i
Filter interviews by
AI raises ethical concerns like bias, privacy, accountability, and job displacement, impacting society and individuals.
Bias in AI algorithms can lead to unfair treatment, e.g., facial recognition systems misidentifying people of color.
Privacy issues arise from data collection, as seen in social media platforms using personal data without consent.
Accountability is unclear when AI systems make decisions, such as in ...
An object is a distinct entity that encapsulates data and behavior in programming, representing real-world or conceptual items.
Objects are instances of classes in object-oriented programming.
They can contain attributes (data) and methods (functions).
Example: A 'Car' object may have attributes like 'color' and 'model', and methods like 'drive()' and 'stop()'.
Objects promote code reusability and modularity.
A class is a blueprint for creating objects in programming, encapsulating data and methods for specific functionalities.
Classes define properties (attributes) and behaviors (methods) of objects.
Example: A 'Car' class may have attributes like 'color' and 'model', and methods like 'drive()' and 'stop()'.
Classes support inheritance, allowing new classes to inherit properties and methods from existing ones.
Example: A ...
JavaServer Pages (JSP) is a technology for developing web pages that include Java code for dynamic content generation.
JSP allows embedding Java code directly into HTML pages using special tags.
It is part of the Java EE (Enterprise Edition) platform, enabling server-side programming.
JSP files are compiled into servlets by the server, which then handle requests.
Example: A JSP page can display user data retrieved fro...
Reynolds stress is the average of the product of the fluctuating velocity components in a fluid flow.
Reynolds stress is a key component in the Reynolds-averaged Navier-Stokes equations used in fluid dynamics.
It represents the transfer of momentum between different parts of a fluid flow.
Reynolds stress is often used in turbulence modeling to predict the behavior of turbulent flows.
An example of Reynolds stress is t...
In cyber security, you learn about network security, encryption, threat detection, incident response, and ethical hacking.
Network security involves protecting networks from unauthorized access or attacks.
Encryption is the process of encoding information to make it secure and unreadable without the proper decryption key.
Threat detection involves identifying and responding to potential security threats or breaches.
I...
A traffic scenario design involves the layout of roads, intersections, signals, and parking areas. Sensors like cameras, loops, and radar are used to manage and clear traffic efficiently.
Traffic scenario design includes road layout, intersections, signals, and parking areas
Sensors such as cameras, loops, and radar are used to monitor traffic flow
Data from sensors is analyzed to optimize traffic signal timings and ...
Garbage collector in Java manages memory by reclaiming unused objects, preventing memory leaks.
Automatically frees up memory by removing objects that are no longer in use
Prevents memory leaks by reclaiming memory from objects that are no longer referenced
Utilized in Java programming to improve memory management and prevent out-of-memory errors
The structure of a Java program includes classes, methods, variables, and packages.
Java program starts with a class definition, which includes methods and variables.
Methods contain the code that defines the behavior of the program.
Variables are used to store data within the program.
Packages are used to organize classes and provide a namespace for the program.
Example: public class HelloWorld { public static void ma...
A common model used in natural language processing is the Bag of Words model.
Bag of Words model represents text as a collection of words, ignoring grammar and word order.
It creates a vocabulary of unique words in the text and counts the frequency of each word.
This model is often used for tasks like sentiment analysis, document classification, and topic modeling.
I applied via AICTE and was interviewed in Sep 2024. There was 1 interview round.
DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.
DDOS stands for Distributed Denial of Service attack.
Attackers use multiple compromised systems to flood the target with traffic.
Common types include UDP flood, SYN flood, and HTTP flood.
DDOS attacks can lead to service disruption, financial losses, and reputational damage.
Mit...
Google search works by crawling and indexing web pages, and then ranking them based on relevance and quality.
Google uses web crawlers to discover and index web pages.
The search algorithm ranks pages based on relevance to the search query.
Factors like keywords, backlinks, and user experience influence rankings.
Google constantly updates its algorithm to improve search results.
Google also considers user location and searc...
I appeared for an interview in May 2025, where I was asked the following questions.
AI is transforming jobs and society, enhancing productivity while raising concerns about job displacement and ethical implications.
Job Displacement: Automation may replace routine jobs, e.g., manufacturing roles being taken over by robots.
Job Creation: New roles emerge in AI development, data analysis, and maintenance, e.g., AI ethics consultants.
Skill Shift: Workers need to adapt to new technologies, requiring upskill...
AI raises ethical concerns like bias, privacy, accountability, and job displacement, impacting society and individuals.
Bias in AI algorithms can lead to unfair treatment, e.g., facial recognition systems misidentifying people of color.
Privacy issues arise from data collection, as seen in social media platforms using personal data without consent.
