Filter interviews by
Design a cloud-based storage monitoring and reporting dashboard using AWS, GCP, or Azure.
Use AWS CloudWatch for monitoring storage metrics like usage and performance.
Implement Azure Monitor to track storage account metrics and alerts.
Utilize GCP's Stackdriver for logging and monitoring storage resources.
Create a user-friendly dashboard using tools like Grafana or Tableau.
Integrate alerts via SNS (AWS), Azure Alert...
DHCP protocol is used to automatically assign IP addresses to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol
It allows devices to obtain IP addresses and other network configuration information dynamically
DHCP servers assign IP addresses to devices for a specific lease period
DHCP reduces the need for manual configuration of network settings
Example: When you connect to a Wi-Fi network, DHCP...
HTTPS is a secure version of HTTP that encrypts data transmitted between a website and a user's browser.
HTTPS uses SSL/TLS encryption to secure data transmission
HTTP sends data in plain text, making it vulnerable to interception
HTTPS is indicated by a padlock icon in the browser's address bar
Websites that handle sensitive information like banking or shopping use HTTPS
An operating system is a software that manages computer hardware and provides services for computer programs.
Manages computer hardware resources such as CPU, memory, and storage
Provides a user interface for interacting with the computer
Supports running applications and managing processes
Examples include Windows, macOS, Linux, iOS, Android
When you search Google, it retrieves relevant information from its index and displays results based on the search query.
Google retrieves information from its index of web pages
Results are displayed based on relevance to the search query
Search results may include websites, images, videos, news articles, and more
Design an employee reimbursement system for receipt submissions and approval workflows.
User roles: Employees submit receipts, Managers approve/reject requests.
Receipt submission: Employees upload receipts via a web/mobile interface.
Approval workflow: Notifications sent to managers for pending approvals.
Reimbursement calculation: System calculates total reimbursement based on company policy.
Audit trail: Maintain lo...
Find an element in a rotated sorted array efficiently using binary search.
Identify the pivot point where the array is rotated.
Use binary search to determine which half of the array to search.
Example: For array [4, 5, 6, 7, 0, 1, 2] and target 0, pivot is 3.
Check if the target is in the left or right sorted half.
Repeat the process until the target is found or the search space is exhausted.
DBMS is a software system that manages databases, while Excel is a spreadsheet program used for data analysis and visualization.
DBMS is used to store, retrieve, and manage data in a structured format, while Excel is used for data analysis and visualization.
DBMS allows for multiple users to access and manipulate data simultaneously, while Excel is typically used by a single user at a time.
DBMS supports complex quer...
Object-Oriented Programming (OOP) is a programming paradigm based on objects and classes, promoting code reusability and organization.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., a class).
Inheritance: Mechanism to create a new class from an existing class, inheriting its properties (e.g., a 'Dog' class inheriting from an 'Animal' class).
Polymorphism: Ability to present t...
IP assignment process involves allocating unique IP addresses to devices on a network.
IP addresses are assigned by a DHCP server or manually by a network administrator
IP addresses can be assigned dynamically or statically
IP addresses must be unique within a network
IPv4 addresses are 32-bit and IPv6 addresses are 128-bit
I appeared for an interview in Feb 2025.
I appeared for an interview in Sep 2024.
Simulate Write-Back Cache using two python dictionaries with dirty bit and LRU flushing technique.
Create two dictionaries, one for cache data and one for dirty bit tracking.
Implement LRU flushing technique to remove least recently used data when cache is full.
Set dirty bit to mark data that has been modified and needs to be written back to main memory.
Update dirty bit when data is modified and track which data needs to...
Design a cloud-based storage monitoring and reporting dashboard using AWS, GCP, or Azure.
Use AWS CloudWatch for monitoring storage metrics like usage and performance.
Implement Azure Monitor to track storage account metrics and alerts.
Utilize GCP's Stackdriver for logging and monitoring storage resources.
Create a user-friendly dashboard using tools like Grafana or Tableau.
Integrate alerts via SNS (AWS), Azure Alerts, or...
I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.
Basic questions of fundamentals of cs
My topic was : Is cricket hampering the growth of other sports
I applied via Campus Placement and was interviewed in Sep 2024. There were 4 interview rounds.
DBMS OS VIRTUALIZATION LINUX COMPUTER NETWORKING
Linux commands are used to interact with the operating system through the command line interface.
Commands are case-sensitive
Most commands have options and arguments that can be used to customize their behavior
Common commands include ls (list files), cd (change directory), mkdir (make directory), rm (remove files), and more
Generate the first 50 prime numbers
Start with the first prime number, 2
Use a loop to check for prime numbers by dividing each number by all numbers less than it
Keep track of the prime numbers found until you have 50
I applied via Campus Placement and was interviewed in Sep 2024. There were 2 interview rounds.
Based on HackerRank, 75 question in 90 mins
NAT is needed to allow multiple devices on a private network to share a single public IP address.
NAT helps conserve public IP addresses by allowing multiple devices on a private network to communicate with the internet using a single public IP address.
NAT provides an additional layer of security by hiding the internal IP addresses of devices on the private network from external sources.
NAT allows for easier management ...
Deadlocks occur when two or more processes are waiting for each other to release resources, resulting in a standstill.
Deadlocks involve a circular wait, where each process is waiting for a resource held by another process.
Four conditions must be met for a deadlock to occur: mutual exclusion, hold and wait, no preemption, and circular wait.
Examples of deadlocks include a printer waiting for a computer to release a file,...
Leetcode medium question
A QA chatbot designed to answer questions related to quality assurance processes and best practices.
Implement natural language processing to understand user queries
Create a knowledge base of QA processes, tools, and methodologies
Provide accurate and relevant answers to user questions
Offer interactive features like quizzes or tutorials to engage users
The playform was on Hackerrank, 50 questions in 60 minutes
DNS is a system that translates domain names to IP addresses, while DHCP is a protocol that assigns IP addresses to devices on a network.
DNS stands for Domain Name System and is used to translate domain names like www.example.com to IP addresses like 192.168.1.1.
DHCP stands for Dynamic Host Configuration Protocol and automatically assigns IP addresses to devices on a network.
DNS helps users access websites using easy-t...
In 5 years, I see myself as a senior System Requirement Engineer leading a team of professionals and contributing to innovative projects.
Leading a team of engineers
Contributing to innovative projects
Continuing professional development
Possibly pursuing advanced certifications or degrees
I applied via Campus Placement and was interviewed in May 2024. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in May 2024. There were 3 interview rounds.
Top trending discussions
Some of the top questions asked at the Nutanix interview -
The duration of Nutanix interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 53 interview experiences
Difficulty level
Duration
based on 173 reviews
Rating in categories
Member Technical Staff
100
salaries
| ₹24.2 L/yr - ₹43 L/yr |
Technical Staff Member 3
55
salaries
| ₹21 L/yr - ₹48 L/yr |
Technical Staff Member 2
52
salaries
| ₹17.2 L/yr - ₹48 L/yr |
System Reliability Engineer
48
salaries
| ₹10.3 L/yr - ₹27 L/yr |
MTS-4
41
salaries
| ₹26 L/yr - ₹60 L/yr |
Red Hat
24/7 Customer
Thomson Reuters
Oracle Cerner