BhaskarRaghuHardware |
- WhatsApp web: messaging client now available on internet browsers
- 35 Google’s Tricky Interview Questions
- 30 Networking Interview Questions
- 30 Useful Linux Commands
- Basic Cat Command Examples in Linux
- 5 Stupid Interview Questions (And How To Answer Them)
- 10 most asked interview questions! (Networking)
- Poodle Attacks or Vulnerability
- How to install Everything
- How to install GNS3
| WhatsApp web: messaging client now available on internet browsers Posted: 22 Jan 2015 07:44 PM PST WhatsApp web: messaging client now available on internet browsersPopular smartphone messaging service WhatsApp has been made available on web browsers for the first time. Jan Koum, the firm's CEO, made the announcement on his Facebook page. Smartphone users who wish to connect to the client using their web browser must go to https://web.whatsapp.com.The post WhatsApp web: messaging client now available on internet browsers appeared first on BhaskarRaghuHardware. | |||||||
| 35 Google’s Tricky Interview Questions Posted: 16 Jan 2015 07:30 PM PST By Patel Umair Khan’s Blog 1) Do you have an IQ more than 130? 2) What shall we have for dinner this evening? 3) Are you incompetent and Lazy? 4) Do you have a track record of doing something really well? 5) Mention what is the weight of the empire state building? 6) How much should you charge to wash all the windows in NewYork? 7) Why are manhole covers round? 8) Mention how many times a day do a clock's hands overlap? 9) Explain the significance of "dead beef"? 10) Tell me what happened when a man pushed his car to the hotel and lost his fortune? 11) Out of eight balls, seven balls weigh equal while the one ball is slightly heavier than the others how would you figure out which one is the heavier by using a balance and only two weighing?
12) Explain what is database to an eight year old kid? 13) Some months have 30 days, and some have 31, how may months have 28 days? 14) What number comes next 10, 9, 60, 90, 70 and 66?
The next probable number would be anything that has 9 letters in it, i.e., ninety-six or ninety-one. 15) Suppose Tom is 16 year old, and he is four times older than his brother Robert. How old Tom would be when he is twice as old as her brother? 16) Which number does not belong to this series 1,1,2,3,4,5,8,13,21? 17) What will be the next number 5,10,19,32,49,70 ….? 18) There are about 13 caves arranged in a circle, and one of these caves has treasure of Each day the treasure keepers can move the treasure to the adjacent caves or keep it in the same cave. Every two-day treasure keepers visit the place and have enough time to enter any two caves of their choice __ So how do the treasure seekers can find a treasure in minimum possible days? 19) There are six drinking glasses standing in a row, with first three full of juice and the next three empty? How can you arrange those glasses so empty and full glasses alternate by moving only one glass? 20) Brother and sisters I have none but this man's father is my father's son? Who is the Man? 21) A red house is made of red bricks; a blue house is made up of blue bricks than what does the green house is made up of? 22) Explain how five minus two equal 4? 23) The day before the day before yesterday is three days after Saturday. What day is today? 24) Who will be the shortest among all of them?
Answer: There is no answer, because Roger and Oliver are equally tall. 25) A trader buys sugar for $1200 and sell it for $1500, per sack of sugar he makes a profit of $50. How many sacks of sugar did he have? 26) Mention which lamp is brightest than all?
The correct answer is B. 27) How can you get a total of 1000, by adding eight 8? 28) There is a casino and it has 4 gates, let say A, B, C and D. Now the condition is that every time you enter casino you have to pay $5 and every time you leave the casino, you again have to pay $5. Also, whenever you enter the casino whatever amount you have with you will get double. Now you enter the casino through gate A and come out through gate B, again you go inside casino from gate C and come out of gate D, at the end of this process you should be left with no money? So calculate how much money you should carry with you when you enter the Casino?
29) By using number 7,3,7,3 can you get number 24 by using any mathematical signs (+, – , x, /)? 30) Now we have a committee of 10 members, where age of all 10 members is same as it was 4 years ago, because an old member is replaced by young member? Find out how much younger is the new member?
