Tata Communications
100+ Interview Questions and Answers
Q1. What is BGP? What is spilit horizon rule? How you configure BGP route reflector? Tell BGP path selection algorithm? ebgp multihop concept? OSPF LSA types and descriptions? How to redistribute OSPF into BGP? Wha...
read moreBGP is a routing protocol used to exchange routing information between different autonomous systems. It uses path vector algorithm.
Split horizon rule prevents a router from advertising a route back to the same interface from which it was learned.
BGP route reflector is configured by defining a cluster ID and selecting reflector clients.
BGP path selection algorithm selects the best path based on attributes like AS path length, origin code, MED, etc.
EBGP multihop concept is used...read more
Q2. What is floating routing and how we can configure it
Floating routing is a technique used to route traffic between two networks without a direct physical connection.
It involves creating a virtual interface on each network and configuring them to communicate with each other.
This can be done using protocols such as GRE or IPsec.
Floating routing can be useful in scenarios where a direct physical connection is not possible or desirable, such as connecting two data centers.
Configuration can vary depending on the specific network equ...read more
Q3. To maintain SIEM solution which are the daily activities that you will perform?
Daily activities for maintaining SIEM solution
Monitor SIEM alerts and investigate any potential security incidents
Review and update SIEM rules and policies
Ensure SIEM data sources are properly configured and updated
Perform regular backups and test disaster recovery procedures
Stay up-to-date with the latest security threats and trends
Collaborate with other teams to ensure proper integration with other security tools
Provide regular reports on SIEM performance and security incid...read more
Q4. Ospf are types,ospf network types,ospf lsas and what they do,bgp sequential attributes,static route config,bgp config,subnetting questions to solve,AD values of various routing protocols
The interview question covers topics related to OSPF, BGP, static routing, subnetting, and AD values of routing protocols.
OSPF types include OSPFv2 and OSPFv3
OSPF network types include broadcast, non-broadcast, point-to-point, and point-to-multipoint
OSPF LSAs include router, network, summary, and AS-external
BGP sequential attributes include weight, local preference, AS path, origin, MED, and community
Static route config involves manually configuring routes in a routing table
B...read more
Q5. Which Routing Protocols you have learnt and explain any one?
I have learnt OSPF, Open Shortest Path First.
OSPF is a link-state routing protocol.
It uses Dijkstra's algorithm to calculate the shortest path.
It supports variable-length subnet masks.
It uses multicast to communicate with other routers.
It is commonly used in large enterprise networks.
Example: OSPF is used in a company with multiple locations to ensure efficient routing of traffic between them.
Q6. What is capitalization of asset What is lease accounting under ind as Explain depreciation and amortization Golden rules of accounting
Capitalization of asset, lease accounting under IND AS, depreciation and amortization, and golden rules of accounting.
Capitalization of asset refers to the process of recording an expenditure as an asset rather than an expense.
Lease accounting under IND AS requires lessees to recognize lease assets and liabilities on their balance sheets.
Depreciation is the systematic allocation of the cost of a tangible asset over its useful life.
Amortization is the systematic allocation of ...read more
Q7. Which use cases will you create to prevent web attacks and on which device?
Use cases to prevent web attacks on various devices
Implementing firewalls and intrusion detection systems on servers
Using anti-virus and anti-malware software on client devices
Regularly updating software and security patches
Enforcing strong password policies and multi-factor authentication
Conducting regular security audits and penetration testing
Implementing HTTPS and SSL certificates on websites
Using content security policies to prevent cross-site scripting and injection att...read more
Q8. Which use case will you create based on OWASP top 10?
A use case to prevent SQL injection attacks
Implement input validation and sanitization
Use parameterized queries
Limit database user privileges
Regularly update and patch database software
Q9. How do you perform docker migration from one machine to another machine?
Docker migration from one machine to another involves exporting the container as an image, transferring the image to the new machine, and then importing it.
Export the Docker container as an image using 'docker save' command
Transfer the image to the new machine using a secure method like SCP or Docker Hub
Import the image on the new machine using 'docker load' command
Run the container on the new machine using 'docker run' command
Q10. What is difference between cyber kill chain and Mitre framework?
Cyber kill chain and Mitre framework are both used for cyber threat intelligence, but the former focuses on attack stages while the latter provides a comprehensive framework for threat intelligence.
Cyber kill chain is a model that describes the stages of a cyber attack, from reconnaissance to exfiltration.
Mitre framework is a comprehensive framework for organizing and analyzing threat intelligence, including attack patterns, tactics, and techniques.
Cyber kill chain is more fo...read more
Q11. How to tshoot when you are not going to ping?
