Filter interviews by
I use Kubernetes to manage containerized applications, automate deployment, scaling, and operations.
Utilize Kubernetes to orchestrate and manage containers for seamless deployment and scaling
Leverage Kubernetes for automated rollouts and rollbacks of applications
Implement Kubernetes for load balancing and service discovery
Use Kubernetes for monitoring and logging of containerized applications
Top trending discussions
posted on 14 Aug 2024
30min, DSA related question
EVPN VXLAN topology explanation
EVPN (Ethernet VPN) is a technology used to extend Layer 2 connectivity across a Layer 3 network
VXLAN (Virtual Extensible LAN) is a tunneling protocol used to overlay virtualized Layer 2 networks over Layer 3 networks
EVPN VXLAN topology combines the benefits of both technologies to provide scalable and flexible network virtualization
It allows for efficient communication between virtual ma...
I applied via LinkedIn and was interviewed in Jan 2024. There was 1 interview round.
Design a routing table with insert, delete, and forward functionality in a defined class.
Create a class called RoutingTable with methods for insert, delete, and forward
Use a data structure like a hash table or tree to store routing information
Implement insert method to add new routes, delete method to remove routes, and forward method to look up and forward packets
posted on 20 Jul 2024
I was interviewed before May 2021.
Round duration - 45 minutes
Round difficulty - Easy
Technical Interview round with questions on DSA
For the given binary tree
The ...
A queue can be used to do level order traversal of the tree. For each node, first visit the node and then push its children nodes in the FIFO queue.
printLevelorder(tree)
1) Create an empty queue q
2) temp_node = root /*start from root*/
3) Loop while temp_node is not NULL
a) print temp_node->data.
b) Enqueue temp_node’s children
(first left then right children) to q
c) Dequeue a node from q.
Time Complexity: O(n...
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on Networking.
Various components of IP Packet Header
Following are various components/fields of IP packet header
Version: The first IP header field is a 4-bit version indicator. In IPv4, the value of its four bits is set to 0100, which indicates 4 in binary.
Internet Header Length: Internet header length, shortly known as IHL, is 4 bits in size. It is also called HELEN (Header Length). This IP component is used to show how many 32-bit words are present in the header.
...
Difference between TCP and UDP
TCP reads data as streams of bytes, and the message is transmitted to segment boundaries. UDP messages contain packets that were sent one by one. It also checks for integrity at the arrival time.
TCP messages make their way across the internet from one computer to another. UDP is not connection-based, so one program can send lots of packets to another.
TCP rearranges data packets in the specific order. UDP protocol has n...
Various components of TCP Segment Header
Source port : 16 Bit number which identifies the Source Port number (Sending Computer's TCP Port).
Destination port : 16 Bit number which identifies the Destination Port number (Receiving Port).
Sequence number : 32 Bit number used for byte level numbering of TCP segments. If you are using TCP, each byte of data is assigned a sequence number. If SYN flag is set (during the initial three way handshake connection initiatio...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
IP packet header fields and their usage
Version: indicates the IP version being used (IPv4 or IPv6)
Header Length: specifies the length of the IP header
Type of Service: used to prioritize packets
Total Length: specifies the total length of the IP packet
Identification: used to identify fragments of a larger packet
Flags: used to control fragmentation
Fragment Offset: used to reassemble fragmented packets
Time to Live: specifi...
TCP packet header fields and their usage
TCP packet header consists of 20 bytes
Fields include source and destination ports, sequence and acknowledgement numbers, flags, window size, and checksum
Source and destination ports identify the endpoints of the connection
Sequence and acknowledgement numbers are used for reliable data transfer
Flags indicate the purpose of the packet, such as SYN, ACK, FIN, RST
Window size is used ...
A program to implement a dictionary using an array of strings.
Use an array of strings to store the words and their definitions.
Implement functions to add, delete, and search for words.
Consider using a hash table for faster search times.
Implement a telephone directory program using an array of strings.
Create an array of strings to store the directory
Implement functions to add, delete, and search for entries
Consider using a hash table for faster search times
Include error handling for invalid input
TCP is a reliable, connection-oriented protocol while UDP is a faster, unreliable, connectionless protocol.
TCP ensures data delivery and error checking while UDP does not.
TCP establishes a connection before data transfer while UDP does not.
TCP is used for applications that require reliable data transfer like email, file transfer, etc. while UDP is used for applications that require speed like online gaming, video strea
Security is important in a system to protect against unauthorized access, data breaches, and cyber attacks.
Prevents unauthorized access to sensitive data
Protects against data breaches and cyber attacks
Ensures confidentiality, integrity, and availability of data
Compliance with regulations and standards
Maintains trust and confidence of customers and stakeholders
Printing a tree in level order
Use a queue to store nodes in level order
Enqueue root node and print its value
Dequeue the node and enqueue its children
Repeat until queue is empty
Swapping two particular bits of an integer program.
Use bitwise operators to get the values of the two bits to be swapped
Use XOR operator to swap the bits
Shift the bits back to their original positions
Example: Swapping 2nd and 5th bits of 8 (1000) gives 32 (100000)
Example code: num ^= (1 << bit1) | (1 << bit2);
based on 2 reviews
Rating in categories
Senior Software Engineer
16
salaries
| ₹11 L/yr - ₹23.1 L/yr |
Software Engineer
14
salaries
| ₹10 L/yr - ₹12.6 L/yr |
Staff Software Engineer
14
salaries
| ₹19 L/yr - ₹30 L/yr |
Test Engineer Staff
12
salaries
| ₹19 L/yr - ₹36.8 L/yr |
Principal Software Engineer
9
salaries
| ₹33 L/yr - ₹49 L/yr |
TCS
Infosys
Wipro
HCLTech