VMware Software
200+ Floyd Inc Interview Questions and Answers
Q1. Next Smallest Palindrome Problem Statement
Find the next smallest palindrome strictly greater than a given number 'N' represented as a string 'S'.
Explanation:
You are given a number in string format, and your ...read more
Find the next smallest palindrome greater than a given number represented as a string.
Iterate from the middle of the number and mirror the left side to the right side to create a palindrome
If the resulting palindrome is greater than the input number, return it
Handle cases where the number has all 9s and requires a carry over to the left side
Q2. Reverse the String Problem Statement
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
Example:
Input:
STR = "abcde"
Output:
"edcba"
Input...read more
Reverse a given string containing alphabets, numbers, and special characters.
Create a function that takes a string as input
Iterate through the string in reverse order and append each character to a new string
Return the reversed string
Q3. You are given a binary array with N elements: d[0], d[1], ... d[N - 1]. You can perform AT MOST one move on the array: choose any two integers [L, R], and flip all the elements between (and including) the L-th...
read moreQ4. Check Permutation Problem Statement
Given two strings 'STR1' and 'STR2', determine if they are anagrams of each other.
Explanation:
Two strings are considered to be anagrams if they contain the same characters,...read more
Check if two strings are anagrams of each other by comparing their characters.
Create a character frequency map for both strings and compare them.
Sort both strings and compare if they are equal.
Use a hash set to store characters from one string and remove them while iterating through the other string.
Check if the character counts of both strings are equal.
Example: For input 'listen' and 'silent', the output should be true.
Q5. Search In Rotated Sorted Array Problem Statement
Given a rotated sorted array ARR
of size 'N' and an integer 'K', determine the index at which 'K' is present in the array.
Note:
1. If 'K' is not present in ARR,...read more
Given a rotated sorted array, find the index of a given integer 'K'.
Perform binary search to find the pivot point where the array is rotated.
Based on the pivot point, apply binary search on the appropriate half of the array to find 'K'.
Handle cases where 'K' is not present in the array by returning -1.
Example: For ARR = [12, 15, 18, 2, 4] and K = 2, the index of K is 3.
Q6. How does HA works? Port number? How many host failure allowed and why? ANS--> Maximum allowed host failures within a HA cluster is 4. What happens if 4 hosts have failed and a 5th one also fails. I have still e...
read moreVMware HA allows for a maximum of 4 host failures within a cluster. If a 5th host fails, VMs may not restart depending on admission control settings.
Maximum allowed host failures within a HA cluster is 4
If a 5th host fails and admission control is enabled, some VMs may not restart due to resource constraints
If admission control is disabled, VMs will restart on any remaining host but may not be functional
Ensure enough port groups are configured on vSwitch for Virtual Machine p...read more
Use a stack data structure for implementing undo and redo operations.
Stack data structure is ideal for implementing undo and redo operations as it follows Last In First Out (LIFO) principle.
Push the state of the system onto the stack when an action is performed, allowing for easy undo by popping the top element.
Redo operation can be implemented by keeping a separate stack for redo actions.
Example: In a text editor, each change in text can be pushed onto the stack for undo and...read more
Q8. Docker command to transfer an image from one machine to another without using docker registry
Docker save and Docker load commands can be used to transfer an image from one machine to another without using a Docker registry.
Use the 'docker save' command to save the image as a tar file on the source machine
Transfer the tar file to the destination machine using any file transfer method (e.g., scp)
On the destination machine, use the 'docker load' command to load the image from the tar file
Q9. Minimum Jumps Problem Statement
Bob and his wife are in the famous 'Arcade' mall in the city of Berland. This mall has a unique way of moving between shops using trampolines. Each shop is laid out in a straight...read more
Calculate minimum jumps required to reach the last shop using trampolines, or return -1 if impossible.
Iterate through the array of shops while keeping track of the maximum reachable shop from the current shop.
If at any point the maximum reachable shop is less than the current shop, return -1 as it's impossible to reach the last shop.
Return the number of jumps made to reach the last shop.
Q10. Pair Sum in Binary Search Tree
Given a Binary Search Tree (BST) and a target value 'K', determine if there exist two unique elements in the BST such that their sum equals the target 'K'.
Explanation:
A BST is a...read more
Check if there exist two unique elements in a BST that sum up to a target value 'K'.
Traverse the BST in-order to get a sorted array of elements.