Accountability is unclear when AI systems make decisions, such as in auton...
I applied via Company Website and was interviewed in Aug 2024. There was 1 interview round.
I applied via Referral and was interviewed in Oct 2024. There were 2 interview rounds.
Computer Networks, DBMS, OOPS, etc
I applied via Campus Placement and was interviewed in Jul 2024. There was 1 interview round.
The structure of a Java program includes classes, methods, variables, and packages.
Java program starts with a class definition, which includes methods and variables.
Methods contain the code that defines the behavior of the program.
Variables are used to store data within the program.
Packages are used to organize classes and provide a namespace for the program.
Example: public class HelloWorld { public static void main(St...
Garbage collector in Java manages memory by reclaiming unused objects, preventing memory leaks.
Automatically frees up memory by removing objects that are no longer in use
Prevents memory leaks by reclaiming memory from objects that are no longer referenced
Utilized in Java programming to improve memory management and prevent out-of-memory errors
I rate my proficiency in Java programming as advanced.
Advanced knowledge of object-oriented programming principles
Experience with Java frameworks like Spring and Hibernate
Ability to write efficient and scalable code
Familiarity with design patterns and best practices
Completed multiple Java projects successfully
A common model used in natural language processing is the Bag of Words model.
Bag of Words model represents text as a collection of words, ignoring grammar and word order.
It creates a vocabulary of unique words in the text and counts the frequency of each word.
This model is often used for tasks like sentiment analysis, document classification, and topic modeling.
Activation functions introduce non-linearity to neural networks, enabling them to learn complex patterns and relationships.
Activation functions help neural networks to learn complex patterns and relationships by introducing non-linearity.
They ensure that the output of each neuron is mapped to a specific range, allowing for better learning and generalization.
Common activation functions include ReLU, Sigmoid, Tanh, and S...
I applied via LinkedIn and was interviewed in Jul 2024. There were 2 interview rounds.
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is typically used for protecting critical sections of code.
Semaphore is of...
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
The const keyword indicates that the variable's value cannot be changed by the program.
The volatile keyword tells the compiler that the variable's value may change at any time, even if it doesn't appear to be modified by the program.
When used together, the variable is treated as read-only by the program...
Brute force can be both good and bad depending on the context and application.
Brute force can be effective for small scale problems or when time is limited.
However, it is inefficient and impractical for large scale problems.
Brute force may also be necessary in certain scenarios where no other efficient solution exists.
For example, brute force can be used in password cracking when other methods fail.
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is used for protecting critical sections of code, while semaphore is used ...
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
Using volatile and const together is rare but can be useful for memory-mapped hardware registers.
The volatile keyword tells the compiler that the variable can be changed unexpectedly, while const ensures the variable is read-only.
Example: const volatile int * const ptr = (int *)0x1234; // pointer to a r...
DBMS queries are essential for managing and manipulating databases effectively.
SELECT statement: Used to retrieve data from a database. Example: SELECT * FROM Employees;
INSERT statement: Used to add new records. Example: INSERT INTO Employees (Name, Age) VALUES ('John Doe', 30);
UPDATE statement: Used to modify existing records. Example: UPDATE Employees SET Age = 31 WHERE Name = 'John Doe';
DELETE statement: Used to rem...
I appeared for an interview in Apr 2025, where I was asked the following questions.
I prioritize tasks, set boundaries, delegate when necessary, and make time for self-care.
Prioritize tasks based on deadlines and importance
Set boundaries by establishing work hours and sticking to them
Delegate tasks to team members when feeling overwhelmed
Make time for self-care activities such as exercise, hobbies, and relaxation
Avoid multitasking and focus on one task at a time
Yes, ISO 9000 is a set of international standards for quality management and quality assurance.
ISO 9000 is a series of standards developed by the International Organization for Standardization (ISO) that focus on quality management systems.
These standards provide guidance and tools for companies to ensure their products and services consistently meet customer requirements and regulatory standards.
ISO 9000 certification...
I appeared for an interview in Jan 2025.
Top trending discussions
The duration of Centre for Development of Advanced Computing interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 105 interview experiences
Difficulty level
Duration
based on 1k reviews
Rating in categories
Project Engineer
3.1k
salaries
| ₹5 L/yr - ₹11 L/yr |
Project Associate
474
salaries
| ₹2.7 L/yr - ₹6.1 L/yr |
Software Developer
194
salaries
| ₹2 L/yr - ₹9.1 L/yr |
Senior Project Engineer
157
salaries
| ₹8.4 L/yr - ₹14.7 L/yr |
Knowledge Associate
80
salaries
| ₹7.8 L/yr - ₹11 L/yr |
ITC Infotech
CMS IT Services
KocharTech
3i Infotech