Filter interviews by
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
A minimum 12 mm column refers to a structural element with a diameter of at least 12 millimeters.
A 12 mm column is a type of vertical structural member used in construction.
It is typically made of materials such as concrete, steel, or wood.
The minimum diameter of 12 mm ensures the column's strength and stability.
Columns of this size are commonly used in building foundations and support structures.
The density of steel is approximately 7.85 g/cm^3.
The density of steel is commonly expressed in grams per cubic centimeter (g/cm^3).
The density of steel can vary slightly depending on the specific alloy and composition.
For example, the density of stainless steel is around 7.9 g/cm^3, while the density of carbon steel is around 7.85 g/cm^3.
The density of cement is typically around 1440 kg/m^3.
The density of cement can vary slightly depending on the type and brand.
Common densities for cement range from 1350 to 1600 kg/m^3.
Density is a measure of mass per unit volume, usually expressed in kg/m^3.
The density of sand varies depending on the type and moisture content.
The density of dry sand is typically around 1.6 g/cm^3
The density of wet sand can range from 1.8 to 2.2 g/cm^3
The density of sand can also be affected by the size and shape of the grains
The density of concrete typically ranges from 2200 to 2500 kg/m^3.
The density of concrete can vary depending on the mix design and components used.
Normal weight concrete has a density of around 2200 to 2500 kg/m^3.
Lightweight concrete, which includes aggregates like pumice, has a lower density of around 1600 to 2000 kg/m^3.
Heavyweight concrete, which includes heavy aggregates like iron or lead, has a higher density of
I applied via Walk-in and was interviewed in Aug 2024. There was 1 interview round.
Steel weight weight refers to the weight of steel used in a structure or project.
Steel weight is typically measured in pounds or kilograms.
The weight of steel can vary depending on the type and size of the steel used.
Calculating steel weight is important for determining structural integrity and load-bearing capacity.
Steel weight can be estimated using formulas or online calculators.
For example, a standard steel I-beam
Steel density is the mass per unit volume of steel material.
Steel density is typically around 7850 kg/m^3.
It is important to consider steel density when designing structures to ensure proper weight distribution.
Density of steel can vary slightly depending on the specific alloy composition.
Minimum size of a 12 mm column is 9 inches x 9 inches.
Minimum size of a 12 mm column is typically 9 inches x 9 inches.
The size of a column is determined by the load it needs to support.
Columns with larger diameters are generally used for taller structures or heavier loads.
The grade of M20 concrete refers to the mix ratio of cement, sand, and aggregate used in the concrete mix.
M20 concrete has a mix ratio of 1:1.5:3 (1 part cement, 1.5 parts sand, 3 parts aggregate)
It is commonly used for residential construction projects
The strength of M20 concrete is approximately 20 MPa after 28 days of curing
Water cement ratio is the ratio of the weight of water to the weight of cement used in a concrete mix.
Water cement ratio is a crucial factor in determining the strength and durability of concrete.
A lower water cement ratio results in stronger and more durable concrete.
The water cement ratio should be carefully controlled to prevent issues like cracking and shrinkage.
For example, a water cement ratio of 0.5 means that f...
Steel density is the mass per unit volume of steel.
Steel density is typically around 7.85 g/cm^3.
It is important for calculating the weight of steel structures.
Different types of steel may have slightly different densities.
The minimum size column for 12 mm should not be less than a certain value.
The minimum size column for 12 mm should be determined based on the specific requirements of the structure
Factors such as load-bearing capacity, height, and material type will influence the minimum size column for 12 mm
Consulting structural engineering guidelines or professionals can help determine the appropriate minimum size column for 12 mm
Different types of foundations include shallow foundations, deep foundations, and special foundations.
Shallow foundations are typically used for light structures and are placed near the surface of the ground.
Deep foundations are used when the soil near the surface is not strong enough to support the structure, and they extend deep into the ground.
Special foundations are designed for specific conditions such as expansiv
Concrete cube test is carried out to ensure the strength and quality of the concrete used in construction projects.
To determine the compressive strength of concrete
To ensure the concrete mix meets the design requirements
To identify any potential issues with the concrete mix or curing process
To assess the quality of materials used in the construction
To verify the effectiveness of the curing process
To comply with constru
Camber in road refers to the slope or curvature of the road surface from the center towards the edges.
Camber is designed to help with drainage by allowing water to flow off the road surface.
Positive camber slopes upwards from the center towards the edges, while negative camber slopes downwards.
Camber also helps with vehicle stability and steering control.
Examples: Highways typically have a slight positive camber, while...
I was interviewed in Jan 2019.
