I am a motivated and results-driven individual with a background in sales and business development.
I have a Bachelor's degree in Business Administration.
I have experience working in sales for 3 years.
I have successfully developed new business opportunities for my previous company.
I am proficient in market research and analysis.
I am a strong communicator and negotiator.
Short-term goal is to gain experience in business development and contribute to company growth. Long-term goal is to advance to a leadership role and drive strategic initiatives.
Short-term goal: Gain experience in business development through hands-on projects and client interactions.
Short-term goal: Contribute to company growth by identifying new business opportunities and developing relationships with potential clien...
I expect a challenging role with opportunities for growth and learning.
Opportunities for career advancement
Challenging projects to work on
Supportive team environment
Training and development programs
Competitive salary and benefits
I come from a close-knit family of five, with supportive parents and two siblings.
My parents have always encouraged me to pursue my goals and dreams.
I have two siblings, an older brother who works in finance and a younger sister who is studying to become a doctor.
We often spend weekends together, going on hikes or having family dinners.
posted on 28 Jan 2025
Asked about maths questions.
About how to handel the lab and to assist people.
I applied via Recruitment Consulltant and was interviewed in Oct 2024. There were 3 interview rounds.
That of my first round
Testing is the process of evaluating a system or application to identify defects or errors.
Testing involves executing a system or application to find bugs or issues.
It ensures that the software meets the specified requirements and works as expected.
Types of testing include functional testing, performance testing, security testing, etc.
Testing can be manual or automated, depending on the requirements and resources avail
WebDriver architecture consists of client libraries, JSON wire protocol, browser drivers, and browsers.
Client libraries provide bindings for different programming languages to interact with WebDriver
JSON wire protocol is used for communication between client libraries and browser drivers
Browser drivers control the browsers and execute commands sent by client libraries
Browsers receive commands from browser drivers and p
Interview experience
based on 13 reviews
Rating in categories
Technical Trainer
4
salaries
| ₹3.8 L/yr - ₹10 L/yr |
Aakash Educational Services
Frankfinn Institute of Air Hostess Training
NIIT
Amity University