Filter interviews by
I applied via Campus Placement and was interviewed in Mar 2022. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in Jul 2022. There were 3 interview rounds.
It was average and good question it can be done with practice
The curve of a BJT transistor is a plot of the output current versus the input voltage.
The curve is typically divided into three regions: cutoff, active, and saturation.
In the cutoff region, the transistor is off and there is no output current.
In the active region, the transistor acts as an amplifier and the output current is proportional to the input voltage.
In the saturation region, the transistor is fully on and the...
Top trending discussions
posted on 12 Feb 2017
I appeared for an interview in Dec 2016.
I chose IT because of my passion for technology and problem-solving. My strengths include attention to detail and adaptability. I am a quick learner and a team player. I have achieved academic excellence in computer science.
Passion for technology and problem-solving
Attention to detail and adaptability
Quick learner and team player
Academic excellence in computer science
I applied via AmbitionBox and was interviewed in Feb 2021. There were 4 interview rounds.
I applied via Referral and was interviewed in Jul 2022. There were 2 interview rounds.
I am an experienced IT Engineer with a strong background in network administration and troubleshooting.
Experienced IT Engineer
Strong background in network administration
Skilled in troubleshooting
Proficient in various operating systems and software
Familiar with cybersecurity practices
Excellent problem-solving and communication skills
My strength is problem-solving and my weakness is time management.
Strength: I have a strong ability to analyze complex problems and find effective solutions.
Strength: I am skilled in troubleshooting and resolving technical issues.
Weakness: I sometimes struggle with managing my time efficiently and prioritizing tasks.
Weakness: I am working on improving my time management skills by using productivity tools and setting cl...
I transitioned into IT because of my passion for technology and problem-solving.
Passion for technology and problem-solving
Opportunity for growth and advancement
Interest in staying up-to-date with the latest advancements
Ability to contribute to the development of innovative solutions
Examples: Enjoying troubleshooting computer issues, building websites as a hobby
I applied via AmbitionBox and was interviewed in Dec 2022. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
I applied via LinkedIn and was interviewed in Nov 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
Some of the top questions asked at the Bosch Global Software Technologies IT Engineer interview -
Senior Software Engineer
6.5k
salaries
| ₹6.5 L/yr - ₹20 L/yr |
Senior Engineer
2.8k
salaries
| ₹6.7 L/yr - ₹20.5 L/yr |
Software Engineer
2.8k
salaries
| ₹4 L/yr - ₹11.5 L/yr |
Associate Software Engineer
2k
salaries
| ₹3 L/yr - ₹9.2 L/yr |
Specialist
1.5k
salaries
| ₹10 L/yr - ₹33 L/yr |
Mercedes-Benz Research and Development India
Capgemini
Accenture
Genpact