Filter interviews by
I applied via Referral and was interviewed in Nov 2020. There were 4 interview rounds.
RJ45 and RJ11 connectors are types of connectors used in networking and telecommunications.
RJ45 connectors are used for Ethernet connections and have 8 pins.
RJ11 connectors are used for telephone connections and have 6 pins.
RJ45 connectors are larger in size compared to RJ11 connectors.
RJ45 connectors are commonly used in home and office networks.
RJ11 connectors are commonly used for landline telephones and DSL connect
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automatically assigning IP addresses to devices.
It allows devices to join a network without manual configuration.
DHCP servers can also assign other network information such as subnet mask, default gateway, and DNS server addresses.
DHCP leases...
Tools for identifying and solving problems as a System Administrator
Monitoring tools like Nagios, Zabbix, and PRTG
Log analysis tools like Splunk, ELK Stack, and Graylog
Network analysis tools like Wireshark and tcpdump
Remote access tools like SSH and RDP
Scripting languages like Python and Bash
Virtualization tools like VMware and VirtualBox
Backup and recovery tools like Veeam and Backup Exec
Stack is a data structure used to store and retrieve data in a last-in-first-out (LIFO) manner. ROM cannot be used as stack.
Stack is a collection of elements with two main operations: push (add element) and pop (remove element).
Stack follows the LIFO principle, meaning the last element added is the first one to be removed.
Stack can be implemented using arrays or linked lists.
ROM (Read-Only Memory) cannot be used as sta...
Some of the latest computer processors include Intel Core i9, AMD Ryzen 9, and Apple M1.
Intel Core i9
AMD Ryzen 9
Apple M1
Top trending discussions
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
Sticky bit is a permission set on a directory to allow only the owner to delete or rename files within that directory.
Sticky bit is represented by a 't' at the end of the permission string for a directory.
It is commonly used on directories like /tmp to prevent users from deleting each other's files.
Example: chmod +t /tmp
The /tmp directory is a temporary directory used for storing temporary files in Unix-like operating systems.
Used for storing temporary files
Files in /tmp are typically deleted upon system reboot
Should not be used for storing important data
I applied via Naukri.com and was interviewed in Jan 2021. There were 3 interview rounds.
I applied via campus placement at Noida Institute of Engineering & Technology, Greater Noida and was interviewed in Jan 2024. There were 3 interview rounds.
Windows and Android OS have evolved with new features and improvements compared to past versions.
Windows 10 introduced a new Start menu and Cortana virtual assistant.
Android 11 focused on improved privacy controls and messaging features.
Both OS have enhanced security measures compared to their past versions.
I applied via Apna Jobs and was interviewed in Oct 2022. There were 2 interview rounds.
VPN is a secure connection between two or more devices over the internet.
VPN encrypts data to ensure privacy and security
It allows remote access to a private network
It can be used to bypass geo-restrictions and access blocked content
Examples include OpenVPN, Cisco AnyConnect, and NordVPN
Ping cmd is a network diagnostic tool used to test connectivity between two devices.
Ping sends ICMP packets to the destination device and measures the response time.
It can be used to test network latency, packet loss, and network congestion.
Ping can also be used to determine the IP address of a device.
Ping can be run from the command prompt on Windows, macOS, and Linux systems.
Ping can be used with various options such...
Dual booting allows two operating systems to be installed on one computer, giving the user the option to choose which to use.
Create a separate partition for each operating system
Install the first operating system on one partition
Install the second operating system on the other partition
Use a boot manager to choose which operating system to boot into
Examples of boot managers include GRUB and Windows Boot Manager
A virtual machine is a software emulation of a physical computer that can run multiple operating systems and applications.
Virtual machines allow for efficient use of hardware resources by sharing them among multiple virtual machines
They provide a secure and isolated environment for running applications
Virtual machines can be easily created, cloned, and moved between physical hosts
Examples of virtual machine software in
posted on 13 Mar 2024
I applied via Referral and was interviewed before Mar 2023. There were 2 interview rounds.
Data cleaning is the process of identifying and correcting errors or inconsistencies in data to improve its quality.
Removing duplicate entries
Correcting spelling errors
Handling missing values
Standardizing data formats
Identifying and removing outliers
I applied via Walk-in and was interviewed in Feb 2022. There were 3 interview rounds.
There where two paper one was of maths and second paper was of engligh.
There where ten person in one GD, topic was provided us by them.
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
Sticky bit is a permission set on a directory to allow only the owner to delete or rename files within that directory.
Sticky bit is represented by a 't' at the end of the permission string for a directory.
It is commonly used on directories like /tmp to prevent users from deleting each other's files.
Example: chmod +t /tmp
The /tmp directory is a temporary directory used for storing temporary files in Unix-like operating systems.
Used for storing temporary files
Files in /tmp are typically deleted upon system reboot
Should not be used for storing important data
I applied via Naukri.com and was interviewed in Jan 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2020. There was 1 interview round.
Anypoint Runtime Manager is a cloud-based tool for managing and monitoring Mule applications.
It provides real-time visibility into application performance and health.
It allows for easy deployment and scaling of applications.
It offers centralized logging and alerting for quick issue resolution.
It integrates with other Anypoint Platform tools for end-to-end application management.
Example: Anypoint Runtime Manager can be ...
Runtime fabric is a platform that enables the deployment and management of distributed applications.
It provides a unified view of the distributed application
It manages the deployment and scaling of application components
It enables communication between application components across different environments
Examples include MuleSoft's Anypoint Runtime Fabric and Microsoft's Azure Service Fabric
Mule 4 is a major upgrade from Mule 3 with improved performance, simplified development, and enhanced security features.
Mule 4 has a new simplified syntax for dataweave
Mule 4 has a new error handling mechanism
Mule 4 has improved performance with reduced memory usage
Mule 4 has enhanced security features with TLS 1.2 support
Mule 4 has a new deployment model with standalone and cluster modes
Secure properties in Mule are used to store sensitive information such as passwords and API keys.
Secure properties are encrypted and can only be accessed by authorized users.
They are commonly used to store credentials for external systems such as databases and APIs.
Secure properties can be defined in a separate file or in the Mule configuration file.
They can be accessed in Mule flows using the secure:: prefix.
Examples ...
based on 3 reviews
Rating in categories
Engineer- Customer Support
134
salaries
| ₹1.2 L/yr - ₹4.2 L/yr |
Desktop Support Engineer
50
salaries
| ₹1.1 L/yr - ₹3.8 L/yr |
Technical Support Engineer
33
salaries
| ₹1.8 L/yr - ₹3.1 L/yr |
Team Lead
17
salaries
| ₹1.2 L/yr - ₹5 L/yr |
System Administrator
15
salaries
| ₹2 L/yr - ₹4.5 L/yr |
Infosys
TCS
Wipro
HCLTech