Filter interviews by
I applied via Referral and was interviewed before Apr 2021. There were 3 interview rounds.
I am genuinely interested in joining your company and committed to contributing positively for the long term.
I admire your company's innovative approach to network solutions, which aligns with my career goals.
I am eager to learn and grow within the company, aiming for a long-term position.
For example, I see myself contributing to projects that enhance network security and efficiency.
I applied via Recruitment Consulltant
A camera is a device used to capture images or videos by recording light onto a photosensitive surface.
Cameras come in various types such as digital cameras, DSLRs, mirrorless cameras, and smartphone cameras.
They consist of components like a lens, image sensor, and image processor.
Cameras can be used for photography, videography, surveillance, and live streaming.
Yes, I am familiar with crimping RJ45 connectors.
I have experience crimping RJ45 connectors in previous roles.
I am familiar with the T568A and T568B wiring standards for Ethernet cables.
I know how to use a crimping tool to secure the wires in the connector.
I understand the importance of properly crimping the connector to ensure a reliable connection.
There are multiple types of readers, including casual readers, avid readers, speed readers, etc.
Casual readers
Avid readers
Speed readers
Visual readers
Auditory readers
I appeared for an interview in Jul 2024, where I was asked the following questions.
DNS (Domain Name System) translates domain names into IP addresses, enabling browsers to load Internet resources.
DNS acts like a phonebook for the Internet, mapping human-friendly domain names (e.g., www.example.com) to IP addresses (e.g., 192.0.2.1).
It consists of a hierarchy of servers, including root servers, TLD servers, and authoritative name servers.
DNS caching improves performance by storing previously resolved ...
Metasploit is a penetration testing framework used for developing and executing exploit code against remote targets.
Open-source framework for security testing and vulnerability assessment.
Includes a vast collection of exploits, payloads, and auxiliary modules.
Used by security professionals to simulate attacks and assess system security.
Example: Exploiting a known vulnerability in a web application to test defenses.
Supp...
I applied via Approached by Company and was interviewed in Jul 2023. There were 2 interview rounds.
Email requesting information
Start with a polite greeting
Clearly state the purpose of the email and what information is needed
Provide any relevant context or background information
Request a specific deadline for the response
Thank the recipient for their assistance
I applied via Approached by Company and was interviewed in Jun 2023. There were 2 interview rounds.
I appeared for an interview before May 2024, where I was asked the following questions.
As an AutoCAD Operator, I create detailed technical drawings and plans for various engineering and architectural projects.
Precision Drafting: I ensure all drawings are accurate to specifications, such as creating floor plans for residential buildings.
3D Modeling: I utilize AutoCAD's 3D capabilities to visualize projects, like designing a new bridge or infrastructure layout.
Collaboration: I work closely with architects ...
Expected salary for an AutoCAD Operator varies based on experience, location, and industry standards.
Industry Standards: Research average salaries for AutoCAD Operators in your region to set a competitive expectation.
Experience Level: Consider your years of experience; for example, entry-level positions may range from $40,000 to $50,000, while experienced operators can earn $60,000 or more.
Location Impact: Salaries can...
I chose to be an AutoCAD Operator to combine my passion for design with technical skills in drafting and engineering.
Passion for Design: I have always been fascinated by architecture and engineering, and AutoCAD allows me to bring my creative ideas to life.
Technical Skills: My background in technical drawing and understanding of engineering principles enables me to create precise and accurate designs.
Career Opportuniti...
I applied via Naukri.com and was interviewed in Apr 2022. There were 2 interview rounds.
Top trending discussions
I appeared for an interview before Apr 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions on OOPS and OS mainly.
Little Endian and Big Endian refer to the order in which bytes are stored in computer memory.
Little Endian stores the least significant byte first, while Big Endian stores the most significant byte first.
Little Endian is commonly used in x86 architecture, while Big Endian is used in architectures like SPARC and PowerPC.
Endianness can affect data transmission between systems with different byte orders.
Program to determine system's endianness
Check the endianness by storing a multi-byte integer and checking the byte order
Use bitwise operations to extract the least significant byte
If the least significant byte is at the lowest memory address, it's little-endian
If the least significant byte is at the highest memory address, it's big-endian
The volatile keyword in programming is used to indicate that a variable's value can be changed unexpectedly.
Volatile keyword is used in multithreaded programming to prevent compiler optimizations on variables that can be changed by other threads.
It tells the compiler not to cache the variable's value in a register, ensuring that every access is made to the variable's memory location.
Commonly used in embedded systems pr...
Function pointers in C are used to store the address of functions, allowing for dynamic function calls and callbacks.
Function pointers can be used to implement callbacks in event-driven programming.
They can be used to switch between different functions at runtime.
Function pointers are commonly used in implementing data structures like function pointers in an array of function pointers.
Example: void (*funcPtr)(int) = &a...
Design a data structure for multi-threading
Use a thread-safe queue to manage tasks for each thread
Implement a lock or semaphore to control access to shared resources
Consider using condition variables for synchronization
Use atomic operations for shared variables to prevent race conditions
The kernel is the core component of an operating system that manages system resources and provides a bridge between software and hardware.
Manages system resources such as CPU, memory, and I/O devices
Provides a bridge between software applications and hardware components
Handles tasks such as process scheduling, memory management, and device drivers
Controls communication between hardware and software layers
A storage class in programming defines the scope and lifetime of variables.
Storage classes include auto, register, static, and extern.
Auto variables are created when a function is called and destroyed when the function ends.
Register variables are stored in CPU registers for faster access.
Static variables retain their value between function calls.
Extern variables are declared outside of any function and can be accessed ...
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
based on 7 interview experiences
Difficulty level
Duration
based on 93 reviews
Rating in categories
Project Engineer
36
salaries
| ₹3.5 L/yr - ₹7.4 L/yr |
Safety Officer
28
salaries
| ₹1.7 L/yr - ₹3.6 L/yr |
Network Engineer
20
salaries
| ₹2.9 L/yr - ₹6.5 L/yr |
Project Manager
14
salaries
| ₹6.5 L/yr - ₹10 L/yr |
Administration Assistant
13
salaries
| ₹2.5 L/yr - ₹4.1 L/yr |
Indus Towers
BT Business
Nvidia
Vindhya Telelinks