Zoho
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Campus Placement and was interviewed in Apr 2024. There were 3 interview rounds.
They ask 10 aptitude questions and ten technical questions.They are easy to solve if you are prepare well for that.
Technical. communication, GK
Choose your own topic
Verbal aptitude test
Top trending discussions
posted on 19 Jan 2021
I applied via Referral and was interviewed before Jan 2020. There were 3 interview rounds.
posted on 27 Dec 2015
Difference between #define and const
Both are used to define constants
#define is a preprocessor directive and replaces all occurrences of the defined identifier with the given value
const is a keyword and creates a read-only variable
const is type-safe and has better scope control than #define
Example: #define PI 3.14 vs const float PI = 3.14;
Example: #define MAX(a,b) ((a)>(b)?(a):(b)) vs const int MAX = (a)>(b)?(a):(b);
OSI layers are a conceptual model that describes the communication functions of a network.
Layer 1 (Physical): Transmits raw data bits over a physical medium
Layer 2 (Data Link): Provides error-free transfer of data frames between nodes
Layer 3 (Network): Routes data packets between networks
Layer 4 (Transport): Provides reliable data transfer between end systems
Layer 5 (Session): Establishes, manages, and terminates sessi...
Structure refers to the arrangement or organization of something.
Structure is the way something is put together or organized.
It can refer to physical objects, such as buildings or bridges, or abstract concepts, such as language or music.
Examples of structures include the skeletal structure of a human body, the organizational structure of a company, and the grammatical structure of a sentence.
Code for creating a node in linked list
Create a struct for the node with data and pointer to next node
Allocate memory for the node using malloc()
Assign data to the node
Assign the next pointer to NULL or the next node in the list
Encoders and decoders are used to convert data from one format to another.
Encoders convert analog signals to digital signals.
Decoders convert digital signals to analog signals.
Encoders are used in devices like cameras, sensors, and audio equipment.
Decoders are used in devices like televisions, radios, and DVD players.
One cryptographic technique is RSA, which uses public and private keys to encrypt and decrypt data.
RSA stands for Rivest-Shamir-Adleman, named after its creators.
It is a widely used asymmetric encryption algorithm.
RSA uses a public key to encrypt data and a private key to decrypt it.
The security of RSA is based on the difficulty of factoring large prime numbers.
RSA is used in various applications such as secure communi
B-Tree is a self-balancing tree data structure with multiple child nodes and is used for efficient disk access.
B-Tree has a root node, internal nodes, and leaf nodes.
Each node can have multiple child nodes.
The number of child nodes is fixed for a given B-Tree.
B-Tree is self-balancing, which means that the height of the tree is minimized.
B-Tree is used for efficient disk access as it reduces the number of disk accesses ...
I would bring my technical expertise and passion for problem-solving to contribute to Microsoft's mission of empowering people and organizations.
I would familiarize myself with Microsoft's products and services to better assist customers
I would actively seek out opportunities to learn and improve my skills
I would collaborate with my team and other departments to provide the best support possible
I would prioritize custo...
DML and DDL are SQL commands for manipulating and defining database objects. To open a process in Linux, use the 'open' command.
DML (Data Manipulation Language) is used to manipulate data in a database, such as inserting, updating, and deleting records.
DDL (Data Definition Language) is used to define the structure and schema of a database, such as creating tables, indexes, and constraints.
To open a process in Linux, yo...
posted on 28 Feb 2024
I applied via Naukri.com and was interviewed before Feb 2023. There were 5 interview rounds.
Mobile Device Management (MDM) is a system that allows organizations to manage and secure mobile devices used by employees.
MDM software enables remote management of devices, including configuration, security policies, and app distribution.
It helps ensure data security by enforcing encryption, passcode requirements, and remote wipe capabilities.
MDM solutions can also track device location, monitor usage, and provide ins...
posted on 12 Mar 2024
I applied via Referral and was interviewed before Mar 2023. There were 3 interview rounds.
An IP address is a unique identifier for a device on a network, a server is a computer or software that provides services to other devices, troubleshooting involves identifying and resolving issues.
An IP address is a numerical label assigned to each device connected to a computer network, used for communication and identification.
A server is a computer or software that provides services to other devices on the network,...
Explain importance of logs, offer alternative solutions, emphasize need for troubleshooting
Explain the importance of logs in diagnosing and resolving technical issues
Offer alternative solutions such as remote troubleshooting or guiding the customer through the process
Emphasize the need for collaboration and transparency to effectively resolve the issue
posted on 3 Jun 2024
posted on 5 Apr 2024
To deploy a Virtual Machine, you would need to use a virtualization platform and follow specific steps to create and configure the VM.
Choose a virtualization platform such as VMware, Hyper-V, or VirtualBox.
Create a new virtual machine and specify settings such as CPU, memory, storage, and network.
Install an operating system on the virtual machine.
Configure any additional settings or software needed for the VM to functi...
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is a decentralized system used to translate domain names to IP addresses
It helps users access websites using easy-to-remember domain names instead of complex IP addresses
DNS servers store records like A, CNAME, MX, and TXT to provide various types of information
DNS resolution process involves recursive and iterative queries to find the...
I would start by checking network connectivity, firewall settings, and remote desktop settings.
Check network connectivity to ensure the device is connected to the network
Verify firewall settings to ensure RDP traffic is allowed
Check remote desktop settings on the target device to ensure it is enabled
Verify if the target device is reachable and responding to ping requests
based on 4 interviews
1 Interview rounds
based on 3 reviews
Rating in categories
Member Technical Staff
1.5k
salaries
| ₹5.6 L/yr - ₹23 L/yr |
Technical Support Engineer
572
salaries
| ₹3.3 L/yr - ₹10.5 L/yr |
Software Developer
436
salaries
| ₹5 L/yr - ₹20 L/yr |
Software Engineer
128
salaries
| ₹4.6 L/yr - ₹16.2 L/yr |
Web Developer
83
salaries
| ₹3.5 L/yr - ₹12 L/yr |
Freshworks
Salesforce
SAP
TCS