Tak Shiksha Niketan T. T. College interview questions for popular designations
Top trending discussions
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
I have 3 years of experience in the Record to Report domain, including preparing financial statements and reconciling accounts.
Prepared monthly financial statements in compliance with GAAP standards
Performed account reconciliations to ensure accuracy of financial data
Assisted in the implementation of new accounting software for improved efficiency
Collaborated with cross-functional teams to streamline RTR processes
Revenue expenditure is for day-to-day expenses while capital expenditure is for long-term assets.
Revenue expenditure is incurred for maintaining the business operations and generating revenue.
Capital expenditure is for acquiring assets that will provide benefits over multiple years.
Revenue expenditure is recorded in the income statement and is fully deductible in the year it is incurred.
Capital expenditure is recorded ...
Amortisation is the allocation of the cost of intangible assets over their useful life, while depreciation is the allocation of the cost of tangible assets over their useful life.
Amortisation is used for intangible assets like patents, copyrights, and trademarks.
Depreciation is used for tangible assets like buildings, machinery, and vehicles.
Amortisation is typically calculated using the straight-line method or the dec...
To calculate a rate in Excel, use the formula: Rate = (Value 1 / Value 2) * 100
Enter the values you want to calculate the rate for in separate cells
In a new cell, use the formula: Rate = (Value 1 / Value 2) * 100
Value 1 is the numerator and Value 2 is the denominator
Multiply the result by 100 to get the rate percentage
For example, if Value 1 is 50 and Value 2 is 100, the formula would be: (50 / 100) * 100 = 50%
Journal entries for prepaid expenses and accruals involve recognizing expenses before they are paid or revenue before it is received.
Prepaid expenses are initially recorded as assets and then expensed over time as they are used up.
Accruals involve recognizing expenses or revenue before cash is exchanged.
For prepaid expenses, a journal entry would involve debiting an expense account and crediting a prepaid expense accou...
Accrual accounting recognizes revenue and expenses when they are incurred, regardless of when cash is exchanged. Deferred accounting recognizes revenue and expenses when cash is is exchanged.
Accrual accounting records revenue when it is earned and expenses when they are incurred, regardless of when cash is received or paid.
Deferred accounting involves postponing the recognition of revenue or expenses until a later date...
A contingent liability is a potential liability that may occur depending on the outcome of a future event.
Contingent liabilities are not recorded on the balance sheet but disclosed in the footnotes.
Examples include pending lawsuits, warranties, and guarantees.
The likelihood of the contingent liability and the amount involved must be assessed.
Genpact is a global professional services firm specializing in digital transformation, analytics, and process optimization.
Genpact was founded in 1997 as a business unit within General Electric.
It became an independent company in 2005 and is headquartered in New York City.
Genpact offers services in areas such as finance and accounting, procurement, supply chain, and customer service.
The company has a presence in over 3...
posted on 18 Dec 2024
I applied via Naukri.com and was interviewed in Dec 2024. There were 2 interview rounds.
Split horizon is a technique used in computer networking to prevent routing loops by not advertising routes back to the same interface they were learned from.
Split horizon is used in distance-vector routing protocols like RIP to prevent routing loops.
It works by not advertising routes back to the same interface they were learned from.
Split horizon with poison reverse takes this a step further by advertising the route w...
BGP stands for Border Gateway Protocol, used to exchange routing information between different networks.
BGP is an exterior gateway protocol used to make routing decisions on the internet.
It operates by exchanging routing information between different autonomous systems (AS).
BGP uses TCP port 179 for communication.
BGP routers maintain a table of IP prefixes and their paths to reach them.
BGP can be configured to influenc...
There are two types of BGP: eBGP and iBGP. eBGP has an AD value of 20, while iBGP has an AD value of 200.
eBGP (External BGP) - AD value: 20
iBGP (Internal BGP) - AD value: 200
Routing protocol is a set of rules used by routers to determine the best path for data packets to travel.
Routing protocols help routers communicate with each other to dynamically update routing tables.
Types of routing protocols include distance-vector (e.g. RIP), link-state (e.g. OSPF), and hybrid (e.g. EIGRP).
Distance-vector protocols determine the best path based on hop count.
Link-state protocols use a more complex a...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology map
It supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)
OSPF divides the network into areas to re
Preventing loop avoidance in BGP involves using loop prevention mechanisms like AS Path and Route Reflectors.
Use AS Path attribute to prevent loops by tracking the path a route has taken through AS numbers.
Implement Route Reflectors to avoid loops in BGP by controlling the route propagation within a cluster.
Utilize BGP Confederations to divide the network into smaller autonomous systems to prevent loops.
