Filter interviews by
RAM is a type of memory used to temporarily store data, while microprocessor is a central processing unit that executes instructions.
RAM is volatile, while microprocessor is non-volatile.
RAM is used to store data temporarily, while microprocessor executes instructions.
RAM is measured in gigabytes, while microprocessor is measured in hertz.
Examples of RAM include DDR3, DDR4, while examples of microprocessors include Int
TCP is a connection-oriented protocol while UDP is a connectionless protocol.
TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these.
TCP is slower but more reliable while UDP is faster but less reliable.
TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.
Examples of TCP-based app...
Top trending discussions
I applied via LinkedIn and was interviewed in May 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jan 2023. There were 2 interview rounds.
posted on 11 May 2021
I applied via Company Website and was interviewed before May 2020. There was 1 interview round.
posted on 4 Dec 2024
I applied via Referral and was interviewed before Dec 2023. There was 1 interview round.
I applied via AmbitionBox and was interviewed before Mar 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jan 2023. There were 2 interview rounds.
posted on 11 May 2021
I applied via Company Website and was interviewed before May 2020. There was 1 interview round.
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automatically assigning IP addresses to devices
It allows devices to join a network without manual configuration
DHCP servers can also assign other network configuration information such as subnet mask, default gateway, and DNS server addresses
...
DNS stands for Domain Name System. It is a system that translates domain names into IP addresses.
DNS is like a phonebook for the internet
It helps to locate websites by translating domain names into IP addresses
DNS servers store information about domain names and their corresponding IP addresses
DNS can also be used for email routing and other internet services
A tree is a perennial plant with a single stem or trunk, supporting branches and leaves.
Trees are important for the environment as they absorb carbon dioxide and produce oxygen.
They provide shade, shelter, and food for animals and humans.
Trees can be classified as deciduous or evergreen based on their leaves.
Examples of trees include oak, maple, pine, and palm trees.
A server is a computer program or device that provides functionality to other programs or devices, called clients.
A server is designed to manage network resources.
It provides services to clients over a network.
Examples include web servers, email servers, and file servers.
Servers can be physical or virtual machines.
They often have more processing power, memory, and storage than client devices.
Kerberos is a network authentication protocol used to provide secure communication over the internet.
Kerberos uses a ticket-granting server to authenticate users and grant access to network resources.
It uses symmetric key cryptography to ensure secure communication between the client and server.
Kerberos is commonly used in enterprise environments to provide single sign-on functionality.
It was developed by MIT and is no...
PST stands for Personal Storage Table, a file format used by Microsoft Outlook to store email messages, contacts, and other data.
PST files can be exported/imported to transfer data between different Outlook accounts or computers.
PST files have a maximum size limit of 50 GB in Outlook 2010 and later versions.
PST files can become corrupted and cause data loss, so it's important to back them up regularly.
PST files can be ...
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses.
It allows for better network management and security.
Subnetting is done by borrowing bits from the host portion of an IP address.
CIDR notation is used to represent subnet masks.
Example: 192.168.1.0/24 represents a network with 256 IP addresses.
Active Directory is a Microsoft service that manages network resources and user permissions.
Centralized database for managing network resources
Allows for user authentication and authorization
Provides a hierarchical structure for organizing resources
Enables group policy management
Integrates with other Microsoft services like Exchange and SharePoint
OSPF (Open Shortest Path First) is a routing protocol used in IP networks.
OSPF is a link-state protocol
It calculates the shortest path to a destination using Dijkstra's algorithm
It supports VLSM (Variable Length Subnet Masking)
It uses a hierarchical network design with areas
OSPF routers exchange link-state advertisements (LSAs) to build a topology database
It uses cost as a metric to determine the best path
OSPF is commo
based on 1 review
Rating in categories
Software Developer
15
salaries
| ₹3.6 L/yr - ₹5.8 L/yr |
Softwaretest Engineer
10
salaries
| ₹2.8 L/yr - ₹5.1 L/yr |
Graphic Designer
9
salaries
| ₹2.4 L/yr - ₹7.8 L/yr |
Senior Application Software Engineer
7
salaries
| ₹6 L/yr - ₹10.2 L/yr |
Application Software Engineer
7
salaries
| ₹5.5 L/yr - ₹6 L/yr |
Vizrt
Avid Technology
Evertz Microsystems
Amazon