Use alternative network troubleshooting methods like traceroute, netstat, nslookup, and checking firewall rules.
Use traceroute to identify the path taken by packets and locate any network issues.
Use netstat to check for open ports and connections.
Use nslookup to verify DNS resolution.
Check firewall rules to ensure they are not blocking traffic.
Use packet capture tools like Wireshark to analyze network traffic.
Check system logs for any errors or warnings related to network con...read more
Q12. What is OTN?
OTN stands for Optical Transport Network, a high-speed network technology used for transmitting large amounts of data over optical fibers.
OTN is a standardized protocol for optical networking
It uses wavelength division multiplexing (WDM) to increase bandwidth
OTN supports different types of traffic, including voice, video, and data
It provides features like error correction, fault management, and network resilience
OTN is used in long-haul and metro networks, data centers, and c...read more
Q13. Which are basic building blocks of communication>
The basic building blocks of communication are sender, message, channel, receiver, feedback, and context.
Sender: the person or entity who initiates the communication
Message: the information being conveyed
Channel: the medium through which the message is transmitted
Receiver: the person or entity who receives the message
Feedback: the response or reaction of the receiver to the message
Context: the situation or environment in which the communication takes place
Q14. Switching STP HSRP VLAN RSTP BPDU guard vs BPDU filter
Explanation of STP, HSRP, VLAN, RSTP, BPDU guard and BPDU filter in network switching.
STP (Spanning Tree Protocol) is used to prevent loops in a network by blocking redundant paths.
HSRP (Hot Standby Router Protocol) provides redundancy for IP networks by allowing multiple routers to share a virtual IP address.
VLAN (Virtual Local Area Network) is a logical grouping of devices on a network, allowing for better network management and security.
RSTP (Rapid Spanning Tree Protocol) ...read more
Q15. What is SDH?
SDH stands for Synchronous Digital Hierarchy, a standard for transmitting digital signals over optical fiber networks.
SDH is used for high-speed communication in telecommunications networks.
It is a standardized protocol for transmitting digital signals at different rates.
SDH is used to multiplex different signals onto a single fiber optic cable.
It provides a reliable and efficient way to transmit data over long distances.
Examples of SDH rates include STM-1 (155 Mbps) and STM-...read more
Q16. How you can improve our industry reputation & growth by urself...?
By implementing industry best practices, fostering collaboration, and promoting innovation.
Identify and implement industry best practices to improve efficiency and quality.
Collaborate with stakeholders to identify and address industry challenges.
Promote innovation by encouraging experimentation and risk-taking.
Establish a culture of continuous improvement through training and development.
Engage with industry associations and thought leaders to stay up-to-date on trends and em...read more
Q17. 1 What is PSTN? 2 what is OSI model? Explain in brief.
PSTN is a traditional telephone network that uses copper wires to transmit analog voice data.
PSTN stands for Public Switched Telephone Network
It is a circuit-switched network that uses analog signals
It is being replaced by digital networks like VoIP
Examples of PSTN services include landline phones and fax machines
Q18. How will you stabilize a new hosting customer who is not satisfied with the service so far
To stabilize a new hosting customer who is not satisfied with the service, I would take the following steps:
Listen to the customer's concerns and empathize with their frustrations
Investigate the root cause of the dissatisfaction and identify any service gaps
Communicate transparently with the customer, keeping them informed about the steps being taken to address their concerns
Offer immediate solutions or workarounds to alleviate the customer's dissatisfaction
Implement necessar...read more
Q19. Which types of use case you will create for WAF?
WAF use cases include protection against OWASP Top 10 vulnerabilities, DDoS attacks, and web application attacks.
Protection against SQL injection attacks
Prevention of cross-site scripting (XSS) attacks
Blocking of malicious bots and crawlers
Mitigation of distributed denial-of-service (DDoS) attacks
Enforcement of security policies and compliance regulations
Monitoring and logging of web traffic for threat detection and incident response
Q20. Shearing Characteristics of a Natural Cemented Gravel Soil Trough Large in situ Direct Shear Test Flexural Strength of Concrete
The question is not relevant to the CRM/Customer Service Manager position.
The question seems to be related to geotechnical engineering or construction materials testing.
It may be useful for someone working in those fields, but not for a CRM/Customer Service Manager.
It's important to stay focused on the job requirements and responsibilities when interviewing for a position.
Q21. Have you created use cases with multiple devices?
Yes, I have created use cases with multiple devices.
I have experience creating use cases for mobile and desktop devices.
I have also created use cases for wearable devices and IoT devices.
One example is when I created use cases for a mobile app that could be used in conjunction with a smartwatch.
Another example is when I created use cases for a web application that could be accessed from both desktop and mobile devices.