31) Find a 8 digit number that if multiplied with 9 or any of its multiples ( 18, 27, 36, 45,…) it will get the multiplication factor repeated (n) number of times like 111111, 22222, 333333 and so on? 32) If you have a piece of paper that have a thickness of 0.1 mm, how many times you have to fold the paper in half to become tall enough to reach the moon? 33) If a car is driving at 100mph down straight road, then what is the speed of each of its wheels at the point where they touch the ground? 34) An airplane crashed into a field and every single person died except two how come? 35) A man predicts that he can predict the exact score of every foot ball game before it begins, and he is always right, how come? The post 35 Google's Tricky Interview Questions appeared first on BhaskarRaghuHardware. | |||||||
| 30 Networking Interview Questions Posted: 15 Jan 2015 09:19 PM PST By Patel Umair Khan’s Blog 1. Define Network? A network is a set of devices connected by physical media links. A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes. 2. What is a Link? At the lowest level, a network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Link. 3. What is a node? A network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Links and the computer it connects is called as Nodes. 4. What is a gateway or Router? A node that is connected to two or more networks is commonly called as router or Gateway. It generally forwards message from one network to another. 5. What is point-point link? If the physical links are limited to a pair of nodes it is said to be point-point link. 6. What is Multiple Access? If the physical links are shared by more than two nodes, it is said to be Multiple Access. 7. What are the advantages of Distributed Processing? a. Security/Encapsulation b. Distributed database c. Faster Problem solving d. Security through redundancy e. Collaborative Processing 8. What are the criteria necessary for an effective and efficient network? a. Performance It can be measured in many ways, including transmit time and response time. b. Reliability It is measured by frequency of failure, the time it takes a link to recover from a failure, and the network’s robustness. c. Security Security issues includes protecting data from unauthorized access and virues. 9. Name the factors that affect the performance of the network? a. Number of Users b. Type of transmission medium c. Hardware d. Software 10. Name the factors that affect the reliability of the network? a. Frequency of failure b. Recovery time of a network after a failure 11. Name the factors that affect the security of the network? a. Unauthorized Access b. Viruses 12. What is Protocol? A protocol is a set of rules that govern all aspects of information communication. 13. What are the key elements of protocols? The key elements of protocols are a. Syntax It refers to the structure or format of the data, that is the order in which they are presented. b. Semantics It refers to the meaning of each section of bits. c. Timing Timing refers to two characteristics: When data should be sent and how fast they can be sent. 14. What are the key design issues of a computer Network? a. Connectivity b. Cost-effective Resource Sharing c. Support for common Services d. Performance 15. Define Bandwidth and Latency? Network performance is measured in Bandwidth (throughput) and Latency (Delay). Bandwidth of a network is given by the number of bits that can be transmitted over the network in a certain period of time. Latency corresponds to how long it t5akes a message to travel from one end off a network to the other. It is strictly measured in terms of time. 16. Define Routing? The process of determining systematically hoe to forward messages toward the destination nodes based on its address is called routing. 17. What is a peer-peer process? The processes on each machine that communicate at a given layer are called peer-peer process. 18. When a switch is said to be congested? It is possible that a switch receives packets faster than the shared link can accommodate and stores in its memory, for an extended period of time, then the switch will eventually run out of buffer space, and some packets will have to be dropped and in this state is said to congested state. 19. What is semantic gap? Defining a useful channel involves both understanding the applications requirements and recognizing the limitations of the underlying technology. The gap between what applications expects and what the underlying technology can provide is called semantic gap. 20. What is Round Trip Time? The duration of time it takes to send a message from one end of a network to the other and back, is called RTT. 21. Define the terms Unicasting, Multiccasting and Broadcasting? If the message is sent from a source to a single destination node, it is called Unicasting. If the message is sent to some subset of other nodes, it is called Multicasting. If the message is sent to all the m nodes in the network it is called Broadcasting. 22. What is Multiplexing? Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. 