Filter interviews by
I applied via Naukri.com and was interviewed in Sep 2023. There were 3 interview rounds.
SeLinux is a security module for Linux systems that enforces access control policies. Umask is a command that sets default permissions for new files and directories.
SeLinux stands for Security-Enhanced Linux and provides access control security policies for Linux systems.
It restricts access to files, directories, and processes based on defined security policies.
Umask is a command that sets default permissions for new f...
LVM stands for Logical Volume Manager, used for managing disk storage in Linux. NTP stands for Network Time Protocol, used for time synchronization.
LVM allows for dynamic resizing of logical volumes
NTP ensures accurate time synchronization across networked devices
LVM can be used to create snapshots for backups
NTP servers can be configured to sync time with external time sources
Sticky bit is a permission in Unix systems that allows only the owner of a file to delete or rename it.
Sticky bit is represented by a 't' in the permissions of a file or directory.
It is commonly used on directories to prevent users from deleting files owned by other users.
An example of sticky bit usage is on the /tmp directory in Unix systems.
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
It helps in routing internet traffic efficiently by directing requests to the correct servers.
DNS records include A records (for IPv4 addresses), AAAA records (for IPv6 addresses), MX records (for mail s
I applied via Referral and was interviewed in Nov 2020. There were 5 interview rounds.
I applied via Walk-in and was interviewed in Jul 2019. There were 3 interview rounds.
Designing Facebook is a complex task involving various components and technologies.
Identify the core features of Facebook such as user profiles, news feed, messaging, and groups.
Choose appropriate technologies for each component such as PHP for backend, React for frontend, and MySQL for database.
Ensure scalability and performance by implementing caching, load balancing, and database sharding.
Implement security measures...
I applied via Company Website and was interviewed before Oct 2019. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Oct 2020. There were 4 interview rounds.
I appeared for an interview before Jul 2021.
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as if they were of the same class.
Polymorphism is achieved through method overriding and method overloading.
Method overriding is when a subclass provides a specific implementation of a method that is already provided by its parent class.
Method overloading is when a class has two or more methods with the ...
Dependency Injection is a design pattern where the dependencies of an object are injected into it rather than created within it.
It helps in achieving loose coupling between objects
It makes testing easier as dependencies can be mocked or stubbed
There are three types of Dependency Injection - Constructor Injection, Setter Injection, and Interface Injection
Example: In a web application, the database connection object can ...
Garbage Collection in .Net automatically manages memory by freeing up unused objects.
Garbage Collector runs in the background and periodically checks for unused objects.
It frees up memory by deallocating objects that are no longer being used.
GC can be configured using different modes like Server, Workstation, Concurrent, etc.
GC can also be manually triggered using GC.Collect() method.
GC.SuppressFinalize() method can be...
I applied via Company Website and was interviewed before Jul 2021. There were 2 interview rounds.
The first round is an aptitude online test that had Basics of Computer Science, Mathematics, English and then finally one basic program to code and compile like Palindrome.
Three panellists were present and it was a face-face round, Panellist 1 and 2 takes the technical discussions like classes, inheritance, oops concept, basic syntax, and such. Panellist 3 talks more about your resume skills, hobbies and the company overview.
I applied via Campus Placement and was interviewed before Aug 2021. There was 1 interview round.
Data structure is a way of organizing and storing data in a computer so that it can be accessed and used efficiently.
Data structures are used to manage large amounts of data efficiently.
They can be implemented using arrays, linked lists, trees, graphs, and other techniques.
Examples include stacks, queues, hash tables, and binary search trees.
Choosing the right data structure for a particular problem is important for op...
Stack and Queue are used in real-time systems for managing tasks and events.
Stack is used for managing function calls, undo/redo operations, and backtracking.
Queue is used for managing events, scheduling tasks, and buffering data.
Real-time systems use both data structures for managing tasks and events in a time-sensitive manner.
Examples include task scheduling in operating systems, event handling in GUI applications, a
based on 1 interview
Interview experience
Payroll Associate
42
salaries
| ₹1.9 L/yr - ₹3.6 L/yr |
Payroll Specialist
22
salaries
| ₹3.2 L/yr - ₹4.1 L/yr |
Associate
20
salaries
| ₹2 L/yr - ₹4.2 L/yr |
Senior Associate
15
salaries
| ₹3.3 L/yr - ₹5.3 L/yr |
QA Analyst
9
salaries
| ₹4.5 L/yr - ₹8.5 L/yr |
TCS
Accenture
Wipro
Cognizant