HCL Technologies Interview Experience for GET | By The Digital Insider

Location: PAN India
Date: July 2020
Rounds: 2 Rounds(Technical +HR)
Type: Off-Campus
Result: Selected
Platform Used: Microsoft Meet

First of all, I got a call from the campus recruiter, asking for the details and giving an interview time slot.  

Interview Round 1(Technical): (30-45 Min)

  • Tell Me About Yourself?
  • Past Experience and Project Details?
  • How to handle exceptions in web applications using PHP?

Ans: An exception is an unexpected program result that can be handled by the program itself. Exception Handling in PHP is almost similar to exception handling in all programming languages.
PHP provides the following specialized keywords for this purpose.

try: It represents a block of code in which exceptions can arise.
catch: It represents a block of code that will be executed when a particular exception has been thrown.
throw: It is used to throw an exception. It is also used to list the exceptions that a function throws but doesn’t handle itself.
finally: It is used in place of a catch block or after a catch block basically it is put for cleanup activity in PHP code.

Why Exception Handling in PHP?

The following are the main advantages of exception handling over error handlingSeparation of error handling code from normal code: In traditional error handling code there is always an if-else block to handle errors. These conditions and code to handle errors got mixed so that becomes unreadable. With try Catch block code becomes readable.
Grouping of error types: In PHP both basic types and objects can be thrown as exceptions. It can create a hierarchy of exception objects, group exceptions in namespaces or classes, and categorize them according to types.

What are Static and class can be static, if it is then what is Static Class?

ANS:- Java allows a class to be defined within another class. These are called Nested Classes. Classes can be static which most developers are aware of, henceforth some classes can be made static in Java. Java supports Static Instance Variables, Static Methods, Static Block, and Static Classes.   The class in which the nested class is defined is known as the Outer Class. Unlike top-level classes, Inner classes can be Static. Non-static nested classes are also known as Inner classes.

An instance of an inner class cannot be created without an instance of the outer class. Therefore, an inner class instance can access all of the members of its outer class, without using a reference to the outer class instance. For this reason, inner classes can help make programs simple and concise. 

Can Constructor be private?

Ans: As you can easily guess, like any method we can provide access specifier to the constructor. If it’s made private, then it can only be accessed inside the class.There are various scenarios where we can use private constructors. The major ones are

Internal Constructor chaining
Singleton class design pattern
What is a Singleton class?

As the name implies, a class is said to be singleton if it limits the number of objects of that class to one.

We can’t have more than a single object for such classes.

Singleton classes are employed extensively in concepts like Networking and Database Connectivity.

Design Pattern of Singleton classes:

The constructor of the singleton class would be private so there must be another way to get the instance of that class. This problem is resolved using a class member instance and a factory method to return the class member.

What is Constructor?

Ans: Constructor is a block of codes similar to the method. It is called when an instance of the class is created. At the time of calling the constructor, memory for the object is allocated in the memory. It is a special type of method that is used to initialize the object. Every time an object is created using the new() keyword, at least one constructor is called.

What is Abstraction?

Ans: Data Abstraction is the property by virtue of which only the essential details are displayed to the user. The trivial or the non-essential units are not displayed to the user. Ex: A car is viewed as a car rather than its individual components.

Data Abstraction may also be defined as the process of identifying only the required characteristics of an object ignoring the irrelevant details. The properties and behaviors of an object differentiate it from other objects of similar type and also help in classifying/grouping the objects.

Consider a real-life example of a man driving a car. The man only knows that pressing the accelerator will increase the speed of a car or applying brakes will stop the car, but he does not know how pressing the accelerator the speed is actually increasing, he does not know about the inner mechanism of the car or the implementation of the accelerator, brakes, etc in the car. This is what abstraction is. 

What is Cyber Security and Cryptography?

Ans: Cryptography is the study and practice of techniques for secure communication in the presence of third parties called adversaries. It deals with developing and analyzing protocols that prevent malicious third parties from retrieving information being shared between two entities thereby following the various aspects of information security. Secure Communication refers to the scenario where the message or data shared between two parties can’t be accessed by an adversary. In Cryptography, an Adversary is a malicious entity, which aims to retrieve precious information or data thereby undermining the principles of information security. Data Confidentiality, Data Integrity, Authentication and Non-repudiation are core principles of modern-day cryptography.

Confidentiality refers to certain rules and guidelines usually executed under confidentiality agreements which ensure that the information is restricted to certain people or places.
Data integrity refers to maintaining and making sure that the data stays accurate and consistent over its entire life cycle.
Authentication is the process of making sure that the piece of data being claimed by the user belongs to it.
Non-repudiation refers to the ability to make sure that a person or a party associated with a contract or a communication cannot deny the authenticity of their signature over their document or the sending of a message.

Port Number of Protocol of TCP/IP Model? 

Ans: Application Layer:-
The application layer is present at the top of the OSI model. It is the layer through which users interact. It provides services to the user.