Regularly monit...
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how data is transferred from one computer to another over a network.
The seven layers of OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has speci...
Traceroute is a network diagnostic tool used to track the path packets take from one networked device to another.
Traceroute sends packets with increasing TTL values to determine the path to a destination.
Each router along the path sends back an ICMP Time Exceeded message, allowing traceroute to map the route.
The final destination sends an ICMP Port Unreachable message, indicating the end of the route.
Traceroute helps i...
The presence of '*****' in a traceroute indicates that the router is blocking the ICMP packets used by traceroute.
The '*****' indicates that the router is not responding to the ICMP packets sent by the traceroute tool.
This could be due to the router being configured to block ICMP traffic for security reasons.
It can also be caused by a firewall or network filtering rules blocking the ICMP packets.
In some cases, the '***...
BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Established.
Idle - Initial state when BGP is not yet established
Connect - Attempting to establish a TCP connection
Active - Waiting for a TCP connection to be completed
OpenSent - Sent an Open message to peer
OpenConfirm - Received an Open message and waiting for confirmation
Established - BGP peers are fully established and can exchange routing information
The new router can be configured remotely using a laptop or mobile device with access to the network.
Access the router's web interface by entering its IP address in a web browser
Login using default credentials or credentials provided by the company
Configure basic settings such as SSID, password, and security settings
Update firmware if necessary
Test the connection to ensure it is working properly
CE and PE routers are types of routers used in MPLS networks. CE routers connect to customer networks while PE routers connect to provider networks.
CE routers (Customer Edge) connect to customer networks and are responsible for exchanging routes with customer devices.
PE routers (Provider Edge) connect to provider networks and are responsible for exchanging routes with other PE routers in the MPLS network.
CE routers are...
The command to assign an IP address on a Juniper router interface is 'set interface <interface_name> unit <unit_number> family inet address <ip_address/mask>'
Use the 'set' command to configure the interface
Specify the interface name and unit number
Use the 'family inet' statement to configure an IPv4 address
Specify the IP address and subnet mask
Parameters for BGP neighbourship include AS number, IP address, subnet mask, and BGP version.
AS number must match on both neighbors
IP address must be reachable between neighbors
Subnet mask should be the same on both neighbors
BGP version should be compatible between neighbors
tftp stands for Trivial File Transfer Protocol, a simple protocol used for transferring files over a network.
tftp is a lightweight protocol used for transferring files between devices on a network.
It operates on UDP port 69.
tftp does not require user authentication, making it less secure compared to FTP.
It is commonly used for booting devices over a network, such as in diskless workstations or routers.
An example of tft...
Loop avoidance mechanism in BGP prevents routing loops by using loop prevention mechanisms like AS path attribute and route reflectors.
BGP uses AS path attribute to prevent routing loops by not accepting routes with its own AS number in the path.
Route reflectors are used in BGP to avoid loops in route propagation within a cluster of routers.
BGP Confederations can also be used to prevent loops by dividing the AS into sm
Traceroute is a network diagnostic tool used to track the path packets take from source to destination IP.
Traceroute sends packets with increasing TTL values to elicit ICMP Time Exceeded responses from routers along the path.
The source IP is the IP address of the device initiating the traceroute, while the destination IP is the IP address of the target device.
Traceroute displays the IP addresses of the routers in the p...
Public IP is the address assigned to a device that is directly accessible over the internet, while private IP is used within a private network.
Public IP is unique and can be accessed from anywhere on the internet
Private IP is used within a local network and is not directly accessible from the internet
Public IP is assigned by the Internet Service Provider (ISP)
Private IP addresses are typically in the ranges of 192.168.
To configure a router with support of a non tech guy onsite, provide step-by-step instructions and visual aids.
Create a simple, easy-to-follow guide with step-by-step instructions.
Use visual aids such as diagrams or videos to demonstrate the process.
Provide clear explanations of each step and troubleshoot common issues.
Offer remote support or a helpline for additional assistance if needed.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters network traffic based on rules set by the administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and Windows Firewall
Routers connect multiple networks together while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers can determine the best path for data to travel between networks, while...
MPLS stands for Multiprotocol Label Switching, a technique used in telecommunications networks to direct data packets along predefined paths.
MPLS is used to improve network performance and efficiency by quickly routing data packets based on labels instead of IP addresses.
It allows for traffic engineering, quality of service (QoS) prioritization, and virtual private network (VPN) services.
MPLS operates at layer 2.5 of t...
FTP and TFTP are protocols used for transferring files over a network.
FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet.
