Filter interviews by
Top trending discussions
I was interviewed in Jan 2025.
To the job programming in a group discussion on a developed to the company
I am joined in a company because to my family problems and my responsibilities
To the solve in a family problems and i joined to the company
I am Bsc complete in a job to the Wipro company are joined
posted on 2 Feb 2025
I was interviewed in Jan 2025.
I was interviewed in Jan 2025.
posted on 25 Jan 2025
I was interviewed in Dec 2024.
A standardized assessment that measures a person's skills, cognitive abilities, and potential to perform in a specific role.
posted on 5 Feb 2025
I was interviewed in Aug 2024.
I was interviewed in Dec 2024.
40 marks of exam you want only minimum 20 marks
I was interviewed in Dec 2024.
Our team follows a CI/CD workflow that includes automated testing, code reviews, and continuous integration.
Automated testing is run on every code change to catch bugs early.
Code reviews are conducted before merging changes to ensure code quality.
Continuous integration is used to automatically build and test code changes in a shared repository.
Deployment pipelines are set up to automate the release process.
Version cont...
Yes, there have been security incidents and I have handled them effectively.
Implemented security protocols to prevent future incidents
Conducted thorough investigation to identify the root cause
Collaborated with IT team to strengthen security measures
Communicated with stakeholders to ensure transparency and trust
Provided training to employees on cybersecurity best practices
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization determines the level of access or permissions a user has once their identity is confirmed.
Authentication is the process of logging in, while authorization is the process of granting or denyin...
LLD for an authentication and authorization system
Separate modules for authentication and authorization
Use of secure hashing algorithms for storing passwords
Role-based access control implementation
Audit logging for tracking user actions
Integration with external identity providers
Design a document managed storage like Google Drive as an E2E solution.
Implement user authentication and authorization for secure access.
Create a user-friendly interface for uploading, organizing, and sharing documents.
Include features like version control, file syncing, and search functionality.
Utilize cloud storage for scalability and accessibility.
Implement encryption for data security.
Integrate with third-party app
based on 7 reviews
Rating in categories
Senior Bridge Engineer
5
salaries
| ₹8.1 L/yr - ₹15 L/yr |
Autocad Draughtsman Civil
4
salaries
| ₹2.4 L/yr - ₹3.6 L/yr |
Bridge Design Engineer
4
salaries
| ₹5 L/yr - ₹8.5 L/yr |
CAD Technician
4
salaries
| ₹1.7 L/yr - ₹5.7 L/yr |
Senior CAD Technician
4
salaries
| ₹8 L/yr - ₹11.8 L/yr |
Larsen & Toubro Limited
TCS
Infosys
Wipro