Filter interviews by
I applied via Company Website and was interviewed in Jun 2022. There was 1 interview round.
Three weaknesses
I tend to overthink and sometimes get stuck in analysis paralysis
I struggle with public speaking and often get nervous in front of large audiences
I can be too detail-oriented and sometimes lose sight of the bigger picture
Top trending discussions
I'm sorry, but I cannot answer that question without more information.
My name is [insert name here]
My name is [insert name here]
I have been called by this name since birth
It is the name given to me by my parents
It is the name I use to introduce myself to others
I prefer not to disclose my age as it is not relevant to my qualifications and experience for this position.
Age should not be a factor in determining one's ability to perform a job
Experience, skills, and qualifications are more important than age
Employers are not allowed to discriminate based on age
I am confident that my qualifications and experience make me a strong candidate for this position
I oversee daily operations, manage staff, and ensure customer satisfaction.
Manage and supervise staff
Ensure customer satisfaction
Create and implement policies and procedures
Monitor inventory and sales
Handle customer complaints and resolve issues
Train new employees
Collaborate with upper management
I applied via Naukri.com and was interviewed in Apr 2024. There were 2 interview rounds.
There are multiple schemes offered by the post office for various services.
There are savings schemes like Public Provident Fund (PPF), Sukanya Samriddhi Yojana, and Senior Citizens Savings Scheme.
There are investment schemes like National Savings Certificate (NSC) and Kisan Vikas Patra.
Post office also offers insurance schemes like Postal Life Insurance (PLI) and Rural Postal Life Insurance (RPLI).
Maths questions slove we r talent
A TTT diagram, or Time-Temperature-Transformation diagram, illustrates phase changes in materials during cooling.
TTT diagrams are crucial in metallurgy for understanding phase transformations.
They show the relationship between temperature and time for a material's phase changes.
Commonly used for steel, indicating when austenite transforms to pearlite or martensite.
The diagram helps in determining optimal cooling rates ...
Steel is an alloy of iron and carbon, with various types tailored for specific applications and properties.
Carbon Steel: Contains carbon as the main alloying element; used in construction and manufacturing. Example: A36 steel.
Alloy Steel: Contains additional elements like chromium, nickel, or molybdenum; enhances strength and toughness. Example: 4140 steel.
Stainless Steel: Contains at least 10.5% chromium; resistant to...
I applied via Referral and was interviewed before Aug 2021. There were 2 interview rounds.
posted on 20 Dec 2023
Java is a high-level programming language known for its platform independence and object-oriented approach.
Java is a general-purpose programming language.
It was developed by Sun Microsystems and released in 1995.
Java programs are compiled into bytecode that can run on any Java Virtual Machine (JVM).
It supports automatic memory management through garbage collection.
Java is widely used for developing web, desktop, and mo...
posted on 1 Jul 2024
Aptitude test has been conducted
I choose your company because of its reputation for innovative projects and collaborative work environment.
Reputation for innovative projects
Collaborative work environment
Opportunities for growth and learning
posted on 29 Jul 2022
I applied via Walk-in and was interviewed before Jul 2021. There was 1 interview round.
I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, and s...
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and ProtonMail.
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use VPNs
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Educatin...
based on 1 interview
Interview experience
Software Developer
4
salaries
| ₹1.1 L/yr - ₹35 L/yr |
Plumbing Supervisor
4
salaries
| ₹15 L/yr - ₹18 L/yr |
Junior Accountant
3
salaries
| ₹2.2 L/yr - ₹2.2 L/yr |
Physician
3
salaries
| ₹9.4 L/yr - ₹12 L/yr |
Montessori Teacher
3
salaries
| ₹1.6 L/yr - ₹2.9 L/yr |
Government of India
Central Reserve Police Force
Ministry of Defence
India Post