23. Name the categories of Multiplexing? a. Frequency Division Multiplexing (FDM) b. Time Division Multiplexing (TDM) i. Synchronous TDM ii. ASynchronous TDM Or Statistical TDM. c. Wave Division Multiplexing (WDM) 24. What is FDM? FDM is an analog technique that can be applied when the bandwidth of a link is greater than the combined bandwidths of the signals to be transmitted. 25. What is WDM? WDM is conceptually the same as FDM, except that the multiplexing and demultiplexing involve light signals transmitted through fiber optics channel. 26. What is TDM? TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate required by the sending and receiving devices. 27. What is Synchronous TDM? In STDM, the multiplexer allocates exactly the same time slot to each device at all times, whether or not a device has anything to transmit. 28. List the layers of OSI a. Physical Layer b. Data Link Layer c. Network Layer d. Transport Layer e. Session Layer f. Presentation Layer g. Application Layer 29. Which layers are network support layers? a. Physical Layer b. Data link Layer and c. Network Layers 30. Which layers are user support layers? a. Session Layer The post 30 Networking Interview Questions appeared first on BhaskarRaghuHardware. | |||||||
| Posted: 15 Jan 2015 04:18 AM PST By Patel Umair Khan’s Blog1. Uptime CommandIn Linux uptime command shows since how long your system is running and the number of users are currently logged in and also displays load average for 1,5 and 15 minutes intervals. # uptime Check Uptime VersionUptime command don't have other options other than uptime and version. It gives information only in hours:mins if it less than 1 day. [tecmint@tecmint ~]$ uptime -V 2. W CommandIt will displays users currently logged in and their process along-with shows load averages. also shows the login name, tty name, remote host, login time, idle time, JCPU, PCPU, command and processes. # w Available options
3. Users CommandUsers command displays currently logged in users. This command don't have other parameters other than help and version. # users 4. Who Commandwho command simply return user name, date, time and host information. who command is similar to w command. Unlike w command who doesn't print what users are doing. Lets illustrate and see the different between who and w commands. # who # w Who command Options
5. Whoami Commandwhoami command print the name of current user. You can also use "who am i" command to display the current user. If you are logged in as a root using sudo command "whoami" command return root as current user. Use "who am i" command if you want to know the exact user logged in. # whoami 6. ls Commandls command display list of files in human readable format. # ls -l Sort file as per last modified time. # ls -ltr
7. Crontab CommandList schedule jobs for current user with crontab command and -l option. # crontab -l Edit your crontab with -e option. In the below example will open schedule jobs in VI editor. Make a necessary changes and quit pressing :wq keys which saves the setting automatically. # crontab -e
8. Less Commandless command allows quickly view file. You can page up and down. Press 'q' to quit from less window. # less install.log 9. More Commandmore command allows quickly view file and shows details in percentage. You can page up and down. Press 'q' to quit out from more window. # more install.log 10. CP CommandCopy file from source to destination preserving same mode. # cp -p fileA fileB You will be prompted before overwrite to file. # cp -i fileA fileB 11. MV CommandRename fileA to fileB. -i options prompt before overwrite. Ask for confirmation if exist already. # mv -i fileA fileB 12. Cat Commandcat command used to view multiple file at the same time. # cat fileA fileB You combine more and less command with cat command to view file contain if that doesn't fit in single screen / page. # cat install.log | less
13. Cd command (change directory)with cd command (change directory) it will goes to fileA directory. # cd /fileA 14. pwd command (print working directory)pwd command return with present working directory. # pwd 15. Sort commandSorting lines of text files in ascending order. with -r options will sort in descending order. #sort fileA.txt 16. VI CommandVi is a most popular text editor available most of the UNIX-like OS. Below examples open file in read only with -R option. Press ':q' to quit from vi window. # vi -R /etc/shadows 17. SSH Command (Secure Shell)SSH command is used to login into remote host. For example the below ssh command will connect to remote host (192.168.50.2) using user as narad. # ssh narad@192.168.50.2 To check the version of ssh use option -V (uppercase) shows version of ssh. # ssh -V 18. Ftp or sftp Commandftp or sftp command is used to connect to remote ftp host. ftp is (file transfer protocol) and sftp is (secure file transfer protocol). For example the below commands will connect to ftp host (192.168.50.2). # ftp 192.168.50.2 Putting multiple files in remote host with mput similarly we can do mget to download multiple files from remote host. # ftp > mput *.txt 19. Service CommandService command call script located at /etc/init.d/ directory and execute the script. There are two ways to start the any service. For example we start the service called httpd with service command. # service httpd start 20. Free commandFree command shows free, total and swap memory information in bytes. # free Free with -t options shows total memory used and available to use in bytes. # free -t 21. Top Commandtop command displays processor activity of your system and also displays tasks managed by kernel in real-time. It'll show processor and memory are being used. Use top command with 'u' option this will display specific User process details as shown below. Press 'O' (uppercase letter) to sort as per desired by you. Press 'q' to quit from top screen. # top -u tecmint