Q22. Characteristics of a Natural Cemented Gravel Soil Trough Large in situ Direct Shear Test Flexural Strength of Concrete
The question is not relevant to the job position of CRM/Customer Service Manager.
The question seems to be related to civil engineering or geology.
It may require knowledge of natural cemented gravel soil and its properties.
The in situ direct shear test and flexural strength of concrete are specific testing methods.
Answering this question may require expertise in the field of civil engineering or geology.
Q23. How will you handle production deployment issues?
I will troubleshoot the issue, identify the root cause, and work with the team to implement a solution while minimizing downtime.
Quickly assess the situation and gather relevant information
Identify the root cause of the deployment issue
Collaborate with team members to come up with a solution
Implement the solution while minimizing impact on production environment
Communicate with stakeholders about the issue and resolution
Q24. Difference between password spraying and brute-force attack?
Password spraying is trying a few commonly used passwords on multiple accounts, while brute-force attack is trying all possible combinations of characters to crack a password.
Password spraying is a type of attack where a few commonly used passwords are tried on multiple accounts to gain unauthorized access.
Brute-force attack is a type of attack where all possible combinations of characters are tried to crack a password.
Password spraying is a less time-consuming attack as comp...read more
Q25. what is networking and osi model
Networking is the practice of connecting devices to share resources. OSI model is a conceptual framework for network communication.
Networking involves connecting devices to share resources such as data, printers, and internet access.
OSI model is a conceptual framework that defines how data is transmitted over a network.
It consists of seven layers, each with a specific function, from physical transmission to application-level communication.
The layers are: Physical, Data Link, ...read more
Q26. What is meant by bandwidth?
Bandwidth refers to the amount of data that can be transmitted over a network or internet connection in a given amount of time.
Bandwidth is measured in bits per second (bps)
Higher bandwidth means faster data transfer rates
Bandwidth can be limited by factors such as network congestion or hardware limitations
Examples of high bandwidth applications include video streaming and online gaming
Q27. Which is the best use case that you have created?
Developed a use case for streamlining team communication and task management
Created a centralized platform for team members to communicate and collaborate on tasks
Implemented task tracking and progress monitoring features
Reduced miscommunication and increased productivity
Received positive feedback from team members and management
Q28. what do you know about ipv4 vs ipv6,ip masking and more computer network related stuff
IPv4 and IPv6 are internet protocol versions. IP masking is a technique to hide IP addresses.
IPv4 is the fourth version of the Internet Protocol, while IPv6 is the sixth version.
IPv4 uses 32-bit addresses, allowing for approximately 4.3 billion unique addresses.
IPv6 uses 128-bit addresses, providing a significantly larger address space.
IP masking, also known as IP anonymization, is the process of hiding the IP address of a device or user.
It is commonly used for privacy protec...read more
Q29. What is the use of networking in a company?
Networking in a company allows for communication, data sharing, resource sharing, and collaboration among employees and departments.
Facilitates communication between employees, departments, and branches
Enables sharing of resources such as printers, servers, and internet connection
Allows for centralized data storage and access
Facilitates collaboration on projects and tasks
Enhances security through network monitoring and access control
Q30. Describe how proper documentation applies in clinical research
Proper documentation in clinical research ensures accuracy, traceability, and compliance with regulations.
Proper documentation helps in maintaining accurate records of all research activities and findings.
It ensures traceability of data, allowing for verification and replication of results.
Documentation is essential for compliance with regulatory requirements and ethical standards.
Examples include keeping detailed records of study protocols, informed consent forms, data colle...read more
Q31. Q1. Describe how proper documentation applies in clinical research
Proper documentation in clinical research ensures accuracy, transparency, and compliance with regulations.
Proper documentation helps in maintaining accurate records of study procedures, data collection, and analysis.
It ensures transparency by allowing other researchers to verify the results and replicate the study if needed.
Documentation is essential for compliance with regulatory requirements and ethical standards.
Examples of documentation in clinical research include study ...read more
Q32. Natural Cemented Gravel Soil Trough Large in situ Direct Shear Test Flexural Strength of Concrete
The question is not related to CRM/Customer Service Manager role.
The question seems to be related to civil engineering or construction field.
It may require knowledge of soil mechanics and concrete testing.
As a CRM/Customer Service Manager, this question may not be relevant to the job responsibilities.
It is important to clarify the relevance of the question to the job role before answering.
Q33. What is DWDM, SDH Equipments knowledge
DWDM stands for Dense Wavelength Division Multiplexing and SDH stands for Synchronous Digital Hierarchy. Knowledge of these equipments is essential for managing network infrastructure.
