Filter interviews by
Be the first one to contribute and help others!
HSE Plan is a document outlining how health, safety, and environmental risks will be managed on a project or in a workplace.
HSE Plan includes identification of hazards and risks
It outlines control measures to mitigate risks
Includes emergency response procedures
Assigns responsibilities to individuals or teams
Regular review and updates are essential
Improving workplace safety culture involves leadership commitment, employee engagement, training, communication, and continuous improvement.
Promote leadership commitment to safety by setting clear expectations and leading by example
Engage employees in safety initiatives through regular communication, feedback mechanisms, and involvement in safety committees
Provide comprehensive safety training for all employees, includ...
Subcontractors can be managed by establishing clear communication, setting expectations, monitoring performance, and providing necessary support.
Establish clear communication channels with subcontractors to ensure alignment on project goals and expectations.
Set clear expectations regarding safety protocols, quality standards, and project timelines.
Regularly monitor subcontractor performance to ensure compliance with HS...
Different types of Permit to Work (PTW) include hot work permit, confined space entry permit, electrical work permit, etc.
Hot work permit
Confined space entry permit
Electrical work permit
Excavation permit
Working at height permit
posted on 11 Nov 2024
During wainad flood rescue operation I have searched and recovered 01 casuality after 08 hrs hard work and in jhansi flood saved 03 personal who were trapped inside temple.
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There were 2 interview rounds.
ETL stands for Extract, Transform, Load. It is a process used to extract data from various sources, transform it into a consistent format, and load it into a target database or data warehouse.
Extract: Involves extracting data from different sources such as databases, files, APIs, etc.
Transform: Data is cleaned, validated, and transformed into a consistent format suitable for analysis.
Load: The transformed data is loade...
The correct structure of a DBMS diagram includes entities, attributes, relationships, and keys.
Entities represent the main objects in the database (e.g. Customer, Product).
Attributes are characteristics of entities (e.g. CustomerID, ProductName).
Relationships show how entities are related to each other (e.g. one-to-many, many-to-many).
Keys uniquely identify each record in a table (e.g. Primary Key, Foreign Key).
ChatGpt will replace the employment
posted on 29 Oct 2024
I applied via Company Website and was interviewed in Sep 2024. There were 3 interview rounds.
I have 11 years of security experience and a strong understanding of security protocols and procedures.
I have worked as a security guard for 5 years, ensuring the safety and security of various premises.
I am well-versed in security protocols and
procedures, including access control, surveillance, and emergency response. During my time as a security guard, I have successfully handled various security incidents, such as trespassing, theft, and disturbances.
I have received training in first aid and CPR, enabling me to provide immediate assistance in case of medical emergencies.
I am skilled in using security equipment and technology, such as CCTV cameras, alarm systems, and metal detectors.
The roles of a security guard include protecting people and property, monitoring surveillance equipment, enforcing laws and regulations, and responding to emergencies.
Protecting people and property from theft, vandalism, and other illegal activities
Monitoring surveillance equipment to detect suspicious behavior or activities
Enforcing laws and regulations on the premises
Responding to emergencies such as fires, medical incidents, or security breaches
Communication skills, Computer knowledge, common sense, and how to handle emergency situation
I generate leads through a combination of digital marketing strategies, networking events, and referrals.
Utilize social media platforms to create targeted ads and engage with potential leads
Attend industry conferences and trade shows to network and generate leads
Ask satisfied customers for referrals to expand the lead pool
Heat detectors are devices that sense abnormally high temperatures and are typically used in areas where smoke detectors may not be suitable.
Types of heat detectors include fixed temperature detectors, rate-of-rise detectors, and combination detectors.
Fixed temperature detectors activate when a specific temperature is reached.
Rate-of-rise detectors activate when the temperature increases rapidly.
Combination detectors c...
NWC, NWF, and NWD are different file formats used in BIM modeling.
NWC (Navisworks Cache) is a lightweight file format used for sharing models with stakeholders who do not have access to the original software.
NWF (Navisworks File) is a project file format that references multiple NWD files and allows for collaboration and coordination.
NWD (Navisworks Document) is a published file format that contains all the data and ge
posted on 5 Nov 2024
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
Developed a web-based application for tracking and managing project tasks.
Used React.js for front-end development
Implemented RESTful APIs using Node.js and Express
Utilized MongoDB for database storage
Integrated authentication and authorization using JWT tokens
I am interested in this role because I am passionate about combining software development and operations to improve efficiency and reliability.
Passionate about DevOps principles and practices
Excited about automating processes and improving efficiency
Interested in working with cutting-edge technologies like Docker and Kubernetes
OOPs concepts refer to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation detail
Exceptions in Spring Boot can be handled using @ExceptionHandler annotation, @ControllerAdvice annotation, and custom exception classes.
Use @ExceptionHandler annotation to handle exceptions at the controller level.
Use @ControllerAdvice annotation to handle exceptions globally across all controllers.
Create custom exception classes by extending RuntimeException or Exception classes and use them to handle specific excepti...
Spring MVC is a framework for building web applications in Java, based on the Model-View-Controller design pattern.
Spring MVC provides a way to structure your web application using a Model-View-Controller architecture.
It allows for easy integration with other Spring frameworks like Spring Boot and Spring Security.
Controllers handle incoming requests, process them, and return a response.
Views are responsible for renderi...
based on 1 review
Rating in categories
G4S
Security and Intelligence Services (India)
Border Security Force
Central Industrial Security Force