Filter interviews by
Clear (1)
Top trending discussions
I was interviewed in Dec 2016.
posted on 27 Dec 2015
Difference between #define and const
Both are used to define constants
#define is a preprocessor directive and replaces all occurrences of the defined identifier with the given value
const is a keyword and creates a read-only variable
const is type-safe and has better scope control than #define
Example: #define PI 3.14 vs const float PI = 3.14;
Example: #define MAX(a,b) ((a)>(b)?(a):(b)) vs const int MAX = (a)>(b)?(a):(b);
OSI layers are a conceptual model that describes the communication functions of a network.
Layer 1 (Physical): Transmits raw data bits over a physical medium
Layer 2 (Data Link): Provides error-free transfer of data frames between nodes
Layer 3 (Network): Routes data packets between networks
Layer 4 (Transport): Provides reliable data transfer between end systems
Layer 5 (Session): Establishes, manages, and terminates sessi...
Structure refers to the arrangement or organization of something.
Structure is the way something is put together or organized.
It can refer to physical objects, such as buildings or bridges, or abstract concepts, such as language or music.
Examples of structures include the skeletal structure of a human body, the organizational structure of a company, and the grammatical structure of a sentence.
Code for creating a node in linked list
Create a struct for the node with data and pointer to next node
Allocate memory for the node using malloc()
Assign data to the node
Assign the next pointer to NULL or the next node in the list
Encoders and decoders are used to convert data from one format to another.
Encoders convert analog signals to digital signals.
Decoders convert digital signals to analog signals.
Encoders are used in devices like cameras, sensors, and audio equipment.
Decoders are used in devices like televisions, radios, and DVD players.
One cryptographic technique is RSA, which uses public and private keys to encrypt and decrypt data.
RSA stands for Rivest-Shamir-Adleman, named after its creators.
It is a widely used asymmetric encryption algorithm.
RSA uses a public key to encrypt data and a private key to decrypt it.
The security of RSA is based on the difficulty of factoring large prime numbers.
RSA is used in various applications such as secure communi
Public and private keys are used for secure communication and encryption.
Public key is used for encryption and can be shared with anyone.
Private key is used for decryption and should be kept secret.
They are used in various security protocols like SSL, SSH, and PGP.
Example: When you visit a website with SSL, your browser uses the website's public key to encrypt data, which can only be decrypted by the website's private ...
Steps to follow when a customer reports inability to edit in Microsoft Word
Ask the customer if they are receiving any error messages
Check if the document is in read-only mode
Check if the customer has the necessary permissions to edit the document
Check if the customer's version of Microsoft Word is up to date
Try repairing or reinstalling Microsoft Word
If all else fails, escalate the issue to a higher level of support
B-Tree is a self-balancing tree data structure with multiple child nodes and is used for efficient disk access.
B-Tree has a root node, internal nodes, and leaf nodes.
Each node can have multiple child nodes.
The number of child nodes is fixed for a given B-Tree.
B-Tree is self-balancing, which means that the height of the tree is minimized.
B-Tree is used for efficient disk access as it reduces the number of disk accesses ...
I would bring my technical expertise and passion for problem-solving to contribute to Microsoft's mission of empowering people and organizations.
I would familiarize myself with Microsoft's products and services to better assist customers
I would actively seek out opportunities to learn and improve my skills
I would collaborate with my team and other departments to provide the best support possible
I would prioritize custo...
I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.
To set a user expiry date, you can use a combination of user management tools and scripting languages.
Use user management tools like Active Directory or LDAP to set an expiry date for a user account.
In Active Directory, you can set the 'Account Expires' attribute for a user to specify the expiry date.
In LDAP, you can set the 'shadowExpire' attribute to specify the expiry date.
You can also use scripting languages like P...
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
I applied via Campus Placement and was interviewed in Sep 2023. There were 3 interview rounds.
2 question easy level
I applied via Naukri.com and was interviewed in Sep 2020. There was 1 interview round.
No, two different users cannot have the same UID.
UID (User ID) is a unique identifier assigned to each user in a system.
Having two different users with the same UID can cause conflicts and security issues.
UIDs are typically assigned sequentially and are unique within a system.
For example, in Linux systems, UID 0 is reserved for the root user and cannot be assigned to any other user.
To create a new user without useradd or add user command, use the usermod command.
Use the usermod command with the -u option to create a new user
Specify the username and user ID as arguments
Example: usermod -u 1001 newuser
Create a home directory for the new user manually
Yes, group name can be changed. The procedure involves accessing the group settings and editing the name.
Access the group settings
Click on the group name
Edit the name
Save changes
The root user name can be changed by modifying the /etc/passwd file.
Open the /etc/passwd file in a text editor
Locate the line that starts with 'root'
Change the username in the first field to the desired name
Save and close the file
Restart the system or use the 'su' command to switch to the new username
I applied via Recruitment Consulltant and was interviewed before Jul 2023. There were 3 interview rounds.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Member Technical Staff
564
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Member of Technical Staff
509
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Support Engineer
399
salaries
| ₹0 L/yr - ₹0 L/yr |
Business Analyst
255
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Staff Member 3
250
salaries
| ₹0 L/yr - ₹0 L/yr |
Microsoft Corporation
Oracle
IBM
SAP