DWDM is a technology that multiplexes multiple optical carrier signals on a single optical fiber by using different wavelengths of laser light.
SDH is a standardized multiplexing protocol used to transfer data over optical fibers.
Understanding the functionalities, configurations, and troubleshoot...read more
Q34. Tell us about computer
A computer is an electronic device that can perform various tasks by executing instructions given to it.
Computers can be used for communication, entertainment, education, and work.
They consist of hardware components such as a central processing unit (CPU), memory, and storage devices.
Software programs are used to control and operate the computer.
Examples of computers include desktops, laptops, tablets, and smartphones.
Q35. How you deal with critical situation in Data Center
Q36. How much transfer customer
The question is unclear and lacks context.
Request clarification on what is meant by 'transfer customer'
Ask for more information about the specific role and responsibilities of an Assistant Manager
Seek clarification on the purpose or objective behind the question
Q37. How to swap two variables without using third variable
To swap two variables without using a third variable, use arithmetic operations.
Use addition and subtraction to swap values
Example: a = 5, b = 10. a = a + b (a = 15), b = a - b (b = 5), a = a - b (a = 10)
Q38. What is ospf,and how to work.
OSPF is a routing protocol used in computer networks to determine the best path for data to travel.
OSPF stands for Open Shortest Path First.
It is a link-state routing protocol.
It uses Dijkstra's algorithm to calculate the shortest path.
OSPF routers exchange information about their connected links to build a topology map of the network.
This allows the routers to determine the best path for data to travel.
OSPF is commonly used in large enterprise networks.
It is also used in int...read more
Q39. What is MAC? Explain in brief.
MAC stands for Media Access Control. It is a unique identifier assigned to network interfaces for communication.
MAC address is a 48-bit address assigned to network devices.
It is used to identify devices on a network.
MAC addresses are assigned by the manufacturer and cannot be changed.
MAC filtering is a security feature that allows or denies access to a network based on MAC addresses.
Example: 00:1A:2B:3C:4D:5E is a MAC address.
Q40. Can you write a program to demonstrate soccket programming
Yes
Socket programming is a way to establish communication between two computers over a network using sockets.
It involves creating a socket, binding it to an IP address and port, listening for incoming connections, and sending/receiving data.
Examples of socket programming include creating a chat application, a file transfer program, or a web server.
Q41. Tell about your technical Expertise in master data management.
I have extensive experience in designing and implementing master data management solutions to ensure data accuracy and consistency.
Designed and implemented data governance policies and procedures
Developed data quality rules and processes
Integrated data from multiple sources to create a single, unified view of data
Utilized tools such as Informatica MDM or IBM InfoSphere MDM
Worked closely with business stakeholders to understand data requirements and ensure alignment with busin...read more
Q42. What is OSI model .explain layers of OSI model
The OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.
OSI stands for Open Systems Interconnection.
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the adjacent layers.
The Physical layer deals with the physical transmission of data.
The Data Link layer provides error-free transfer of dat...read more
Q43. How would you define ports of a Router?
Ports of a router are physical connection points that allow devices to connect to the network.
Ports on a router can include Ethernet ports, USB ports, and WAN ports.
Each port serves a specific function, such as connecting a computer or printer to the network.
Routers may have different types and numbers of ports, depending on the model and manufacturer.
Ports can be used for wired or wireless connections, depending on the device being connected.
Q44. What do you know about Data Science?
Data Science is an interdisciplinary field that involves the use of statistical and computational methods to extract insights from data.
Data Science involves the use of various techniques such as machine learning, data mining, and predictive analytics.
It is used to solve complex problems and make data-driven decisions.
Data Science is used in various industries such as healthcare, finance, and e-commerce.
Examples of Data Science applications include fraud detection, recommenda...read more
Q45. What all is required during Annual Operating Plan creation
Annual Operating Plan creation requires detailed financial analysis, goal setting, resource allocation, and cross-functional collaboration.
Detailed financial analysis of past performance and future projections
Setting specific goals and targets for revenue, expenses, and other key metrics
Allocating resources effectively to achieve the set goals
Collaborating with different departments to align strategies and ensure feasibility
Regular monitoring and adjustments throughout the ye...read more
Q46. What is Cyber kill chain?
Cyber kill chain is a framework that describes the stages of a cyber attack.
It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
The framework helps organizations understand and defend against cyber attacks.
For example, if an attacker is in the reconnaissance stage, they are gathering information about the target.
By understanding the stages of a cyber attack, organizations can implemen...read more
Q47. What is practical Knowlage in IT?
Practical knowledge in IT refers to the ability to apply theoretical knowledge to real-world situations.