TFTP (Trivial File Transfer Protocol) is a simpler version of FTP that uses UDP instead of TCP for file transfer.
FTP requires authentication (username and password) for access, while TFTP does not ...
I applied via Walk-in and was interviewed in Dec 2024. There were 2 interview rounds.
Process planning refers to the methodical approach of determining the best possible way to manufacture a product or deliver a service by considering various aspects such as resources, timelines, and methodologies involved in production or execution.
Implemented a new chemical process to increase efficiency and reduce waste.
Researched and analyzed current process to identify areas for improvement
Designed and tested new process using simulation software
Collaborated with production team to implement changes and monitor results
Achieved 20% increase in production output and 15% reduction in waste
Continuously monitored and optimized process for further improvements
I utilize a combination of project management tools and communication strategies to effectively manage my team and projects.
I prioritize tasks based on deadlines and importance
I regularly communicate with team members to ensure everyone is on the same page
I use project management software such as Trello or Asana to track progress and assign tasks
I adapt my management style to fit the needs and preferences of individual
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
Development dependencies are needed for development and testing, while regular dependencies are needed for the application to run.
Development dependencies are used during the development process, such as testing frameworks or build tools.
Regular dependencies are required for the application to function properly in production.
Development dependencies are typically listed in the devDependencies section of package.json, w...
Symbols ^ and ~ in package.json represent version ranges for dependencies.
The symbol ^ represents a range that allows minor version updates.
The symbol ~ represents a range that allows only patch updates.
For example, ^1.2.3 allows any version from 1.2.3 to <2.0.0, while ~1.2.3 allows any version from 1.2.3 to <1.3.0.
404 page can be handled in React routing by creating a Route component with a path of '*' at the end of all other routes.
Create a Route component with a path of '*' at the end of all other routes in the Switch component.
Inside the '*' Route component, render a custom 404 page component.
Use the Switch component to ensure that only one Route is rendered at a time.
Component lifecycle in functional components involves useEffect hook for side effects.
Functional components use useEffect hook to handle side effects like fetching data, subscribing to events, etc.
useEffect hook can be used to mimic componentDidMount, componentDidUpdate, and componentWillUnmount lifecycle methods.
useEffect hook takes a callback function as its first argument and an optional array of dependencies as its...
Redux data flow is a unidirectional flow of data in React applications using a centralized store.
Actions are dispatched to the store
Reducers update the state based on the action
Components subscribe to the store to access the updated state
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
I have 2 years of experience working with Docker in various projects.
2 years of experience working with Docker in various projects
Proficient in creating Docker containers, managing images, and orchestrating containers using Docker Compose
Familiar with Docker Swarm and Kubernetes for container orchestration
Experience in troubleshooting Docker-related issues and optimizing container performance
Yes, I have experience in Kubernetes.
I have worked on deploying and managing applications on Kubernetes clusters.
I am familiar with creating and managing Kubernetes resources such as pods, deployments, services, and ingresses.
I have experience in using tools like kubectl and Helm for interacting with Kubernetes clusters.
I have implemented CI/CD pipelines using Kubernetes for automated deployment and scaling of applicat
OOP stands for Object-Oriented Programming, a programming paradigm based on the concept of objects.
OOP focuses on creating objects that contain data and methods to manipulate that data.
Encapsulation, inheritance, and polymorphism are key principles of OOP.
Examples of OOP languages include Java, C++, and Python.
Polymorphism in Java refers to the ability of a method to do different things based on the object it is acting upon.
Types of polymorphism in Java include method overloading and method overriding.
Method overloading is when multiple methods have the same name but different parameters.
Method overriding is when a subclass provides a specific implementation of a method that is already defined in its superclass.
Threads in Java allow multiple tasks to run concurrently within a single program.
Threads are lightweight sub-processes that share the same memory space.
They are used to improve performance by allowing tasks to run simultaneously.
Examples include creating a new thread using the Thread class or implementing the Runnable interface.
Spring profile is a way to segregate parts of your application configuration and make it only available in certain environments.
Spring profiles allow you to define different configurations for different environments such as development, testing, and production.
You can use @Profile annotation to specify which beans should be loaded based on the active profile.
Profiles can be activated in various ways such as through app...
Annotations used in Spring Security to apply authorization rules before and after a method is called.
Used in Spring Security to define authorization rules
@PreAuthorize is used to apply authorization rules before a method is called
@PostAuthorize is used to apply authorization rules after a method is called
Both annotations support SpEL expressions for defining rules
I applied via TCS and was interviewed in Dec 2024. There was 1 interview round.
Interview experience
based on 2 reviews
Rating in categories
TCS
Accenture
Wipro
Cognizant