Use two pointers approach to find the pair sum in the sorted array.
Consider edge cases like duplicate elements or negative values.
Time complexity can be optimized to O(n) using a HashSet to store visited nodes.
Q11. Prerequisites for HA ? First, for clusters enabled for VMware HA, all virtual machines and their configuration files must reside on shared storage (Fibre Channel SAN, iSCSI SAN, or SAN iSCI NAS), because you ne...
read morePrerequisites for HA clusters in VMware environment
Virtual machines and configuration files must be on shared storage
Console network should have redundant network paths for reliable failure detection
Hosts in cluster must be part of a VMotion network for DRS with HA
Q12. Reverse Linked List Problem Statement
Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.
Input:
The first line of input is an integer T, rep...read more
Reverse a singly linked list by altering the links between nodes.
Iterate through the linked list and reverse the links between nodes
Use three pointers to keep track of the current, previous, and next nodes
Update the links between nodes until the end of the list is reached
Q13. Problem: Sort an Array of 0s, 1s, and 2s
Given an array/list ARR
consisting of integers where each element is either 0, 1, or 2, your task is to sort this array in increasing order.
Input:
The input starts with...read more
Sort an array of 0s, 1s, and 2s in increasing order.
Use a three-pointer approach to partition the array into sections of 0s, 1s, and 2s.
Iterate through the array and swap elements based on their values.
Time complexity should be O(n) to meet the constraints.
Q14. Tower of Hanoi Problem Statement
You have three rods numbered from 1 to 3, and 'N' disks initially stacked on the first rod in increasing order of their sizes (largest disk at the bottom). Your task is to move ...read more
Tower of Hanoi problem where 'N' disks need to be moved to another rod following specific rules in less than 2^N moves.
Implement a recursive function to move disks from one rod to another following the rules.
Use the concept of recursion and backtracking to solve the Tower of Hanoi problem efficiently.
Maintain a count of moves and track the movement of disks in a 2-D array/list.
Ensure that larger disks are not placed on top of smaller disks while moving.
Return the 2-D array/li...read more
Q15. Convert Array to Min Heap Task
Given an array 'ARR' of integers with 'N' elements, you need to convert it into a min-binary heap.
A min-binary heap is a complete binary tree where each internal node's value is ...read more
Convert the given array into a min-binary heap by modifying the array elements.
Iterate through the array and heapify each node starting from the last non-leaf node to the root node.
For each node, compare it with its children and swap if necessary to satisfy the min-heap property.
Continue this process until the entire array is converted into a min-heap.
Q16. Problem: Search In Rotated Sorted Array
Given a sorted array that has been rotated clockwise by an unknown amount, you need to answer Q
queries. Each query is represented by an integer Q[i]
, and you must determ...read more
Search for integers in a rotated sorted array efficiently.
Use binary search to find the pivot point where the array is rotated.
Based on the pivot point, apply binary search on the appropriate half of the array.
Return the index of the integer if found, else return -1.
Time complexity should be O(logN) for each query.
Q17. Reverse List In K Groups Problem Statement
You are provided with a linked list having 'N' nodes and an integer 'K'. Your task is to reverse the linked list in groups of size K. If the list is numbered from 1 to...read more
Reverse a linked list in groups of size K
Iterate through the linked list in groups of size K
Reverse each group of nodes
Handle cases where the last group may have fewer than K nodes
Q18. Reverse Stack with Recursion
Reverse a given stack of integers using recursion. You must accomplish this without utilizing extra space beyond the internal stack space used by recursion. Additionally, you must r...read more
Reverse a given stack of integers using recursion without using extra space or loops.
Use recursion to pop all elements from the original stack and store them in function call stack
Once the stack is empty, push the elements back in reverse order using recursion
Use the top(), pop(), and push() methods to manipulate the stack
Q19. Common Elements in Three Sorted Arrays
Given three sorted arrays A
, B
, and C
of lengths N
, M
, and K
respectively, your task is to find all elements that are present in all three arrays.
Input:
The first line co...read more
Find common elements in three sorted arrays and output them in order.
Iterate through all three arrays simultaneously using three pointers.
Compare elements at pointers and move pointers accordingly.
If elements are equal, add to result and move all pointers forward.
If elements are not equal, move pointer of smallest element forward.