Understanding of networking protocols and technologies
Experience with troubleshooting and problem-solving
Knowledge of security best practices
Familiarity with different operating systems and software
Ability to adapt to new technologies and learn quickly
Q48. Any thing about telecommunication you might wanna share
Telecommunication is the transmission of information over long distances using technology.
Telecommunication involves the use of various devices and networks to transmit data, voice, and video.
Examples of telecommunication technologies include telephone networks, internet services, and satellite communication.
Telecommunication plays a crucial role in connecting people globally and enabling communication across different locations.
Advancements in telecommunication have led to f...read more
Q49. Do you have experience in Excel and PowerPoint?
Yes, I have extensive experience in Excel and PowerPoint.
Proficient in creating complex formulas and macros in Excel
Skilled in creating professional presentations in PowerPoint
Experience in data analysis and visualization using Excel and PowerPoint
Used Excel for budgeting and financial analysis
Created interactive dashboards in Excel for tracking key metrics
Q50. What do you know about ML algorithm?
ML algorithms are mathematical models used to analyze data and make predictions or decisions.
ML algorithms can be supervised, unsupervised, or semi-supervised
Examples of ML algorithms include linear regression, decision trees, and neural networks
ML algorithms require training data to learn from and improve their accuracy
The choice of algorithm depends on the problem being solved and the type of data available
Q51. Do you have knowledge of Pandas?
Yes, Pandas is a popular Python library used for data manipulation and analysis.
Pandas provides data structures for efficiently storing and manipulating large datasets.
It offers tools for data cleaning, merging, reshaping, and visualization.
Pandas can handle various data formats such as CSV, Excel, SQL databases, and JSON.
Example: df = pd.read_csv('data.csv') creates a Pandas DataFrame from a CSV file.
Example: df.groupby('category')['sales'].sum() groups sales data by categor...read more
Q52. What is reverse lookup
Reverse lookup is the process of finding the hostname associated with a given IP address.
It is commonly used in network troubleshooting.
It can be performed using the 'nslookup' command in the command prompt.
Reverse lookup is the opposite of forward lookup, which finds the IP address associated with a given hostname.
Q53. Why do you detect zero day threats using SIEM
SIEM is used to detect zero day threats as it provides real-time monitoring and analysis of security events.
SIEM collects and analyzes data from various sources to identify potential threats
Zero day threats are unknown vulnerabilities that can be exploited by attackers
SIEM can detect zero day threats by analyzing patterns and anomalies in network traffic
SIEM can also use threat intelligence feeds to identify known zero day threats
Detecting zero day threats using SIEM can help...read more
Q54. How you will design Battery bank capacity
Q55. In which equipment do you have competency
Q56. What is position property in CSS3
Position property in CSS3 is used to set the position of an element relative to its parent or the viewport.
The position property can take values like static, relative, absolute, fixed, and sticky.
Static is the default value and elements are positioned according to the normal flow of the document.
Relative positions the element relative to its normal position.
Absolute positions the element relative to its nearest positioned ancestor.
Fixed positions the element relative to the v...read more
Q57. Which device receives maximum EPS?
The device that receives maximum EPS varies depending on the context and industry.
In the telecommunications industry, the device that receives maximum EPS is the base station.
In the automotive industry, the device that receives maximum EPS is the electronic control unit (ECU).
In the medical industry, the device that receives maximum EPS varies depending on the specific medical device.
EPS stands for events per second and refers to the rate at which events are processed by a de...read more
Q58. which is no.1 telecommunications industry
The no.1 telecommunications industry is AT&T.
AT&T is a multinational conglomerate that provides telecommunications, media, and technology services.
It is one of the largest telecommunications companies in the world, offering a wide range of services such as wireless communication, internet, and TV services.
AT&T has a long history in the telecommunications industry and continues to innovate and expand its offerings.
Q59. Do you have knowledge of SAP.
Yes, I have knowledge of SAP.
I have experience working with SAP in my previous role as a Project Coordinator.
I am familiar with SAP modules such as MM, SD, and FI.
I have used SAP for project tracking, budgeting, and reporting.
I am comfortable navigating SAP's user interface and can troubleshoot basic issues.
Q60. Design & phase of network management??
Network management involves designing and implementing a system to monitor and control a network's performance.
Designing a network management system involves identifying the network's components and their interconnections.
The system must be able to monitor network traffic, identify problems, and alert administrators.
Network management systems can be centralized or distributed, depending on the size and complexity of the network.
Phases of network management include planning, i...read more
Q61. Defrence between BGP and ISIS protocol
BGP and ISIS are routing protocols used in computer networks.
BGP is used for routing between different autonomous systems while ISIS is used for routing within a single autonomous system.
