Filter interviews by
I applied via Shine
The processes followed in my current firm involve thorough analysis of business requirements, stakeholder collaboration, data gathering, and solution implementation.
Thoroughly analyze business requirements to understand the needs of stakeholders
Collaborate with stakeholders to gather feedback and ensure alignment with business goals
Gather data from various sources to support decision-making and solution development
Impl...
Use a loop to iterate through the dictionary and add up the values.
Iterate through the dictionary using a loop
Access each value and add it to a running total
Return the total sum
Some general questions
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Port security is a feature that restricts access to a network switch port based on the MAC address of the device connected to it.
Port security limits the number of MAC addresses allowed on a port.
It can be configured to shut down the port if unauthorized devices are detected.
Port security can be managed through configuration on the network switch.
Examples of port security management include setting maximum number of al...
LAN stands for Local Area Network, used for connecting devices within a limited area. WAN stands for Wide Area Network, used for connecting devices over a large geographical area.
LAN is typically used in homes, schools, and small businesses.
WAN is used to connect multiple LANs over a larger area, such as connecting offices in different cities.
LAN has higher data transfer speeds compared to WAN.
LAN is usually owned, con...
BGP is a routing protocol used to exchange routing information between different autonomous systems, while MPLS is a technology used to direct data packets through a network using labels.
BGP (Border Gateway Protocol) is a path vector protocol used to exchange routing information between different autonomous systems.
MPLS (Multiprotocol Label Switching) is a technology used to direct data packets through a network using ...
Network issues can be managed by identifying the problem, troubleshooting, implementing solutions, and monitoring for future issues.
Identify the root cause of the network issue
Troubleshoot the problem using network diagnostic tools
Implement solutions such as reconfiguring network settings or replacing faulty hardware
Monitor the network for any recurring issues
Communication with ISP involves establishing a connection and troubleshooting network issues.
Contact ISP's technical support for assistance
Provide relevant information such as account details and network configurations
Use tools like ping and traceroute to diagnose connectivity problems
Escalate issues if necessary to ensure timely resolution
Network strength can be checked using various tools and techniques.
Use network monitoring tools like Ping, Traceroute, and SNMP to check network performance.
Check signal strength and quality for wireless networks using tools like NetSpot or inSSIDer.
Analyze network traffic and bandwidth usage to identify any bottlenecks or issues.
Perform speed tests using websites like Speedtest.net to measure download and upload speed...
What people are saying about Velocis Systems
Testing types techniques include black box testing, white box testing, unit testing, integration testing, system testing, acceptance testing, and regression testing.
Black box testing focuses on the functionality of the software without looking at its internal code.
White box testing examines the internal code structure and logic of the software.
Unit testing involves testing individual units or components of the software...
Velocis Systems interview questions for popular designations
JavaScript is a programming language commonly used for web development.
JavaScript is a high-level, interpreted programming language.
It is used to make web pages interactive and dynamic.
JavaScript can be used for client-side and server-side development.
Commonly used frameworks/libraries include React, Angular, and Node.js.
SQL CTE stands for Common Table Expressions, which is a temporary result set that can be referenced within a SELECT, INSERT, UPDATE, or DELETE statement.
CTEs are defined using the WITH keyword in SQL.
They help improve readability and maintainability of complex queries.
CTEs can be recursive, allowing for hierarchical data querying.
Example: WITH cte AS (SELECT * FROM table_name) SELECT * FROM cte;
Get interview-ready with Top Velocis Systems Interview Questions
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
Find the frequency of the given String
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the corresponding layer on another device.
For example, the Physical la...
TCP and UDP are both protocols used for transmitting data over the internet, but they have different characteristics.
TCP (Transmission Control Protocol) is connection-oriented and ensures reliable delivery of data by using acknowledgments and retransmissions.
UDP (User Datagram Protocol) is connectionless and does not guarantee delivery of data, making it faster but less reliable than TCP.
TCP is commonly used for applic...
Basics maths and english
Some of the top questions asked at the Velocis Systems interview -
The duration of Velocis Systems interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 48 interviews
Interview experience
based on 723 reviews
Rating in categories
Network Engineer
324
salaries
| ₹1.8 L/yr - ₹8.2 L/yr |
Software Developer
254
salaries
| ₹2.5 L/yr - ₹10 L/yr |
Senior Software Developer
226
salaries
| ₹3.6 L/yr - ₹15 L/yr |
Senior Software Engineer
152
salaries
| ₹4.3 L/yr - ₹17 L/yr |
Software Engineer
143
salaries
| ₹2.5 L/yr - ₹12 L/yr |
TCS
Wipro
Infosys
HCLTech