Q20. Flip Bits Problem Explanation
Given an array of integers ARR
of size N, consisting of 0s and 1s, you need to select a sub-array and flip its bits. Your task is to return the maximum count of 1s that can be obta...read more
Given an array of 0s and 1s, find the maximum count of 1s by flipping a sub-array at most once.
Iterate through the array and keep track of the maximum count of 1s obtained by flipping a sub-array.
Consider flipping a sub-array from index i to j by changing 0s to 1s and vice versa.
Update the maximum count of 1s if the current count is greater.
Return the maximum count of 1s obtained after flipping a sub-array at most once.
You can block specific IPs on an EC2 instance in AWS by using security groups or network access control lists (NACLs).
Use security groups to block specific IPs by creating a new inbound rule with the IP address you want to block and setting the action to 'deny'.
Alternatively, you can use network access control lists (NACLs) to block specific IPs by adding a rule to deny traffic from the IP address you want to block.
Remember to prioritize the rules in the security group or NAC...read more
Q22. Reverse Number Problem Statement
Ninja is exploring new challenges and desires to reverse a given number. Your task is to assist Ninja in reversing the number provided.
Note:
If a number has trailing zeros, the...read more
Implement a function to reverse a given number, omitting trailing zeros.
Create a function that takes an integer as input and reverses it while omitting trailing zeros
Use modulo and division operations to extract digits and reverse the number
Handle cases where the reversed number has leading zeros by omitting them
Ensure the reversed number is within the constraints specified
Yes, I can design the bank architecture using basic OOP concepts in any programming language.
Create classes for entities like Bank, Account, Customer, Transaction, etc.
Use inheritance to model relationships between entities (e.g. SavingsAccount and CheckingAccount inheriting from Account).
Implement encapsulation to hide internal details of classes and provide public interfaces for interaction.
Utilize polymorphism to allow different classes to be treated as instances of a comm...read more
Q24. Check If Preorder Traversal Is Valid
Determine whether a given array ARR
of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).
A binary search tree (BST) is a tree structure where ea...read more
Check if a given array of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).
Create a function that takes the array as input and checks if it satisfies the properties of a BST preorder traversal.
Iterate through the array and maintain a stack to keep track of the nodes in the BST.
Compare each element with the top of the stack to ensure it follows the BST property.
If the array is a valid preorder traversal of a BST, return 1; otherwise, return 0.
Q25. Remove Duplicates From Unsorted Linked List Problem Statement
You are provided with a linked list consisting of N nodes. Your task is to remove duplicate nodes such that each element occurs only once in the lin...read more
Remove duplicates from an unsorted linked list while preserving the order of nodes.
Iterate through the linked list while keeping track of seen elements using a hash set.
If a duplicate element is encountered, skip it by adjusting the pointers.
Ensure the order of nodes is preserved by only keeping the first occurrence of each element.
Q26. First and Last Position of an Element in a Sorted Array
Given a sorted array/list ARR
consisting of ‘N’ elements, and an integer ‘K’, your task is to find the first and last occurrence of ‘K’ in ARR
.
Explanatio...read more
Find the first and last occurrence of a given element in a sorted array.
Use binary search to find the first occurrence of the element.
Use binary search to find the last occurrence of the element.
Handle cases where the element is not present in the array.
Q27. Intersection of Two Arrays Problem Statement
Given two arrays A
and B
with sizes N
and M
respectively, both sorted in non-decreasing order, determine their intersection.
The intersection of two arrays includes ...read more
The problem involves finding the intersection of two sorted arrays efficiently.
Use two pointers to iterate through both arrays simultaneously.
Compare elements at the pointers and move the pointers accordingly.
Handle cases where elements are equal or not equal to find the intersection.
Return the intersection as an array of common elements.
Q28. Segregate Odd-Even Problem Statement
In a wedding ceremony at NinjaLand, attendees are blindfolded. People from the bride’s side hold odd numbers, while people from the groom’s side hold even numbers. For the g...read more
Rearrange a linked list such that odd numbers appear before even numbers while preserving the order of appearance.
Iterate through the linked list and maintain two separate lists for odd and even numbers.
Merge the two lists while preserving the order of appearance.
Ensure to handle edge cases like empty list or list with only odd or even numbers.
Q29. Convert Sorted Array to BST Problem Statement
Given a sorted array of length N
, your task is to construct a balanced binary search tree (BST) from the array. If multiple balanced BSTs are possible, you can retu...read more
Construct a balanced binary search tree from a sorted array.