BGP uses path vector protocol while ISIS uses link-state protocol.
BGP is more scalable and complex than ISIS.
BGP is used in the internet while ISIS is used in enterprise networks.
BGP supports both IPv4 and IPv6 while ISIS only supports IPv4.
Q62. What is BGP?
BGP stands for Border Gateway Protocol. It is a routing protocol used to exchange routing information between different networks on the internet.
BGP is used to connect different autonomous systems (AS) on the internet.
It is a path-vector protocol that selects the best path for data to travel between networks.
BGP is used by internet service providers (ISPs) to connect to each other and exchange routing information.
It is a complex protocol that requires careful configuration to...read more
Q63. What is rxjs observables in nagular
Observables are a way to handle asynchronous data streams in Angular using RxJS library.
Observables are similar to promises but can handle multiple values over time.
They can be used for handling events, HTTP requests, and other asynchronous operations.
Operators can be used to transform, filter, and combine observables.
Subscriptions are used to listen to observables and receive data.
Example: fetching data from an API using observables and subscribing to the response.
Q64. Route Reflector how does it work.
Route reflector is a networking concept that allows for efficient distribution of routing information.
Route reflectors are used in BGP (Border Gateway Protocol) networks to reduce the number of required peer connections.
They work by reflecting routes received from one peer to other peers, reducing the need for each peer to maintain a full mesh of connections.
Route reflectors can be configured in a hierarchy, with multiple levels of reflectors to handle larger networks.
They ca...read more
Q65. What is program management?
Program management is the process of overseeing multiple related projects to achieve specific organizational goals.
Program management involves coordinating and aligning multiple projects towards a common objective.
It focuses on strategic planning, resource allocation, and risk management.
Program managers ensure that projects are executed efficiently and effectively, meeting deadlines and delivering desired outcomes.
They provide leadership, guidance, and support to project tea...read more
Q66. Have you worked on Excel and PPT?
Yes, I have extensive experience working with Excel and PowerPoint.
Proficient in creating complex formulas, pivot tables, and charts in Excel
Skilled in designing professional presentations with animations and transitions in PowerPoint
Experience in data analysis and reporting using Excel and creating visually appealing slides in PowerPoint
Q67. What is Retail Management in store
Retail Management in store involves overseeing the day-to-day operations of a retail establishment.
Managing inventory and stock levels
Ensuring customer satisfaction and resolving complaints
Hiring, training, and scheduling staff
Analyzing sales data and implementing strategies to increase revenue
Maintaining store appearance and cleanliness
Q68. Which uses cases have created?
We have created use cases for customer onboarding, order management, and inventory tracking.
Customer onboarding: designed a process for new customers to sign up and create an account
Order management: created a system for tracking orders from placement to delivery
Inventory tracking: developed a method for monitoring stock levels and reordering when necessary
Q69. tell about Computer languages?
Computer languages are used to communicate instructions to computers, allowing programmers to create software and applications.
Computer languages are used to write code that tells computers what to do.
There are different types of computer languages, such as high-level languages like Python and Java, and low-level languages like Assembly.
Each language has its own syntax and rules for writing code.
Some languages are more suited for specific tasks, such as web development (HTML,...read more
Q70. How would you compromise a client
Compromising a client is not ethical. We focus on finding win-win solutions.
We prioritize understanding the client's needs and goals
We explore various options and alternatives
We communicate effectively and transparently
We aim to find a solution that benefits both parties
Q71. How you deal with product failure
I analyze the reasons for failure, gather feedback, and pivot the product strategy accordingly.
Analyze the root cause of the failure
Gather feedback from customers, stakeholders, and team members
Iterate on the product strategy based on the learnings
Communicate transparently with all stakeholders
Implement improvements and monitor the impact
Q72. Did you know about BMS architecture
Q73. What IP Address?
An IP address is a unique numerical identifier assigned to every device connected to the internet.
IP stands for Internet Protocol
IP addresses are used to identify devices on a network
There are two types of IP addresses: IPv4 and IPv6
IPv4 addresses are 32-bit numbers and IPv6 addresses are 128-bit numbers
Example of IPv4 address: 192.168.0.1
Example of IPv6 address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Q74. What is DNS exfiltration?
DNS exfiltration is a technique used to steal data by sending it out of a network via DNS queries.
It involves using DNS queries to send sensitive data outside of a network.
Attackers can use this technique to bypass firewalls and other security measures.
DNS exfiltration can be difficult to detect because DNS traffic is often allowed through firewalls.
Examples of data that can be exfiltrated via DNS include usernames, passwords, and other sensitive information.
Q75. Explain the entire Journey of Salesforce Order to Cash
Salesforce Order to Cash journey involves creating an order, processing it, invoicing, and receiving payment.