22. Tar Commandtar command is used to compress files and folders in Linux. For example the below command will create a archive for /home directory with file name as archive-name.tar. # tar -cvf archive-name.tar /home To extract tar archive file use the option as follows. # tar -xvf archive-name.tar
23. Grep Commandgrep search for a given string in a file. Only tecmint user displays from /etc/passwd file. we can use -i option for ignoring case sensitive. # grep tecmint /etc/passwd 24. Find CommandFind command used to search files, strings and directories. The below example of find command search tecmint word in '/' partition and return the output. # find / -name tecmint
25. lsof Commandlsof mean List of all open files. Below lsof command list of all opened files by user tecmint. # lsof -u tecmint
26. last commandWith last command we can watch user's activity in the system. This command can execute normal user also. It will display complete user's info like terminal, time, date, system reboot or boot and kernel version. Useful command to troubleshoot. # last You can use last with username to know for specific user's activity as shown below. # last tecmint 27. ps commandps command displays about processes running in the system. Below example show init process only. # ps -ef | grep init 28. kill commandUse kill command to terminate process. First find process id with ps command as shown below and kill process with kill -9 command. # ps -ef | grep init 29. rm commandrm command used to remove or delete a file without prompting for confirmation. # rm filename Using -i option to get confirmation before removing it. Using options '-r' and '-f' will remove the file forcefully without confirmation. # rm -i test.txt 30. mkdir command example.mkdir command is used to create directories under Linux. # mkdir directoryname This is a handy day to day useable basic commands in Linux / Unix-like operating system. Kindly share through our comment box if we missed out. The post 30 Useful Linux Commands appeared first on BhaskarRaghuHardware. | |||||||
| Basic Cat Command Examples in Linux Posted: 15 Jan 2015 04:09 AM PST By Patel Umair Khan’s Blog The cat (short for "concatenate") command is one of the most frequently used command in Linux/Unix like operating systems. cat command allows us to create single or multiple files, view contain of file, concatenate files and redirect output in terminal or files. In this article, we are going to find out handy use of cat commands with their examples in Linux. 13 Basic Linux Cat Commands General Syntaxcat [OPTION] [FILE]... 1. Display Contains of FileIn the below example, it will show contains of /etc/passwd file. # cat /etc/passwd 2. View Contains of Multiple Files in terminalIn below example, it will display contains of test and test1 file in terminal. # cat test test1 3. Create a File with Cat CommandWe will create a file called test2 file with below command. # cat >test2 Awaits input from user, type desired text and press CTRL+D (hold down Ctrl Key and type 'd') to exit. The text will be written in test2 file. You can see contains of file with following cat command. # cat test2 4. Use Cat Command with More & Less OptionsIf file having large number of contains that won't fit in output terminal and screen scrolls up very fast, we can use parameters more and less with cat command as show above. # cat song.txt | more 5. Display Line Numbers in FileWith -n option you could see the line numbers of a file song.txt in the output terminal. # cat -n song.txt 6. Display $ at the End of FileIn the below, you can see with -e option that '$' is shows at the end of line and also in space showing '$' if there is any gap between paragraphs. This options is useful to squeeze multiple lines in a single line. # cat -e test 7. Display Tab separated Lines in FileIn the below output, we could see TAB space is filled up with '^I' character. # cat -T test 8. Display Multiple Files at OnceIn the below example we have three files test, test1 and test2 and able to view the contains of those file as shown above. We need to separate each file with ; (semi colon). # cat test; cat test1; cat test2 9. Use Standard Output with Redirection OperatorWe can redirect standard output of a file into a new file else existing file with '>' (greater than) symbol. Careful, existing contains of test1 will be overwritten by contains of test file. # cat test > test1 10. Appending Standard Output with Redirection OperatorAppends in existing file with '>>' (double greater than) symbol. Here, contains of test file will be appended at the end of test1 file. # cat test >> test1 11. Redirecting Standard Input with Redirection OperatorWhen you use the redirect with standard input '<' (less than