Application Layer protocol:-
1. TELNET:
Telnet stands for the TELetype NETwork. It helps in terminal emulation. It allows Telnet clients to access the resources of the Telnet server. It is used for managing files on the internet. It is used for the initial setup of devices like switches. The telnet command is a command that uses the Telnet protocol to communicate with a remote device or system. Port number of telnet is 23. 
 

Command  

telnet [\RemoteServer]
\RemoteServer: Specifies the name of the server to which you want to connect
2. FTP:
FTP stands for file transfer protocol. It is the protocol that actually lets us transfer files. It can facilitate this between any two machines using it. But FTP is not just a protocol but it is also a program.FTP promotes sharing of files via remote computers with reliable and efficient data transfer. The Port number for FTP is 20 for data and 21 for control. 

Command

ftp machinename
3. TFTP:
The Trivial File Transfer Protocol (TFTP) is the stripped-down, stock version of FTP, but it’s the protocol of choice if you know exactly what you want and where to find it. It’s a technology for transferring files between network devices and is a simplified version of FTP. The Port number for TFTP is 69.

Command

tftp [ options… ] [host [port]] [-c command] 
4. NFS:
It stands for a network file system. It allows remote hosts to mount file systems over a network and interact with those file systems as though they are mounted locally. This enables system administrators to consolidate resources onto centralized servers on the network. The Port number for NFS is 2049.

Command

service nfs start
5. SMTP:
It stands for Simple Mail Transfer Protocol. It is a part of the TCP/IP protocol. Using a process called “store and forward,” SMTP moves your email on and across networks. It works closely with something called the Mail Transfer Agent (MTA) to send your communication to the right computer and email inbox. The Port number for SMTP is 25.

Command

MAIL FROM:<mail@abc.com?
6. LPD:
It stands for Line Printer Daemon. It is designed for printer sharing. It is the part that receives and processes the request. A “daemon” is a server or agent. The Port number for LPD is 515.

Command

lpd [ -d ] [ -l ] [ -D DebugOutputFile]
7. X window:
It defines a protocol for the writing of graphical user interface–based client/server applications. The idea is to allow a program, called a client, to run on one computer. It is primarily used in networks of interconnected mainframes. The port number for X window starts from 6000 and increases by 1 for each server.

Command  

Run xdm in runlevel 5 
8. SNMP:
It stands for Simple Network Management Protocol. It gathers data by polling the devices on the network from a management station at fixed or random intervals, requiring them to disclose certain information. It is a way that servers can share information about their current state, and also a channel through which an administrate can modify pre-defined values. The Port number of SNMP is 161(TCP) and 162(UDP). 
 

Command  

snmpget -mALL -v1 -cpublic snmp_agent_Ip_address sysName.0
9. DNS:
It stands for Domain Name System. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.abc.com might translate to 198.105.232.4. 
The Port number for DNS is 53. 
 

Command  

ipconfig /flushdns
10. DHCP:
It stands for Dynamic Host Configuration Protocol (DHCP). It gives IP addresses to hosts. There is a lot of information a DHCP server can provide to a host when the host is registering for an IP address with the DHCP server. The port number for DHCP is 67, 68.

Command

clear ip dhcp binding address

Interview Round 2(HR): (15-30 Min)

Question Asked:
1. Tell Me About Yourself?

2. Tell me about Native Place?

3. Can You Relocate Anywhere in India?

4. Can you work in shifts?

5. Why do you want to choose HCL Technologies?

 Tips :

  • Just Clear your concept very well and research the company before going to Interview.
  • You Should have good bandwidth on the Internet. 

 



#Adversaries, #ApplicationLayer, #Applications, #Authentication, #Channel, #Classes, #Code, #Communication, #Computer, #Computers, #Connectivity, #Cryptography, #Cyber, #CyberSecurity, #Data, #DataIntegrity, #DataTransfer, #Database, #Deals, #Design, #DesignPattern, #Details, #Developers, #Devices, #Dhcp, #DNS, #Email, #Employed, #Emulation, #Giving, #HCL, #How, #HowTo, #Hr, #India, #InformationSecurity, #Internet, #INterview, #InterviewExperiences, #It, #Java, #Languages, #Life, #List, #Mail, #Management, #Members, #Memory, #Message, #Method, #Microsoft, #Model, #Network, #NetworkManagement, #Networking, #Networks, #Objects, #OffCampus, #One, #OSIModel, #Other, #PHP, #Prevent, #Printer, #Process, #Programming, #ProgrammingLanguages, #Project, #Read, #Remote, #Research, #Resources, #Security, #Server, #Servers, #Setup, #Speed, #Study, #Technology, #Terminal, #ThirdParties, #Time, #Tips, #Transfer, #Translate, #Version, #Web, #WhatIs, #Work, #Writing, #X
Published on The Digital Insider at https://bit.ly/3KQSx2M.

Comments