1. Order Creation: Sales team creates an order in Salesforce with customer details and products/services.
2. Order Processing: Order is processed by various departments like fulfillment, shipping, and billing.
3. Invoicing: An invoice is generated based on the order details and sent to the customer.
4. Payment Collection: Customer makes payment for the invoice through var...read more
Q76. What kind of device are you working on?
I am currently working on designing and testing a 5G small cell device.
Designing and testing a 5G small cell device
Working on optimizing the device's performance
Collaborating with cross-functional teams to ensure successful deployment
Conducting field tests to evaluate the device's capabilities
Q77. Routing protocaols and their merits demerits
Routing protocols are used to determine the best path for data to travel between networks.
There are two types of routing protocols: distance-vector and link-state.
Distance-vector protocols are simpler but less efficient than link-state protocols.
Examples of distance-vector protocols include RIP and IGRP.
Examples of link-state protocols include OSPF and IS-IS.
Routing protocols have different metrics to determine the best path, such as hop count or bandwidth.
Merits of routing p...read more
Q78. Why are capacitor are there in fans?
Capacitors in fans help to start the motor and regulate the speed of the fan.
Capacitors help to provide the initial torque needed to start the motor of the fan.
Capacitors also help to regulate the speed of the fan by controlling the flow of current.
In ceiling fans, capacitors are used to change the speed settings.
Capacitors in fans are essential for smooth operation and energy efficiency.
Q79. Job responsibilities of records managemen
Records management involves organizing, storing, and maintaining an organization's documents and information.
Creating and implementing records management policies and procedures
Organizing and categorizing physical and digital records
Ensuring compliance with record retention regulations
Managing document destruction and archiving processes
Training staff on proper records management practices
Q80. What is project management?
Project management is the process of planning, organizing, and overseeing the execution of a project from start to finish.
It involves defining project goals and objectives
Creating a project plan and timeline
Assigning tasks and responsibilities to team members
Monitoring progress and making adjustments as needed
Ensuring the project is completed on time, within budget, and meets quality standards
Q81. Design of Loadbalancer for Kubernetes
Designing a Loadbalancer for Kubernetes involves using an Ingress Controller to route traffic to different services.
Use an Ingress Controller to manage external access to services within a Kubernetes cluster
Define Ingress resources to specify how incoming requests should be routed
Consider using a cloud provider's load balancer service for external traffic
Implement SSL termination and routing rules in the Ingress Controller configuration
Q82. what is Requirement, what is payroll,
Requirement is the need or condition that must be met, while payroll is the process of calculating and distributing wages to employees.
Requirement is a specific need or condition that must be met in order to achieve a goal or fulfill a job role.
Payroll is the process of calculating and distributing wages to employees based on factors such as hours worked, salary, and deductions.
Examples of requirements include educational qualifications, work experience, and specific skills n...read more
Q83. Tell us in detail about TCO
Total Cost of Ownership (TCO) is a financial estimate that helps determine the direct and indirect costs associated with a product or service over its entire lifecycle.
TCO includes not only the initial purchase price but also costs related to maintenance, support, training, and disposal.
Calculating TCO helps organizations make informed decisions about sourcing and procurement.
For example, when comparing two suppliers, TCO analysis can reveal the supplier with the lower initia...read more
Q84. Explain glideajax, glide record, transform maps
GlideAjax, GlideRecord, Transform Maps are important concepts in ServiceNow development.
GlideAjax is used for asynchronous server-side calls in ServiceNow.
GlideRecord is used to query, insert, update, and delete records in ServiceNow tables.
Transform Maps are used to map data from external sources into ServiceNow tables.
GlideAjax example: Making a server-side call to retrieve data without refreshing the page.
GlideRecord example: Querying the 'incident' table to retrieve all o...read more
Q85. What is Closure in JS
Closure is a function that has access to its parent scope even after the parent function has returned.
Closure allows for private variables and functions in JavaScript.
It is created when a function returns another function.
The inner function has access to the outer function's variables and parameters.
Example: function outer() { let x = 10; return function inner() { console.log(x); } }
Example: const innerFunc = outer(); innerFunc(); // Output: 10
Q86. What is Prototype in JS
Prototype is a property of an object that allows adding new properties and methods to an object.
Prototype is a blueprint for creating objects
It allows inheritance by sharing properties and methods between objects
Modifying the prototype affects all objects created from it
Prototype chain allows accessing properties and methods of parent objects
Example: Array.prototype includes() method
Q87. What is Pipe in Angular
Pipe is a feature in Angular that allows transforming data before displaying it in the view.
Pipes are used to format and manipulate data in Angular templates.