symbol), it use file name test2 as a input for a command and output will be shown in a terminal. # cat < test2 12. Redirecting Multiple Files Contain in a Single FileThis will create a file called test3 and all output will be redirected in a newly created file. # cat test test1 test2 > test3 13. Sorting Contains of Multiple Files in a Single FileThis will create a file test4 and output of cat command is piped to sort and result will be redirected in a newly created file. # cat test test1 test2 test3 | sort > test4 This article shows the basic commands that may help you to explore cat command. You may refer man page of cat command if you want to know more options. In out next article we will cover more advanced cat commands. Please share it if you find this article useful through our comment box below. The post Basic Cat Command Examples in Linux appeared first on BhaskarRaghuHardware. | |||||||
| 5 Stupid Interview Questions (And How To Answer Them) Posted: 12 Jan 2015 08:48 PM PST By Patel Umair Khan’s Blog 1. Why do you want this job?This question fails so hard. A recruiter/hiring manager needs to gauge your level of interest in their position and organization, obviously . Initially, candidates can prove that by submitting a resume/application for the opening. Also, not that employers have time to read them, but cover letters should be very specific as to why you'd like to work for their company and particular position. Study your cover letter and use it to answer this question. Even without preparation, most people can BS a great answer on the spot. 2. What are your greatest strengths?Quickly becoming extinct, most organizations have removed the question from their interview strategy. To answer, check the job description for essential skills listed. Use this list to create your own personal greatest strengths. No, I don't condone lying but the company should be punished for its use of such a terrible question. 3. What are your greatest weaknesses?Barf. Also becoming extinct, this question is far worse than asking candidates about their strengths. Most candidates assume a strong answer would be something like, "I work too hard, or care too much about the projects I'm assigned", hoping to make a positive aspect of themselves sound negative. At this point, recruiters/hiring managers have heard enough of those sugar coated answers and their interest is in your true weakness. If you must answer this question, go about it smartly. Again, review the job description for important skill sets, traits, and essential job functions. Once you know what skill sets are important to the job, you'll also know skill sets NOT important. Create a few weaknesses that aren't important for the position, and utilize those for your answer. 4. How would your co-workers describe you?What a waste of time. Isn't the reference check enough? When asked this question, be very specific. Example, "When I worked with Tom at Google, he always said I worked best with our customers." State a name, the company, and something that reflects your value. An example of something not to say is, "Bob told me I smiled a lot." Easy enough, right? 5. Where do you see yourself in 5 years?Terrible. Absolutely terrible question. Loyalty is gone. Employers don't expect you to stay for 5 years, and I'm sure you feel the same. People take whatever they can from an employer (money, skill) and move on. There will always be people who end up staying with a company for 20 years, but its growing increasingly rare to see. To answer, be broad. Be honest, but be broad. State a few of your career goals, but don't mention the exact position or company you hope to work for. If your interviewing with a "stepping stone" company don't let them know it. The post 5 Stupid Interview Questions (And How To Answer Them) appeared first on BhaskarRaghuHardware. | |||||||
| 10 most asked interview questions! (Networking) Posted: 12 Jan 2015 08:40 PM PST By Patel Umair Khan’s Blog1. What types of network do you have experience with?This should be one of the first things you ask. It might be critical to you that the candidate has prior experience with the type of network model you use, but even candidates that don’t could be good fits, assuming they are willing to learn and have other critical skills. In fact, candidates with lots of experience on networks very similar to yours could be too set in their ways to adapt to the way your business does things. 2. What can you tell me about the OSI Reference Model?The OSI Reference Model provides a framework for discussing network design and operations. It groups communication functions into 7 logical layers, each one building on the next. This question will demonstrate whether candidates have the theoretical knowledge to back up their practical skills. 3. What monitoring tools or approaches do you rate?You can extend this to ask about what tools candidates have used in other jobs. Hopefully they will be able to give you a range of products and techniques, and the rationale for their favorites. This can tell you about the depth of their experience and also whether their choices of tools are a good fit for your architecture. 