i
Filter interviews by
I applied via Company Website and was interviewed in Aug 2024. There was 1 interview round.
I applied via Referral and was interviewed in Oct 2024. There were 2 interview rounds.
Computer Networks, DBMS, OOPS, etc
I applied via LinkedIn and was interviewed in Jul 2024. There were 2 interview rounds.
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is typically used for protecting critical sections of code.
Semaphore is of...
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
The const keyword indicates that the variable's value cannot be changed by the program.
The volatile keyword tells the compiler that the variable's value may change at any time, even if it doesn't appear to be modified by the program.
When used together, the variable is treated as read-only by the program...
Brute force can be both good and bad depending on the context and application.
Brute force can be effective for small scale problems or when time is limited.
However, it is inefficient and impractical for large scale problems.
Brute force may also be necessary in certain scenarios where no other efficient solution exists.
For example, brute force can be used in password cracking when other methods fail.
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is used for protecting critical sections of code, while semaphore is used ...
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
Using volatile and const together is rare but can be useful for memory-mapped hardware registers.
The volatile keyword tells the compiler that the variable can be changed unexpectedly, while const ensures the variable is read-only.
Example: const volatile int * const ptr = (int *)0x1234; // pointer to a r...
Centre for Development of Advanced Computing interview questions for popular designations
I applied via AICTE and was interviewed in Sep 2024. There was 1 interview round.
DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.
DDOS stands for Distributed Denial of Service attack.
Attackers use multiple compromised systems to flood the target with traffic.
Common types include UDP flood, SYN flood, and HTTP flood.
DDOS attacks can lead to service disruption, financial losses, and reputational damage.
Mit...
Google search works by crawling and indexing web pages, and then ranking them based on relevance and quality.
Google uses web crawlers to discover and index web pages.
The search algorithm ranks pages based on relevance to the search query.
Factors like keywords, backlinks, and user experience influence rankings.
Google constantly updates its algorithm to improve search results.
Google also considers user location and searc
Get interview-ready with Top Centre for Development of Advanced Computing Interview Questions
I prioritize tasks, set boundaries, delegate when necessary, and make time for self-care.
Prioritize tasks based on deadlines and importance
Set boundaries by establishing work hours and sticking to them
Delegate tasks to team members when feeling overwhelmed
Make time for self-care activities such as exercise, hobbies, and relaxation
Avoid multitasking and focus on one task at a time
Yes, ISO 9000 is a set of international standards for quality management and quality assurance.
ISO 9000 is a series of standards developed by the International Organization for Standardization (ISO) that focus on quality management systems.
These standards provide guidance and tools for companies to ensure their products and services consistently meet customer requirements and regulatory standards.
ISO 9000 certification...
Securing a database involves implementing access controls, encryption, regular backups, and monitoring for suspicious activity.
Implement strong access controls to restrict unauthorized access to the database
Use encryption to protect sensitive data both at rest and in transit
Regularly backup the database to prevent data loss in case of a security breach
Monitor the database for any suspicious activity or unauthorized acc...
Spring Security is a powerful and customizable authentication and access control framework for Java applications.
Provides comprehensive security services for Java EE-based enterprise software applications
Supports authentication, authorization, and protection against common security vulnerabilities
Integrates with Spring Framework for seamless configuration and usage
Allows for custom security configurations and extension...
OOPS stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPS focuses on creating objects that contain both data and methods to manipulate that data.
It involves concepts like encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation refers to bundling data and methods that operate on the data into a single unit.
Inheritance allows a class to inherit properti...
I am a software developer with 5 years of experience in Java, Python, and SQL.
5 years of experience in Java, Python, and SQL
Strong problem-solving skills
Experience working in Agile development environment
Familiar with version control systems like Git
Passionate about learning new technologies
I switched from Non-IT to IT because of my passion for technology and desire to work in a dynamic and innovative industry.
Passion for technology and interest in learning new skills
Opportunity for growth and advancement in IT industry
Desire to work in a dynamic and innovative field
Transferable skills from non-IT background (e.g. problem-solving, analytical skills)
Top trending discussions
The duration of Centre for Development of Advanced Computing interview process can vary, but typically it takes about less than 2 weeks to complete.
Interview experience
based on 819 reviews
Rating in categories
Project Engineer
2.7k
salaries
| ₹3.7 L/yr - ₹12.6 L/yr |
Project Associate
435
salaries
| ₹2.6 L/yr - ₹6 L/yr |
Software Developer
179
salaries
| ₹2 L/yr - ₹11 L/yr |
Senior Project Engineer
123
salaries
| ₹6 L/yr - ₹15.5 L/yr |
Knowledge Associate
75
salaries
| ₹8.5 L/yr - ₹11 L/yr |
National Informatics Centre
TCS
Wipro
Infosys