They can be used to filter, sort, and transform data.
Pipes can be chained together to perform multiple transformations.
Angular provides built-in pipes like DatePipe, CurrencyPipe, and LowerCasePipe.
Custom pipes can also be created to meet specific requirements.
Q88. What is event loop lifecycle
Event loop is a continuous process that runs in the background and handles all the events in the application.
Event loop continuously checks for new events in the event queue.
It processes each event one by one in a synchronous manner.
If an event takes too long to process, it can block the event loop and cause the application to freeze.
Event loop can be controlled using setTimeout(), setInterval(), and setImmediate() methods.
Node.js uses a single thread to handle all the events...read more
Q89. What is BGP, MPLS?
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information across the Internet. MPLS (Multiprotocol Label Switching) is a technique for speeding up network traffic flow.
BGP is used to make core routing decisions on the Internet.
MPLS is used to speed up network traffic flow by allowing routers to make forwarding decisions based on labels instead of IP addresses.
BGP operates between different autonomous systems (AS), while MPLS operates within a si...read more
Q90. What is data entry skills
Data entry skills involve accurately and efficiently entering data into a computer system.
Accurate and fast typing skills
Attention to detail
Knowledge of data entry software and tools
Ability to organize and manage large amounts of information
Understanding of data confidentiality and security
Proficiency in using spreadsheets and databases
Familiarity with data entry procedures and techniques
Q91. What is directive in angular
A directive is a component that adds behavior to an existing element or component in Angular.
Directives are used to manipulate the DOM, add event listeners, and create reusable components.
There are three types of directives in Angular: component, attribute, and structural.
Examples of built-in directives in Angular include ngIf, ngFor, and ngStyle.
Custom directives can be created using the @Directive decorator.
Q92. What is component in angular
A component in Angular is a reusable piece of UI that consists of HTML, CSS, and TypeScript code.
Components are the building blocks of Angular applications.
Each component has its own logic and view.
Components can be nested within other components.
Components can communicate with each other using @Input and @Output decorators.
Examples of components include a login form, a navigation menu, and a product list.
Q93. Most important T-Code
The most important T-Code depends on the specific project and its requirements.
For project management, T-Code CJ20N is important for creating and managing project structures.
For financial management, T-Code FBL3N is important for viewing account balances and transactions.
For material management, T-Code MM01 is important for creating and maintaining material master records.
For human resources management, T-Code PA30 is important for maintaining employee master data.
For sales a...read more
Q94. How Deliverables are done
Deliverables are done through a collaborative effort of the team, following the Scrum framework.
The team works together to plan and prioritize the deliverables for each sprint.
The Scrum Master facilitates the process and ensures that the team is following the Scrum framework.
The team uses Agile methodologies to break down the work into smaller tasks and track progress.
The team delivers a potentially shippable product increment at the end of each sprint.
The Product Owner revie...read more
Q95. When DOD is confirmed
DOD is confirmed when the team agrees that all the acceptance criteria for the user stories have been met.
DOD is a shared understanding between the development team and the product owner.
It ensures that the increment is potentially releasable and meets the quality standards.
Examples of DOD include code review, automated testing, and documentation.
DOD should be reviewed and updated regularly to reflect the team's evolving practices and standards.
Q96. What is capacity management
Capacity management is the process of ensuring that an organization has the necessary resources to meet its current and future demands.
Capacity management involves analyzing and forecasting resource requirements.
It includes monitoring and optimizing resource utilization.
Capacity management helps in identifying and addressing potential bottlenecks or constraints.
Examples of resources managed in capacity management include IT infrastructure, workforce, and physical space.
Capaci...read more
Q97. what is regression testing?
Regression testing is the process of retesting modified software to ensure that the existing functionalities are not affected.
Regression testing is performed after making changes to the software to ensure that the modifications have not introduced new bugs or issues.
It involves re-executing previously executed test cases to verify that the existing functionalities still work as expected.
Regression testing helps in identifying any unintended side effects of code changes and en...read more
Q98. Tell me about Microwave?
Q99. What is costumer service ?
Customer service is the support and assistance provided to customers before, during, and after a purchase.
Customer service involves addressing customer inquiries, resolving issues, and providing guidance.
It includes ensuring customer satisfaction and building positive relationships with customers.
Examples of customer service include answering phone calls, responding to emails, and assisting customers in-store.
Q100. 2. Are you possible our location?
Yes, I am open to relocating for the position.
I am willing to relocate for the right opportunity
I am flexible and adaptable to new locations
I have relocated for previous positions and have had positive experiences
I am excited about the possibility of working with your team and contributing to the success of the company
More about working at Tata Communications
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month