i
3i Infotech
Filter interviews by
posted on 3 Dec 2024
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
posted on 21 May 2024
I applied via Naukri.com and was interviewed in Apr 2024. There were 7 interview rounds.
An aptitude is a component of a competence to do a certain kind of work at a certain level. Outstanding aptitude can be considered "talent", or "skill". Aptitude is inborn potential to perform certain kinds of activities, whether physical or mental, and whether developed or undeveloped
Coding is the process of allowing humans to speak to computers. As computers only understand binary language — a series of zeros and ones — humans need to use a programming language as a translator of sorts.
Group discussion is a discussion between a group of participants on a given subject. A group discussion typically forms a part of the selection process used by organisations and educational institutions. The candidates talk about the given topic to present facts, opinions and conclusions.
An assignment is a task that someone in authority has asked you to do. The word assignment is just the noun form of the common verb assign, which you use when you want to give someone a duty or a job. When you assign something, that something is called an assignment.
Case study is an appropriate research design when you want to gain concrete, contextual, in-depth knowledge about a specific real-world subject. It allows you to explore the key characteristics, meanings, and implications of the case. Case studies are often a good choice in a
Technical skills often require specific education, such as programming languages, technical writing, or data analysis.
Programming languages: Examples include Java, Python, C++, etc.
Technical writing: Ability to write technical documentation, manuals, and reports.
Data analysis: Skills in analyzing and interpreting data using tools like Excel, SQL, or R.
I applied via Naukri.com and was interviewed in Dec 2021. There were 3 interview rounds.
posted on 30 Jun 2022
It is all about basic common questions like Mathematics,Reasoning,English etc
A network is more useful to users because it allows for easy communication, access to resources, and sharing of information.
Networks enable users to communicate with each other easily and quickly.
Users can access resources such as files, printers, and applications that are shared on the network.
Information can be easily shared and disseminated among users on the network.
Networks provide a platform for collaboration and...
Yes, there is a breach in the network.
Unusual network traffic patterns
Unauthorized access to sensitive data
Unexpected system behavior or performance issues
Logs indicating suspicious activities
Security alerts or notifications
VPNs are used to create secure and private connections over public networks.
VPNs encrypt data to ensure confidentiality and protect against unauthorized access.
VPNs allow remote access to private networks, enabling users to securely connect to their work network from anywhere.
VPNs can bypass geographical restrictions and censorship, providing access to restricted content.
VPNs can be used to enhance online privacy by ma...
DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.
DNS is responsible for resolving domain names to their corresponding IP addresses.
It allows users to access websites and other resources using easy-to-remember domain names instead of numerical IP addresses.
DNS operates through a hierarchical structure of servers, including authoritative DNS servers, recursive...
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and int...
IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System.
IPS is a security device that actively monitors network traffic to prevent malicious activities.
IDS is a security device that passively monitors network traffic to detect potential security breaches.
IPS can block or prevent malicious traffic from entering the network.
IDS can only detect and alert about potential security threats.
Bo...
I chose networking as a career because of my passion for technology and problem-solving.
Passion for technology and problem-solving
Interest in understanding how computer networks function
Opportunity to work with cutting-edge technologies
Ability to troubleshoot and resolve network issues
Desire to contribute to the development of secure and efficient networks
I would expect a competitive salary based on my experience, skills, and the market standards.
I would like to discuss the salary range for this position based on the responsibilities and expectations.
Considering my qualifications and the industry standards, I anticipate a fair compensation package.
I am open to negotiation and would appreciate a salary that reflects my expertise and contributions.
I believe a mutually ben...
posted on 23 Jun 2022
I applied via Recruitment Consulltant and was interviewed in May 2022. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2021. There were 3 interview rounds.
posted on 3 Dec 2024
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
posted on 21 May 2024
I applied via Naukri.com and was interviewed in Apr 2024. There were 7 interview rounds.
An aptitude is a component of a competence to do a certain kind of work at a certain level. Outstanding aptitude can be considered "talent", or "skill". Aptitude is inborn potential to perform certain kinds of activities, whether physical or mental, and whether developed or undeveloped
Coding is the process of allowing humans to speak to computers. As computers only understand binary language — a series of zeros and ones — humans need to use a programming language as a translator of sorts.
Group discussion is a discussion between a group of participants on a given subject. A group discussion typically forms a part of the selection process used by organisations and educational institutions. The candidates talk about the given topic to present facts, opinions and conclusions.
An assignment is a task that someone in authority has asked you to do. The word assignment is just the noun form of the common verb assign, which you use when you want to give someone a duty or a job. When you assign something, that something is called an assignment.
Case study is an appropriate research design when you want to gain concrete, contextual, in-depth knowledge about a specific real-world subject. It allows you to explore the key characteristics, meanings, and implications of the case. Case studies are often a good choice in a
Technical skills often require specific education, such as programming languages, technical writing, or data analysis.
Programming languages: Examples include Java, Python, C++, etc.
Technical writing: Ability to write technical documentation, manuals, and reports.
Data analysis: Skills in analyzing and interpreting data using tools like Excel, SQL, or R.
posted on 30 Jun 2022
It is all about basic common questions like Mathematics,Reasoning,English etc
A network is more useful to users because it allows for easy communication, access to resources, and sharing of information.
Networks enable users to communicate with each other easily and quickly.
Users can access resources such as files, printers, and applications that are shared on the network.
Information can be easily shared and disseminated among users on the network.
Networks provide a platform for collaboration and...
Yes, there is a breach in the network.
Unusual network traffic patterns
Unauthorized access to sensitive data
Unexpected system behavior or performance issues
Logs indicating suspicious activities
Security alerts or notifications
VPNs are used to create secure and private connections over public networks.
VPNs encrypt data to ensure confidentiality and protect against unauthorized access.
VPNs allow remote access to private networks, enabling users to securely connect to their work network from anywhere.
VPNs can bypass geographical restrictions and censorship, providing access to restricted content.
VPNs can be used to enhance online privacy by ma...
DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.
DNS is responsible for resolving domain names to their corresponding IP addresses.
It allows users to access websites and other resources using easy-to-remember domain names instead of numerical IP addresses.
DNS operates through a hierarchical structure of servers, including authoritative DNS servers, recursive...
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and int...
IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System.
IPS is a security device that actively monitors network traffic to prevent malicious activities.
IDS is a security device that passively monitors network traffic to detect potential security breaches.
IPS can block or prevent malicious traffic from entering the network.
IDS can only detect and alert about potential security threats.
Bo...
I chose networking as a career because of my passion for technology and problem-solving.
Passion for technology and problem-solving
Interest in understanding how computer networks function
Opportunity to work with cutting-edge technologies
Ability to troubleshoot and resolve network issues
Desire to contribute to the development of secure and efficient networks
I would expect a competitive salary based on my experience, skills, and the market standards.
I would like to discuss the salary range for this position based on the responsibilities and expectations.
Considering my qualifications and the industry standards, I anticipate a fair compensation package.
I am open to negotiation and would appreciate a salary that reflects my expertise and contributions.
I believe a mutually ben...
based on 18 reviews
Rating in categories
Software Engineer
673
salaries
| ₹2 L/yr - ₹11 L/yr |
Senior Software Engineer
444
salaries
| ₹4.4 L/yr - ₹18 L/yr |
Software Developer
330
salaries
| ₹2 L/yr - ₹10.5 L/yr |
Softwaretest Engineer
263
salaries
| ₹3 L/yr - ₹9.2 L/yr |
Desktop Support Engineer
229
salaries
| ₹1 L/yr - ₹4.8 L/yr |
TCS
Infosys
Wipro
HCLTech