i
CitiusTech
Filter interviews by
Clear (1)
I applied via Naukri.com and was interviewed in Jul 2024. There were 3 interview rounds.
Binary tree implementation involves nodes with at most two children, left and right.
Nodes have a parent-child relationship
Traversal methods include in-order, pre-order, and post-order
Balanced vs unbalanced trees affect performance
I applied via Approached by Company and was interviewed in May 2022. There were 3 interview rounds.
The video call interview consists of problem-solving, a few live coding tests, and technical interview questions.
I applied via Referral and was interviewed before Sep 2022. There were 2 interview rounds.
Non-functional testing focuses on the performance, usability, reliability, and other aspects of a system beyond its basic functionality.
Non-functional testing evaluates the system's performance under load, its security, scalability, and other aspects.
Examples include stress testing, load testing, security testing, usability testing, and compatibility testing.
Non-functional testing helps ensure that the system meets the...
Sanity, smoke, retesting, and regression are types of testing performed during software development.
Sanity testing: Quick test to check if the software is stable enough for further testing.
Smoke testing: Initial testing to ensure the basic functionalities of the software are working.
Retesting: Testing done to verify that a specific bug or issue has been fixed.
Regression testing: Testing done to ensure that new code cha...
Different SDLC models include Waterfall, Agile, Scrum, and DevOps. The best model depends on the project requirements. STLC is Software Testing Life Cycle.
Waterfall model follows a linear sequential flow, while Agile focuses on iterative development.
Scrum is a subset of Agile that uses fixed-length iterations called sprints.
DevOps combines development and operations to improve collaboration and productivity.
The best SD...
I applied via Naukri.com and was interviewed before May 2021. There were 4 interview rounds.
Interviewer asked to write few logics and algorithms for problem statements
CitiusTech interview questions for designations
I applied via Naukri.com and was interviewed in Sep 2020. There was 1 interview round.
Truncate removes all data from a table while delete removes specific rows. Agile is a project management methodology.
Truncate is faster than delete as it doesn't log individual row deletions
Truncate resets the identity of the table while delete doesn't
Agile emphasizes on iterative development, continuous feedback, and collaboration
Agile frameworks include Scrum, Kanban, and Extreme Programming
Top trending discussions
I was interviewed before Apr 2020.
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2020. There was 1 interview round.
I applied via Approached by Company and was interviewed in Dec 2018. There were 3 interview rounds.
SOX Compliance is a set of regulations that public companies must follow to ensure accurate financial reporting.
SOX stands for Sarbanes-Oxley Act
It was enacted in 2002 after accounting scandals at Enron and WorldCom
It requires companies to establish and maintain internal controls over financial reporting
It also mandates regular audits and certifications of financial statements
Non-compliance can result in fines, legal a
PCI DSS stands for Payment Card Industry Data Security Standard.
It is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
It was created by major credit card companies such as Visa, Mastercard, American Express, Discover, and JCB International.
It includes requirements for network security, data protection, access...
ISO 27K is a set of standards for information security management systems.
ISO 27K provides guidelines for managing and protecting sensitive information.
It includes controls for risk management, access control, and incident management.
ISO 27K certification is often required for companies handling sensitive data.
Examples of ISO 27K standards include ISO 27001 and ISO 27002.
Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.
Identify potential threats and vulnerabilities
Evaluate the impact of each threat or vulnerability
Determine the likelihood of each threat or vulnerability occurring
Prioritize risks based on their impact and likelihood
Develop a plan to mitigate or manage each risk
based on 2 interviews
1 Interview rounds
based on 36 reviews
Rating in categories
Senior Software Engineer
2.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
1.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead 1
374
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead 2
295
salaries
| ₹0 L/yr - ₹0 L/yr |
Accenture
Capgemini
TCS
Wipro