Filter interviews by
I applied via Referral and was interviewed in Jan 2023. There were 4 interview rounds.
Tools & software functioning involves monitoring, troubleshooting, and optimizing network performance using various tools and software.
Monitoring network traffic and performance using tools like Wireshark, SolarWinds, and Nagios
Troubleshooting network issues with tools like Ping, Traceroute, and Netcat
Optimizing network performance with tools like Cisco Prime Infrastructure and Riverbed SteelCentral
I appeared for an interview before Jun 2016.
posted on 27 Dec 2015
Difference between #define and const
Both are used to define constants
#define is a preprocessor directive and replaces all occurrences of the defined identifier with the given value
const is a keyword and creates a read-only variable
const is type-safe and has better scope control than #define
Example: #define PI 3.14 vs const float PI = 3.14;
Example: #define MAX(a,b) ((a)>(b)?(a):(b)) vs const int MAX = (a)>(b)?(a):(b);
OSI layers are a conceptual model that describes the communication functions of a network.
Layer 1 (Physical): Transmits raw data bits over a physical medium
Layer 2 (Data Link): Provides error-free transfer of data frames between nodes
Layer 3 (Network): Routes data packets between networks
Layer 4 (Transport): Provides reliable data transfer between end systems
Layer 5 (Session): Establishes, manages, and terminates sessi...
Structure refers to the arrangement or organization of something.
Structure is the way something is put together or organized.
It can refer to physical objects, such as buildings or bridges, or abstract concepts, such as language or music.
Examples of structures include the skeletal structure of a human body, the organizational structure of a company, and the grammatical structure of a sentence.
Code for creating a node in linked list
Create a struct for the node with data and pointer to next node
Allocate memory for the node using malloc()
Assign data to the node
Assign the next pointer to NULL or the next node in the list
Encoders and decoders are used to convert data from one format to another.
Encoders convert analog signals to digital signals.
Decoders convert digital signals to analog signals.
Encoders are used in devices like cameras, sensors, and audio equipment.
Decoders are used in devices like televisions, radios, and DVD players.
One cryptographic technique is RSA, which uses public and private keys to encrypt and decrypt data.
RSA stands for Rivest-Shamir-Adleman, named after its creators.
It is a widely used asymmetric encryption algorithm.
RSA uses a public key to encrypt data and a private key to decrypt it.
The security of RSA is based on the difficulty of factoring large prime numbers.
RSA is used in various applications such as secure communi
B-Tree is a self-balancing tree data structure with multiple child nodes and is used for efficient disk access.
B-Tree has a root node, internal nodes, and leaf nodes.
Each node can have multiple child nodes.
The number of child nodes is fixed for a given B-Tree.
B-Tree is self-balancing, which means that the height of the tree is minimized.
B-Tree is used for efficient disk access as it reduces the number of disk accesses ...
I would bring my technical expertise and passion for problem-solving to contribute to Microsoft's mission of empowering people and organizations.
I would familiarize myself with Microsoft's products and services to better assist customers
I would actively seek out opportunities to learn and improve my skills
I would collaborate with my team and other departments to provide the best support possible
I would prioritize custo...
posted on 19 Jan 2021
I applied via Referral and was interviewed before Jan 2020. There were 3 interview rounds.
A grand parent child trigger scenario involves triggering an action in a child record based on changes in a grandparent record.
Create a trigger on the grandparent object to monitor changes
Use a trigger handler class to handle the logic for updating child records
Consider using trigger context variables to pass data between the grandparent and child triggers
Asynchronous Apex code to group opportunities by AccountId
Create a Queueable Apex class to handle the asynchronous processing
Query the opportunities and group them by AccountId using a Map
Implement the execute method to process the opportunities and return the grouped data
I applied via Company Website and was interviewed in Apr 2024. There was 1 interview round.
I applied via Company Website and was interviewed in Sep 2023. There was 1 interview round.
Validation rules are used to enforce data integrity in a database before and after insertion.
Validation rules before insert are used to check data integrity before adding a new record to the database.
Validation rules after insert are used to verify data integrity after a new record has been added.
Examples: Before insert - checking if a required field is filled, after insert - verifying if the data meets certain criteri
I applied via Referral and was interviewed in Apr 2024. There was 1 interview round.
Three-way handshake is a method used in TCP/IP network to establish a connection between a client and server.
Client sends a SYN packet to the server to initiate a connection
Server responds with a SYN-ACK packet to acknowledge the request
Client sends an ACK packet back to the server to confirm the connection
based on 1 interview
Interview experience
Member Technical Staff
529
salaries
| ₹12 L/yr - ₹44.8 L/yr |
Senior Member of Technical Staff
513
salaries
| ₹24 L/yr - ₹76.2 L/yr |
Technical Support Engineer
389
salaries
| ₹6.3 L/yr - ₹21 L/yr |
Technical Staff Member 3
254
salaries
| ₹18 L/yr - ₹60 L/yr |
Business Analyst
232
salaries
| ₹4.8 L/yr - ₹19 L/yr |
Oracle
Amdocs
Automatic Data Processing (ADP)
24/7 Customer