4. What are the benefits of subnetting?Subnetting helps reduce network traffic and the size of the routing tables. It's also a way to add security to network traffic by isolating it from the rest of the network. You don't just want candidates who can technically deploy and administer networks – you also want people who understand the rationale behind your network model. 5. How would you recommend we support our mobile workers?Look for answers that talk about bandwidth availability, user experience, and traffic security. It's also interesting to see if candidates ask what sort of applications mobile workers use and then tailor their answers to reflect the way the network will be used. 6. What's your experience of configuration management?This question probes candidates’ thoughts and experiences of the structure and governance that surrounds networking. You want someone with deep technical knowledge and domain experience, but also someone who isn't a maverick who will make changes without following the proper protocols. 7. How does the networking team interact with other areas of IT?While candidates will be networking specialists, the best will have an overall awareness of how what they do affects other areas of IT. Answers could cover working with platform and application specialists, being involved in projects, or collaboration with telephony experts. 8. What do you know about our industry?While industry knowledge isn't a prerequisite for success at a networking job, it’s useful to find out what, if anything, the candidate knows about the environment that they will be working in. The network requirements for a hospital are very different from those of an international retailer. And this question will show you which candidates have done any homework about the job before coming to the interview. 9. What would you like your job to not include?This question will help you avoid someone who ends up leaving after a couple of weeks. Ideally, you'll have sent your candidates a job description, and they won't have applied if they didn't like the look of the role, but that doesn't always happen – you can't rely on candidates to have read the job specs! 10. Do you have any questions for us?Always give candidates opportunities to ask you questions. Candidates who whip out lists of questions show that they have prepared for the interview. Candidates who try to negotiate pension contributions at this first stage probably don't have the enthusiasm for the role that you are looking for. Candidates who ask nothing at all, meanwhile, are underprepared and not that interested in the company or the job. The post 10 most asked interview questions! (Networking) appeared first on BhaskarRaghuHardware. | |||||||
| Poodle Attacks or Vulnerability Posted: 12 Jan 2015 01:03 PM PST
The post Poodle Attacks or Vulnerability appeared first on BhaskarRaghuHardware. | |||||||
| Posted: 12 Jan 2015 03:37 AM PST Hello Fellas! I have created another blog with a name “How to install…” I am adding and have added various software and operating system installation procedures with screenshots. The post How to install Everything appeared first on BhaskarRaghuHardware. | |||||||
| Posted: 12 Jan 2015 03:04 AM PST Installing and Config GNS3 on Windows 7PDF Guide for GNS3 installation:
Before learning how to install the Graphic Network Simulator or GNS3 on a computer, it is important to understand what the application is, how it works, and where it can be used. GNS3 is a GUI-based software application that is used by most networking scholars and network professionals to learn and establish Cisco-based network topologies in a virtual environment. In other words, GNS3 can be compared to VMware Workstation or Microsoft Virtual PC with the difference that in these 2 scholars and administrators can create and use the virtual machines having Windows, Mac, or Linux as guest operating systems, whereas in the GNS3 they can create and use virtual routers. Virtual routers created and configured in the application can be mapped with the physical NIC (the LAN card on the host computer) so that the virtual router topology can interact with the physical network infrastructure. In order to use GNS3 on your computer, you must ensure which version of Windows operating system you are using (32-bit or 64-bit), how much RAM does your computer have, what kind of processor is installed on your computer, etc. You can download GNS3 application from the www.gns3.net/download. While downloading, you must always choose the right version of the application, i.e. 32-bit or 64-bit, according to the operating system that you have. In case you're not sure which edition of the OS is installed on your computer, it is recommended to download the all-in-one pack for GNS3 that is available on the above link. Once you have downloaded the correct installation file for the application, the process for installing GNS3 is quite easy and is given below:
The post How to install GNS3 appeared first on BhaskarRaghuHardware. This posting includes an audio/video/photo media file: Download Now | |||||||
| You are subscribed to email updates from BhaskarRaghuHardware To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
| Google Inc., 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States | |
No comments:
Post a Comment