Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed before Oct 2022. There were 2 interview rounds.
An IP address is a unique numerical label assigned to each device connected to a computer network.
IP address stands for Internet Protocol address.
It is used to identify and locate devices on a network.
There are two types of IP addresses: IPv4 and IPv6.
IPv4 addresses are written in the format xxx.xxx.xxx.xxx, where each 'xxx' can be a number from 0 to 255.
IPv6 addresses are written in a longer format and are used to acc...
VTP is a protocol used to manage VLAN configurations across a network, while VLAN is a logical grouping of devices within a network.
VTP (VLAN Trunking Protocol) is used to synchronize VLAN information across switches in a network.
VLAN (Virtual Local Area Network) is a logical grouping of devices based on factors like department, function, or location.
VTP helps in reducing the administrative overhead of manually configu...
Fiber cable issue refers to problems or faults in the fiber optic cables used for network communication.
Fiber cable damage from bending or crushing
Fiber cable connection issues
Fiber cable contamination affecting signal quality
A port channel is a method used to bundle multiple physical ports together to increase bandwidth and redundancy. A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Port channel is used to increase bandwidth and redundancy by bundling multiple physical ports together
Firewall is a network security device that monitors and controls...
Top trending discussions
The person can escape the island by creating a firebreak or finding a body of water.
Create a firebreak by clearing a path of grass around oneself to prevent the fire from spreading.
Look for a body of water such as a lake, river, or ocean to escape the fire.
If no water source is available, try to find a sheltered area with less dry grass to wait for the fire to pass.
Use any available tools or materials to help create a
Mechanical Engineering offers a diverse range of opportunities to apply scientific principles to solve real-world problems.
Mechanical Engineering provides a strong foundation in math, physics, and materials science.
It offers a wide range of career opportunities in various industries such as automotive, aerospace, and manufacturing.
Mechanical Engineers design and develop machines, tools, and systems that improve our dai...
I am a software engineer with experience in developing web applications and mobile apps.
I have a degree in Computer Science
I have worked with Java, Python, and JavaScript
I have experience with front-end frameworks like React and Angular
I have developed mobile apps using React Native
I am familiar with Agile methodologies
I have a passion for software development and enjoy the challenges it presents.
I have always been interested in technology and programming
I have taken courses and completed projects in software development
I enjoy problem-solving and finding efficient solutions
I believe software engineering is a constantly evolving field with endless opportunities for growth
A program to check if a given number is prime or not.
A prime number is a number that is only divisible by 1 and itself.
Start checking from 2 up to the square root of the number.
If the number is divisible by any number in the range, it is not prime.
Otherwise, it is prime.
Optimization: check only odd numbers after 2.
Fibonacci program generates a series of numbers where each number is the sum of the two preceding ones.
The program can be implemented using recursion or iteration.
The first two numbers in the series are always 0 and 1.
The next number is the sum of the previous two numbers.
Example: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 233, 377, 610, 987, 1597, 2584, 4181, 6765, 10946, 17711, 28657, 46368, 75025, 121393, 196418,...
Flowchart for two programs
Identify inputs and outputs
Determine program logic
Create decision points and loops
Connect program components
Include error handling
Test and debug
Document the flowchart
Find sum of all numbers formed from root to leaf path in a binary tree
Traverse the binary tree using DFS
At each leaf node, add the number formed from root to leaf path to a sum variable
Return the sum variable
Time complexity: O(n)
Example: For a binary tree with root value 1, left child 2 and right child 3, the sum would be 12 + 13 = 25
Given a string, print all possible strings that can be made by placing spaces (zero or one) in between them.
Use recursion to generate all possible combinations of spaces
For each recursive call, either add a space or don't add a space between the current character and the next character
Base case is when there are no more characters left to add spaces between
Time complexity is O(2^n) where n is the length of the string
Preorder traversal without recursion
Use a stack to keep track of nodes
Push right child first and then left child onto stack
Pop top of stack and print value
Repeat until stack is empty
Find longest continuous patch on a 12 km road with updates in patches
Maintain a variable to keep track of current patch length
Update the variable whenever a new patch is added
Maintain a variable to keep track of longest patch so far
Compare current patch length with longest patch length and update if necessary
Use a sorted data structure like a binary search tree to store the patches for efficient search
Time complexity: ...
Find median of an unsorted array.
Sort the array and find the middle element
Use quickselect algorithm to find the median in O(n) time
If the array is small, use brute force to find the median
Find 'k' elements closest to a given number from a stream of characters.
Use a priority queue to keep track of closest elements.
Update the queue as new characters come in.
Return the 'k' closest elements from the queue.
Design a data structure with O(1) insert, remove, find-max, and delete-max operations.
Use a doubly linked list to maintain the elements in sorted order.
Use a hash table to store the pointers to the nodes in the linked list.
Maintain a pointer to the maximum element in the hash table.
Update the pointers in the hash table when inserting or removing elements.
Update the maximum pointer when deleting or inserting the maximum
Check if a given linked list is a palindrome.
Traverse the linked list and store the values in an array.
Compare the first and last elements of the array, then move towards the center.
If all elements match, the linked list is a palindrome.
Alternatively, use two pointers to find the middle of the linked list and reverse the second half.
Compare the first half with the reversed second half to check for a palindrome.
based on 21 reviews
Rating in categories
Network Engineer
46
salaries
| ₹2.5 L/yr - ₹4.2 L/yr |
Network Support Engineer
17
salaries
| ₹2 L/yr - ₹3.8 L/yr |
Network Support Engineer L1
6
salaries
| ₹2.8 L/yr - ₹3.8 L/yr |
Information Technology Support Engineer
3
salaries
| ₹3 L/yr - ₹4.3 L/yr |
Network Engineer L1
3
salaries
| ₹3.8 L/yr - ₹6.9 L/yr |
TCS
Accenture
Wipro
Cognizant