Filter interviews by
Clear (1)
I was interviewed in Jan 2025.
ARP stands for Address Resolution Protocol. It is used to map IP addresses to MAC addresses on a local network.
ARP is used to resolve IP addresses to MAC addresses on a local network.
ARP works by broadcasting a request for the MAC address of a specific IP address on the network.
Yes, ARP entries can be deleted using the 'arp -d' command.
ARP entries have a timeout period, typically around 2 minutes, after which they are ...
DHCP stands for Dynamic Host Configuration Protocol, used to automatically assign IP addresses to devices on a network.
DHCP is a network protocol that allows a server to automatically assign IP addresses to devices on a network.
It helps in reducing the manual effort required to configure IP addresses for each device.
DHCP servers maintain a pool of IP addresses and lease them to devices for a specific period of time.
Dev...
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two different protocols used for data transmission over networks.
TCP is a connection-oriented protocol that ensures reliable and ordered delivery of data packets.
UDP is a connectionless protocol that does not guarantee delivery or order of packets.
TCP uses handshaking to establish a connection between sender and receiver before data transfer.
UDP i...
VLAN stands for Virtual Local Area Network, used to logically segment a network into multiple virtual networks.
VLANs help in improving network security by isolating traffic between different departments or groups.
They can also help in optimizing network performance by reducing broadcast traffic.
VLANs are configured at the switch level and allow devices in different VLANs to communicate with each other based on routing ...
STP stands for Software Test Plan. It is a document that outlines the testing strategy, objectives, resources, and schedule for a software testing project.
STP defines the scope, approach, resources, and schedule of testing activities.
It helps in identifying the test environment, test deliverables, and test execution schedule.
STP also includes the roles and responsibilities of the testing team members.
It serves as a roa...
To check network connectivity speed, use tools like speedtest.net. Debug by checking for network congestion or hardware issues. Increase frame size by adjusting MTU. Capture frames using tools like Wireshark.
Use tools like speedtest.net to check network connectivity speed
Debug by checking for network congestion, hardware issues, or misconfigured settings
Increase frame size by adjusting Maximum Transmission Unit (MTU)
Ca...
Layer2 and Layer3 are network layers in the OSI model, responsible for data transmission and routing.
Layer2 (Data Link Layer) operates at the MAC address level, handling physical addressing and error detection.
Layer3 (Network Layer) operates at the IP address level, handling routing and logical addressing.
Layer2 switches operate at Layer2, while routers operate at Layer3.
Examples of Layer2 protocols include Ethernet an...
ICMP stands for Internet Control Message Protocol. It is used for network troubleshooting and diagnostic purposes.
ICMP is a protocol used by network devices to communicate error messages or operational information.
Ping is a tool that uses ICMP to send echo requests to a target host and waits for an echo reply.
Ping works by sending an ICMP echo request packet to the target host, which then responds with an echo reply if...
RIP is a distance vector routing protocol while OSPF is a link-state routing protocol. OSPF uses Dijkstra algorithm for routing.
RIP stands for Routing Information Protocol and OSPF stands for Open Shortest Path First.
RIP uses hop count as the metric for path selection while OSPF uses cost.
OSPF is more scalable and efficient than RIP as it converges faster and supports VLSM.
OSPF uses areas to divide the network into sma...
Cisco switches are known for their reliability, advanced features, and high price point compared to other company switches.
Cisco switches are known for their high quality and reliability.
Cisco switches offer advanced features such as VLAN support, QoS, and security options.
Cisco switches are typically more expensive than switches from other companies.
White box switches are generic, off-the-shelf switches that are not b...
SONIC cards are a type of prepaid card used for making purchases at SONIC Drive-In restaurants.
Prepaid cards used at SONIC Drive-In restaurants
Can be used to pay for food and drinks
Can be reloaded with funds as needed
Python program to move all zeros to the end of a list while maintaining the order of non-zero elements.
Iterate through the input list and separate non-zero elements into one list and zeros into another list.
Concatenate the non-zero list with the zero list to get the desired output.
Print the final list with zeros at the end.
Print a pattern of stars in a pyramid shape.
Use nested loops to print spaces and stars in the desired pattern.
Start with one star at the top and increase the number of stars in each row.
Adjust the spacing to create the pyramid shape.
Top trending discussions
It was Average.......,....
Medium level of difficulties
I am a QA Automation Testing Engineer with 5 years of experience in creating and executing test cases for software applications.
5 years of experience in QA Automation Testing
Proficient in creating and executing test cases
Strong knowledge of automation tools like Selenium and JUnit
Experience in testing web and mobile applications
Familiar with Agile methodology
posted on 11 Oct 2022
I was interviewed before Oct 2021.
posted on 20 Nov 2024
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Git stash is used to temporarily store changes that are not ready to be committed.
Git stash is used to save changes that are not ready to be committed, allowing you to switch branches or work on something else.
It is useful when you want to temporarily store changes without committing them.
You can later apply the stashed changes back to your working directory.
Example: git stash save 'work in progress'
Example: git stash
Conflicts in git can be handled by resolving them through merging, rebasing, or using tools like git mergetool.
Communicate with team members to understand changes causing conflicts
Resolve conflicts by manually editing files or using git mergetool
Use git rebase to reapply changes on top of another branch
Merge conflicting branches after resolving conflicts
posted on 20 Feb 2024
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
HashMap is non-synchronized and allows null values and keys, while HashTable is synchronized and does not allow null values or keys.
HashMap is non-synchronized and not thread-safe, while HashTable is synchronized and thread-safe.
HashMap allows null values and keys, while HashTable does not allow null values or keys.
HashMap is generally preferred over HashTable for non-thread-safe operations due to better performance.
final, finally, and finalize are keywords in Java used for different purposes.
final is a keyword used to declare constants, prevent method overriding, and prevent inheritance.
finally is a block of code that is always executed, whether an exception is thrown or not.
finalize is a method used for cleanup operations before an object is garbage collected.
Idempotent in API means that making the same request multiple times has the same effect as making it once.
Idempotent operations produce the same result regardless of how many times they are called.
GET and PUT requests are typically idempotent, while POST requests are not.
For example, sending a PUT request to update a resource should have the same result whether it is sent once or multiple times.
The pillars of JAVA are Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: class Dog extends Animal.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: private variables with public getter and setter methods.
Polymorphism: Ability of a method to do different things based on the ob...
posted on 1 Jun 2024
posted on 27 Jul 2024
posted on 3 Dec 2022
Singleton design pattern restricts the instantiation of a class to a single instance and provides a global point of access to it.
Ensures only one instance of a class exists
Provides a global point of access to the instance
Uses a private constructor to prevent external instantiation
Commonly used in logging, database connections, and configuration settings
A framework is a set of guidelines, rules, and best practices used to develop software applications.
A framework provides a structure for organizing code and helps to ensure consistency across the application.
It can include libraries, tools, and templates to simplify development.
Examples of popular frameworks include React, Angular, and Django.
Frameworks can be used for both manual and automated testing.
They can also be...
posted on 24 May 2024
I applied via Recruitment Consulltant and was interviewed in Mar 2022. There were 4 interview rounds.
Some of the top questions asked at the VVDN Technologies Qa Automation Testing Engineer interview -
based on 1 interview
Interview experience
Junior Engineer
1.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Assistant Engineer
714
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
369
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
329
salaries
| ₹0 L/yr - ₹0 L/yr |
Embedded Software Engineer
311
salaries
| ₹0 L/yr - ₹0 L/yr |
Sasken
Happiest Minds Technologies
L&T Technology Services
LTIMindtree