Create a function that recursively constructs a balanced BST from a sorted array.
Use the middle element of the array as the root of the BST.
Recursively build the left and right subtrees using the elements to the left and right of the middle element.
Ensure that the left and right subtrees are also balanced BSTs.
Return 1 if the constructed tree is correct, otherwise return 0.
Docker images can be copied from one host to another using 'docker save' and 'docker load' commands.
Use 'docker save' command to save the image as a tar file on the source host
Transfer the tar file to the destination host using SCP or any other file transfer method
Use 'docker load' command on the destination host to load the image from the tar file
Q31. What is the usecase which would require setup of distributed jenkins nodes
Distributed Jenkins nodes are used to handle large-scale builds and improve performance.
Large-scale builds: When there are a large number of builds to be executed simultaneously, distributed Jenkins nodes can handle the load by distributing the builds across multiple nodes.
Improved performance: By distributing the workload, the overall build time can be reduced, resulting in improved performance.
Resource utilization: Distributed nodes allow for better utilization of resources...read more
Q32. 8 coins are given where all the coins have equal weight, except one. The odd one may be less weight than the other or it may be heavier than the rest 7 coins. In worst case, how many iterations are needed to fi...
read moreWhen an instance in AWS is deregistered, the load balancer stops sending traffic to that instance.
The load balancer detects the deregistration of the instance and stops routing traffic to it.
The load balancer redistributes the traffic to the remaining healthy instances.
The deregistered instance is no longer considered part of the load balancer's target group.
The load balancer health checks will mark the instance as unhealthy.
The load balancer will not send any new requests to...read more
To debug a slow website template, analyze performance metrics, check for inefficient code, optimize images and assets, and consider server-side improvements.
Analyze performance metrics using tools like Chrome DevTools or Lighthouse to identify bottlenecks.
Check for inefficient code such as unnecessary loops, redundant CSS rules, or large JavaScript files.
Optimize images and assets by compressing files, using lazy loading, or implementing a content delivery network (CDN).
Consi...read more
Setting up distributed Jenkins nodes is necessary for scaling Jenkins infrastructure and improving performance.
When there is a need to run a large number of jobs simultaneously
When jobs require different environments or configurations
When jobs need to be executed on different platforms or operating systems
When there is a need for high availability and fault tolerance
When there is a need to reduce build queue times and improve overall performance
Inode number is a unique identifier for a file in a filesystem, while a file descriptor is a reference to an open file.
Inode number is a metadata associated with a file, stored in the filesystem's inode table.
File descriptor is a reference to an open file in a process, represented by an integer.
Inode number remains constant for a file even if it is moved or renamed, while file descriptor changes with each open/close operation.
Example: In a Unix-like system, 'ls -i' command di...read more
Q37. Prerequisites for VMotion? Ans--> a)ESX Servers must be configured with VMkenerl ports enabled for vmotion and on the same network segment b)ESX Servers must be managed by the same Virtual Center server c)ESX M...
read morePrerequisites for VMotion include network configuration, CPU compatibility, shared storage, and virtual switch restrictions.
ESX Servers must have VMkernel ports enabled for VMotion on the same network segment
ESX Servers must be managed by the same Virtual Center server
ESX Servers must have compatible CPUs
ESX Servers must have consistent networks and network labels
VMs must be stored on shared storage like iSCSI, FC SAN, or NAS/NFS
VMs cannot use local CD/floppy or internal-only...read more
Q38. There are at most eight servers in a data center. Each server has got a capacity/memory limit. There can be at most 8 tasks that need to be scheduled on those servers. Each task requires certain capacity/memory...
read moreYes, I can write an Ansible playbook to install Apache.
Use the 'apt' module to install Apache on Debian/Ubuntu systems
Use the 'yum' module to install Apache on Red Hat/CentOS systems
Ensure to start and enable the Apache service after installation
To debug issues with Apache and Nginx, check error logs, configuration files, server status, and network connectivity.
Check error logs for any relevant error messages or warnings.
Review configuration files for any misconfigurations or typos.
Check server status to ensure services are running and responding correctly.
Verify network connectivity to ensure there are no network issues affecting communication.
Use tools like curl, telnet, or netcat to test connections and troublesho...read more
Q41. Akamai request flow. Hierarchy of rules being parsed when request comes to Akamai.
Akamai request flow involves parsing rules in a hierarchical manner.
Akamai request flow involves multiple stages and rules.
When a request comes to Akamai, it goes through a series of stages such as Edge server selection, caching, and delivery.
During each stage, different rules are parsed and applied based on the configuration.
The hierarchy of rules determines the order in which they are evaluated and applied.
For example, caching rules may be evaluated before delivery rules.
Th...read more
Q42. There are two interfaces B and C each having the same method public m1() class A implements B and C If class A has to implement method m1, the implemented method would be of which interface?
The implemented method would be of the interface that is extended first in the class declaration.
In this case, since class A implements B and C, the implemented method m1 would be of interface B if B is extended first in the class declaration.
If C was extended first in the class declaration, then the implemented method m1 would be of interface C.
The order of interface extension determines which interface's method is implemented in the class.
Q43. How would you debug a website which is progressively slowing down
To debug a progressively slowing down website, I would analyze the server logs, check for memory leaks, and optimize the code.
Analyze server logs to identify any errors or bottlenecks
Check for memory leaks in the code
Optimize the code by removing unnecessary scripts and optimizing images
Use tools like Chrome DevTools to identify performance issues
Consider implementing a content delivery network (CDN) to improve website speed
Constructor injection passes dependencies through a class constructor, while setter injection uses setter methods.
Constructor injection is done by passing dependencies as parameters to the constructor.
Setter injection involves calling setter methods to set the dependencies after the object is created.
Constructor injection ensures that all required dependencies are provided at the time of object creation.
Setter injection allows for optional dependencies to be set after the obj...read more
Q45. There are 3 kinds of balls in a big array. Red, Green, Blue color balls. Arrange them in such a way that all the red balls to the left, Green balls in the middle and Blue balls to the right of the array
Entity instances can be in new, managed, detached, or removed states.
New state: when an entity is first created but not yet associated with a persistence context.
Managed state: when an entity is being managed by a persistence context and any changes made to it will be tracked.
Detached state: when an entity was previously managed but is no longer associated with a persistence context.
Removed state: when an entity is marked for removal from the database.
Q47. What does a load balancer do when an instance in aws stops
Load balancer routes traffic to other healthy instances
Load balancer detects the unhealthy instance
Stops sending traffic to that instance
Routes traffic to other healthy instances
Maintains high availability and scalability of the application
Q48. Why do I still see processes for my virtual machine when running the ps command on the Service Console even though my virtual machine is powered down?
Virtual machine processes may still be visible in the Service Console even when powered down.
Virtual machine processes may still be running in the background even when the virtual machine is powered down.
The ps command shows all processes running on the system, including those related to virtual machines.
Some processes may continue to run for maintenance or monitoring purposes even when the virtual machine is not actively running.
Q49. Have you ever installed an ESX host? What are the pre and post conversion steps involved in that? What would be the portions listed? What would be the max size of it?
Q50. Storage team provided the new LUN ID to you? How will you configure the LUN in VC? What would be the block size (say for 500 GB volume size)?
To configure the new LUN in VC, I will follow the given steps and set the block size based on the volume size.
Add the new LUN to the storage array
Rescan the storage adapters in vSphere Client
Create a new datastore using the new LUN ID
Set the block size based on the volume size (e.g. 1MB for 500GB volume size)
Design patterns in Java provide reusable solutions to common problems, improving code quality and maintainability.
Promotes code reusability by providing proven solutions to common design problems
Improves code maintainability by following established best practices
Enhances code readability by providing a common language for developers to communicate design ideas
Helps in creating scalable and flexible software architecture
Examples include Singleton, Factory, Observer, and Strat...read more
Q52. When we click on the power button of our Laptop, what happens immediately and how the windows is loaded?
Q53. What are the basic commands to troubleshoot connectivity between vSphere Client /vCenter to ESX server?
The basic commands to troubleshoot connectivity between vSphere Client/vCenter and ESX server.
Ping the ESX server from the vSphere Client/vCenter to check network connectivity.
Check if the ESX server is reachable by using the vmkping command.
Verify if the ESX server's management services are running using the service mgmt-vmware status command.
Check the firewall settings on the ESX server to ensure necessary ports are open.
Restart the management agents on the ESX server using...read more
Design a file searching functionality with indexing for Windows and Mac.
Implement a search algorithm to quickly find files based on user input.
Create an index of file names to improve search speed.
Support both Windows and Mac operating systems.
Utilize system APIs for file access and indexing.
Provide a user-friendly interface for searching and browsing files.
Consider implementing filters for file type, size, and date modified.
Q55. You are given a sorted skewed binary tree. How can you create a binary search tree of minimum height from it?
To create a binary search tree of minimum height from a sorted skewed binary tree, we can use the following approach:
Find the middle element of the sorted skewed binary tree.
Make it the root of the new binary search tree.
Recursively repeat the process for the left and right halves of the original tree.
Attach the resulting subtrees as the left and right children of the root.
Q56. How does VMotion works? What’s the port number used for it? ANS--> TCP port 8000
Q57. How will you generate a report for list of ESX, VM’s, RAM and CPU used in your Vsphere environment?
Q58. Is there a way to mount the vmfs volumes if they accidentally get unmounted without having to reboot?
Designing a system for MakeMyTrip
Utilize a microservices architecture to handle different functionalities like flight booking, hotel reservations, and holiday packages
Implement a robust backend system to handle high traffic and ensure scalability
Incorporate a user-friendly interface for easy navigation and booking process
Integrate payment gateways for secure transactions
Include features like personalized recommendations, loyalty programs, and customer support chatbots
Utilize ...read more
To prevent a DDoS attack, implement network security measures, use DDoS mitigation services, and monitor traffic patterns.
Implement network security measures such as firewalls, intrusion detection systems, and access control lists.
Use DDoS mitigation services from providers like Cloudflare or Akamai to filter out malicious traffic.
Monitor traffic patterns and set up alerts for unusual spikes in traffic that could indicate a DDoS attack.
Consider implementing rate limiting or C...read more
MVC focuses on separating concerns of an application into three components, while MVT is a variation used in Django framework.
MVC separates an application into Model (data), View (presentation), and Controller (logic) components.
MVT is used in Django framework where Model represents data, View represents presentation, and Template represents logic.
In MVC, the Controller handles user input and updates the Model and View accordingly.
In MVT, the Template handles user input and u...read more
Types of advice in Spring AOP include before, after, around, after-returning, and after-throwing.
Before advice: Executed before the method invocation.
After advice: Executed after the method invocation, regardless of its outcome.
Around advice: Wraps around the method invocation, allowing for custom behavior before and after.
After-returning advice: Executed after the method successfully returns a value.
After-throwing advice: Executed after the method throws an exception.
The Java Executor Framework provides a way to manage and control the execution of tasks in a multithreaded environment.
Allows for easy management of thread pools, reducing overhead of creating new threads for each task.
Provides a way to schedule tasks for execution at a specific time or with a delay.
Supports task cancellation and interruption.
Facilitates handling of task dependencies and coordination between tasks.
Offers better control over thread execution, such as setting t...read more
Q64. Given a list of arraylists containing elements, write a function that prints out the permutations of of the elements such that, each of the permutation set contains only 1 element from each arraylist and there...
read moreFunction to print permutations of elements from arraylists with no duplicates.
Use recursion to generate all possible permutations by selecting one element from each arraylist at a time.
Keep track of used elements to avoid duplicates in the permutation sets.
Use a set data structure to store and check for duplicates efficiently.
Q65. I want to add a new VLAN to the production network? What are the steps involved in that? And how do you enable it?
Adding a new VLAN to a production network involves several steps and enabling it requires configuration changes.
Plan the new VLAN configuration including VLAN ID, subnet, and gateway.
Configure the switch or router to create the new VLAN.
Assign ports to the new VLAN as needed.
Enable routing between the new VLAN and other VLANs if required.
Test the new VLAN to ensure connectivity and functionality.
Examples: VLAN 20 with subnet 192.168.20.0/24 and gateway 192.168.20.1.
Examples: ...read more
Q66. What the difference between connecting the ESX host through VC and Vsphere? What are the services involved in that? What are the port numbers’s used?
Connecting ESX host through VC and vSphere involves different services and port numbers.
Connecting ESX host through VC involves vCenter Server which provides centralized management and monitoring.
Connecting ESX host through vSphere involves vCenter Server along with additional services like vSphere Client and vSphere Web Client.
Some of the services involved in connecting ESX host through VC and vSphere include vCenter Server, vSphere Client, vSphere Web Client, and ESXi host ...read more
Q67. What is the command used to restart SSH, NTP & Vmware Web access?
The command to restart SSH, NTP, and VMware Web access is service.
To restart SSH, use the command: service ssh restart
To restart NTP, use the command: service ntp restart
To restart VMware Web access, use the command: service vmware-webaccess restart
Q68. Describe inodes and file descriptors. What is the use of swap
Inodes are data structures that store information about files on a Unix/Linux file system. File descriptors are unique identifiers for open files. Swap is a space on a hard disk used as virtual memory.
Inodes contain metadata about files such as ownership, permissions, and timestamps.
File descriptors are used by the operating system to keep track of open files and to perform I/O operations on them.
Swap is used when the amount of physical memory (RAM) is insufficient to hold al...read more
The buddy system has advantages like increased safety and support, but also drawbacks like dependency and lack of independence.
Advantages: increased safety, support, accountability, motivation
Disadvantages: dependency, lack of independence, potential for conflicts
Example: In a buddy system at work, colleagues can support each other in completing tasks and provide motivation to stay on track.
Example: However, relying too heavily on a buddy can lead to dependency and hinder ind...read more
Q70. An array which is a Post order traversal of a Binary Tree. Write a function to check if the Binary Tree formed from the array is a Binary Search Tree.
Check if a Binary Tree formed from a Post order traversal array is a Binary Search Tree.
Start by constructing the Binary Tree from the given Post order traversal array.
Check if the Binary Tree satisfies the properties of a Binary Search Tree.
Use recursion to check if each node's value is within the correct range.
Example: Post order traversal array [1, 3, 2] forms a Binary Search Tree.
Example: Post order traversal array [3, 2, 1] does not form a Binary Search Tree.
Q71. Is there a way to blacklist IPs in AWS
Yes, AWS provides various methods to blacklist IPs.
Use AWS WAF to create rules to block specific IP addresses
Configure security groups to deny traffic from specific IP addresses
Utilize AWS Network ACLs to block traffic from specific IP addresses
Q72. What is the default number of ports configured with the Virtual Switch?
The default number of ports configured with the Virtual Switch is 8.
The Virtual Switch is a software-based network switch that allows virtual machines to communicate with each other and with the host system.
By default, the Virtual Switch is configured with 8 ports, which can be used to connect virtual machines and other network devices.
These ports can be assigned to different virtual machines or network adapters as needed.
Additional ports can be added or existing ports can be...read more
Q73. What are the relevant elements to be considered in ascertaining the Cost of creating a Quote by an IT Company
The relevant elements to consider in ascertaining the cost of creating a quote by an IT company
Scope of the project
Complexity of the requirements
Labor costs
Technology and tools required
Timeframe for completion
Overhead expenses
Profit margin
Competitor pricing
Client's budget constraints
The system call that creates a separate connection is fork()
fork() is a system call in Unix-like operating systems that creates a new process by duplicating the existing process
The new process created by fork() is called the child process, while the original process is called the parent process
fork() is commonly used in network programming to create separate connections for handling multiple clients
Q75. Im not able to connect to the Service Console over the network. What could the issue be?
Possible reasons for not being able to connect to the Service Console over the network.
Check network connectivity and ensure the correct IP address is being used.
Verify firewall settings to allow access to the Service Console.
Ensure the Service Console service is running properly.
Check for any network configuration issues or restrictions.
Restart the Service Console and try connecting again.
Q76. Why did VMware limit its beta of ESX Server 3.0 to so few?
Overloading in OOP is the ability to define multiple methods with the same name but different parameters.
Overloading allows multiple methods with the same name but different parameters to coexist in a class.
The compiler determines which method to call based on the number and type of arguments passed.
Example: having multiple constructors in a class with different parameter lists.
The stages in the Software Development Life Cycle include planning, design, development, testing, deployment, and maintenance.
1. Planning: Define project scope, requirements, and timelines.
2. Design: Create architecture, UI/UX, and database design.
3. Development: Write code based on design specifications.
4. Testing: Verify functionality, performance, and security.
5. Deployment: Release the software to users or clients.
6. Maintenance: Fix bugs, add new features, and update sof...read more
Q79. How do DRS works? Which technology used? What are the priority counts to migrate the VM’s?
Q80. What do you do if you forget the root password of the Service Console?
To reset the root password of the Service Console, you can follow these steps:
Restart the system and press 'e' at the GRUB menu to edit the boot configuration
Locate the line starting with 'linux' and append 'init=/bin/bash' at the end
Press 'Ctrl + X' to boot into single-user mode
Remount the root file system as read-write by running 'mount -o remount,rw /'
Reset the root password by running 'passwd root'
Reboot the system and login with the new root password
Q81. How to implement executor framework and it's benefits
Executor framework is used to manage threads and execute tasks asynchronously.
Executor framework provides a way to manage threads and execute tasks asynchronously.
It provides a thread pool and a queue to manage tasks.
It helps in improving the performance of the application by reducing the overhead of creating and destroying threads.
It also provides a way to handle exceptions and errors in the tasks.
Example: Executors.newFixedThreadPool(10) creates a thread pool of 10 threads.
Q82. What are the files will be created while creating a VM and after powering on the VM?
Q83. How will you turn start / stop a VM through command prompt?
Q84. How will you check the network bandwidth utilization in an ESXS host through command prompt?
Q85. What is the most important aspect of deploying ESX Server and virtual machines?
Q86. Can I back up my entire virtual machine from the Service Console?
Q87. If I can't get a SAN, will local storage with a RAID device be sufficient?
Multithreading in Java allows multiple threads to execute concurrently, improving performance and responsiveness.
Multithreading allows multiple threads to run concurrently within a single process.
Threads share the same memory space, allowing for efficient communication and data sharing.
Java provides built-in support for multithreading through the Thread class and Runnable interface.
Example: Creating a new thread using Thread class or implementing Runnable interface and passin...read more
Paging is a memory management scheme that allows the operating system to store and retrieve data from secondary storage in fixed-size blocks, while swapping involves moving entire processes between main memory and disk.
Paging involves dividing physical memory into fixed-size blocks called pages, while swapping involves moving entire processes between main memory and disk.
Paging allows for more efficient use of physical memory by storing parts of a process in different pages, ...read more
Q90. Given a unsorted array. Create a balanced B tree. Whether it is possible to solve this problem algorithm in logarithmic complexity ?
It is not possible to create a balanced B tree from an unsorted array in logarithmic complexity.
Creating a balanced B tree from an unsorted array requires sorting the array first, which has a complexity of O(n log n).
Balanced B tree construction typically has a complexity of O(n log n) or O(n) depending on the algorithm used.
Example: If we have an unsorted array [3, 1, 4, 1, 5, 9, 2, 6, 5], we would need to sort it first before constructing a balanced B tree.
Q91. If the VMDK header file corrupt what will happen? How do you troubleshoot?
Q92. Explain about VCB? What it the minimum priority (*) to consolidate a machine?
Q93. ISOs have been mentioned in several of the chapters. Why are they so important?
ISOs are important because they provide a set of standards and guidelines for various industries.
ISOs ensure consistency and quality in products and services.
ISOs help organizations meet legal and regulatory requirements.
ISOs promote international trade by harmonizing standards across countries.
ISOs enhance customer confidence and trust in products and services.
ISOs facilitate interoperability and compatibility between different systems.
ISOs cover a wide range of areas such a...read more
Q94. Explain about your production environment? How many cluster’s, ESX, Data Centers, H/w etc ?
Q95. Have you ever patched the ESX host? What are the steps involved in that?
Q96. What will happen if I deploy systems management software on the ESX Server itself?
Q97. Which version of VMware ESX Server supports Boot from SAN?
A deadlock in operating systems occurs when two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlock involves a circular wait, where each process is waiting for a resource held by another process in the cycle.
Four necessary conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.
Example: Process A holds Resource 1 and waits for Resource 2, while Process B holds Resource 2 and waits f...read more
Prototype scope in Spring creates a new instance of the bean every time it is requested.
Prototype scope is used when a new instance of the bean is required for each request.
It is not thread-safe, as a new instance is created for each request.
Example: If a bean is defined with prototype scope, a new instance will be created every time it is injected or requested.
The Java Executor Framework provides a way to manage and execute tasks asynchronously in Java applications.
Create an instance of ExecutorService using Executors class
Submit tasks for execution using execute() or submit() methods
Handle the results of the tasks using Future objects
Shutdown the ExecutorService when tasks are completed using shutdown() method
Top HR Questions asked in Floyd Inc
Interview Process at Floyd Inc
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month