i
Filter interviews by
MAC address is a unique identifier assigned to network interfaces for communications on a network.
MAC address stands for Media Access Control address.
It is a 12-digit hexadecimal number typically written in the format XX:XX:XX:XX:XX:XX.
MAC addresses are used to uniquely identify devices on a network.
They are assigned by the manufacturer and are hardcoded into the network interface card.
MAC addresses are used in Et...
The Internet is a global network of interconnected computers that allows for communication, information sharing, and access to resources.
Global network of interconnected computers
Allows for communication, information sharing, and resource access
Uses protocols like TCP/IP for data transmission
To repair the C drive of a computer, you can use the built-in Windows tools like Check Disk or System File Checker.
Run Check Disk utility to scan and fix errors on the C drive
Use System File Checker tool to repair corrupted system files
Perform a System Restore to revert the system back to a previous working state
Reinstall Windows operating system if the above steps do not work
To take data backup of a server, you can use backup software or built-in tools to create regular backups of important data.
Use backup software like Veeam, Acronis, or Backup Exec to schedule regular backups
Utilize built-in tools like Windows Server Backup or Time Machine for Mac servers
Store backups on external hard drives, network-attached storage (NAS), or cloud storage for redundancy
Test backups regularly to en...
To backup Outlook data, you can use the built-in export feature to save emails, contacts, and calendar items to a PST file.
Open Outlook and go to File > Open & Export > Import/Export.
Select 'Export to a file' and click Next.
Choose 'Outlook Data File (.pst)' and select the items you want to backup.
Specify the location and name for the backup file, then click Finish.
You can also set up automatic backups using third-...
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and untrusted external network.
It inspects all incoming and outgoing traffic and decides whether to allow or block specific traffic based on a set of security rules.
Firewalls can be hardware-based or software-based...
A forest is a large area covered chiefly with trees and undergrowth.
A forest is a complex ecosystem with various plant and animal species.
Forests play a crucial role in maintaining biodiversity and regulating climate.
Examples of forests include rainforests, deciduous forests, and coniferous forests.
Topology refers to the arrangement of nodes and connections in a network.
Topology defines how devices are connected in a network
Common topologies include bus, star, ring, mesh, and hybrid
Each topology has its own advantages and disadvantages
Topology affects network performance, scalability, and fault tolerance
Error OF outlook
Check internet connection
Restart Outlook
Update Outlook to latest version
Check for any conflicting add-ins
Repair Outlook data file
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
I applied via Walk-in
To take data backup of a server, you can use backup software or built-in tools to create regular backups of important data.
Use backup software like Veeam, Acronis, or Backup Exec to schedule regular backups
Utilize built-in tools like Windows Server Backup or Time Machine for Mac servers
Store backups on external hard drives, network-attached storage (NAS), or cloud storage for redundancy
Test backups regularly to ensure ...
To repair the C drive of a computer, you can use the built-in Windows tools like Check Disk or System File Checker.
Run Check Disk utility to scan and fix errors on the C drive
Use System File Checker tool to repair corrupted system files
Perform a System Restore to revert the system back to a previous working state
Reinstall Windows operating system if the above steps do not work
To backup Outlook data, you can use the built-in export feature to save emails, contacts, and calendar items to a PST file.
Open Outlook and go to File > Open & Export > Import/Export.
Select 'Export to a file' and click Next.
Choose 'Outlook Data File (.pst)' and select the items you want to backup.
Specify the location and name for the backup file, then click Finish.
You can also set up automatic backups using third-party...
A forest is a large area covered chiefly with trees and undergrowth.
A forest is a complex ecosystem with various plant and animal species.
Forests play a crucial role in maintaining biodiversity and regulating climate.
Examples of forests include rainforests, deciduous forests, and coniferous forests.
Topology refers to the arrangement of nodes and connections in a network.
Topology defines how devices are connected in a network
Common topologies include bus, star, ring, mesh, and hybrid
Each topology has its own advantages and disadvantages
Topology affects network performance, scalability, and fault tolerance
Error OF outlook
Check internet connection
Restart Outlook
Update Outlook to latest version
Check for any conflicting add-ins
Repair Outlook data file
MAC address is a unique identifier assigned to network interfaces for communications on a network.
MAC address stands for Media Access Control address.
It is a 12-digit hexadecimal number typically written in the format XX:XX:XX:XX:XX:XX.
MAC addresses are used to uniquely identify devices on a network.
They are assigned by the manufacturer and are hardcoded into the network interface card.
MAC addresses are used in Etherne...
The Internet is a global network of interconnected computers that allows for communication, information sharing, and access to resources.
Global network of interconnected computers
Allows for communication, information sharing, and resource access
Uses protocols like TCP/IP for data transmission
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and untrusted external network.
It inspects all incoming and outgoing traffic and decides whether to allow or block specific traffic based on a set of security rules.
Firewalls can be hardware-based or software-based, and...
Top trending discussions
Identify and categorize elements in an array based on their index being even or odd.
Even index: 0, 2, 4, ... (e.g., in [10, 20, 30], 10 and 30 are at even indices).
Odd index: 1, 3, 5, ... (e.g., in [10, 20, 30], 20 is at an odd index).
Use loops or list comprehensions to separate elements based on index.
Example: For array [1, 2, 3, 4, 5], even indexed elements are [1, 3, 5] and odd indexed are [2, 4].
I applied via Job Portal and was interviewed before Feb 2023. There was 1 interview round.
I applied via Approached by Company and was interviewed in Apr 2023. There were 2 interview rounds.
I appeared for an interview in Dec 2024.
Our working culture promotes collaboration, innovation, and integrity.
We prioritize teamwork and open communication to achieve common goals.
We encourage creativity and out-of-the-box thinking to solve complex problems.
We uphold high ethical standards and value honesty and transparency in all interactions.
We strive for continuous improvement and learning to stay ahead in the ever-evolving technology landscape.
I applied via Referral and was interviewed before Dec 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed before Mar 2020. There were 4 interview rounds.
Hashtable is synchronized while hashmap is not.
Hashtable is thread-safe while hashmap is not.
Hashtable does not allow null keys or values while hashmap allows one null key and multiple null values.
Hashtable is slower than hashmap due to synchronization.
Hashtable is a legacy class while hashmap is a newer implementation.
Hashmap is not thread-safe while Concurrent Hashmap is thread-safe.
Hashmap is not suitable for multi-threaded environments as it can lead to race conditions and data inconsistencies.
Concurrent Hashmap allows multiple threads to access and modify the map concurrently without any data inconsistencies.
Concurrent Hashmap uses a technique called lock striping to achieve thread-safety.
Concurrent Hashmap is slower than Hashma...
I appeared for an interview in Sep 2017.
I applied via Naukri.com and was interviewed before May 2018. There were 5 interview rounds.
based on 3 interview experiences
Difficulty level
Duration
based on 9 reviews
Rating in categories
System Engineer
720
salaries
| ₹1.6 L/yr - ₹4.5 L/yr |
Senior Systems Engineer
196
salaries
| ₹1.8 L/yr - ₹5 L/yr |
Desktop Support Engineer
117
salaries
| ₹1.5 L/yr - ₹4.2 L/yr |
System Administrator
74
salaries
| ₹2 L/yr - ₹5.3 L/yr |
Network Engineer
56
salaries
| ₹1.6 L/yr - ₹5.4 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant