i
Cyber Infrastructure
Filter interviews by
I applied via Campus Placement
Normal apti reasoning test checking normal intelligence with some basic technical questions.
Topic was physical cash V/s Digital cash.
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Oop concept, Multithread, String
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Passionate Jr. Designer with a background in UX/UI design and a strong eye for detail.
Graduated with a degree in Graphic Design
Proficient in Adobe Creative Suite
Experience with wireframing and prototyping tools like Sketch and InVision
Strong understanding of user-centered design principles
Worked on projects involving mobile app design and website development
I am familiar with tools such as Adobe XD, Sketch, Figma, InVision, and Zeplin.
Adobe XD
Sketch
Figma
InVision
Zeplin
UI is the user interface, focusing on the look and feel of a product, while UX is the user experience, focusing on the overall experience of the user interacting with the product.
UI is the visual aspect of a product, including colors, typography, and layout.
UX is the overall experience of a user interacting with a product, including ease of use, efficiency, and satisfaction.
UI design focuses on creating visually appeal...
My last project was designing a mobile app for a fitness tracking platform.
Researched user needs and preferences for fitness tracking apps
Created wireframes and prototypes for user testing
Designed a clean and intuitive user interface with a focus on usability
Collaborated with developers to ensure smooth implementation of design elements
The most critical part of the project was ensuring seamless user experience through intuitive navigation and clear visual hierarchy.
Creating user personas to understand target audience needs
Conducting usability testing to identify pain points and areas for improvement
Iterating on design based on feedback received from stakeholders
Implementing responsive design principles for optimal user experience across devices
Both UI and UX have their own challenges, but I find UX more challenging due to the need for in-depth research and understanding of user behavior.
Understanding user needs and behavior
Creating user personas and user flows
Conducting usability testing and gathering feedback
Revamp the UI of a given website using Figma/XD
Analyze the current website's UI to identify areas for improvement
Create wireframes and mockups of the new UI design in Figma/XD
Focus on improving user experience and usability
Use consistent design elements and color schemes
Seek feedback from stakeholders for iterative improvements
Cyber Infrastructure interview questions for popular designations
I applied via Campus Placement and was interviewed in Dec 2023. There was 1 interview round.
A class is a blueprint for creating objects, while an object is an instance of a class. Private, protected, public, and default are access modifiers in object-oriented programming.
A class is a template or blueprint that defines the properties and behaviors of objects.
An object is an instance of a class, created using the class blueprint.
Private access modifier restricts access to class members within the same class.
Pro...
An object is a self-contained entity that consists of both data and behavior.
Objects are instances of classes in object-oriented programming.
They encapsulate data and provide methods to manipulate that data.
Objects can interact with each other through method calls and message passing.
Examples of objects include a car, a person, or a bank account.
Public is a keyword in programming languages that denotes the accessibility of a class, method, or variable.
Public is one of the access modifiers in object-oriented programming.
It allows the class, method, or variable to be accessed from any other class or package.
Public members are part of the public API of a software component.
Example: public class MyClass { ... }
Example: public void myMethod() { ... }
Example: public
In programming, private is an access modifier that restricts the visibility of a class member to within its own class.
Private is used to encapsulate data and prevent direct access from outside the class.
Private members can only be accessed through public methods or properties.
Private variables are often used to store internal state or implementation details.
Private methods are used for internal logic and are not meant
protected is an access modifier in object-oriented programming that restricts access to members within the same package or subclasses.
protected is one of the four access modifiers in Java, along with public, private, and default.
Members declared as protected can be accessed within the same package or by subclasses.
Protected members are not accessible outside the package unless accessed through inheritance.
Example: prot...
Pattern, star , hollow pattern
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
I applied via Company Website and was interviewed before Jan 2024. There were 3 interview rounds.
Good questions and dsa arrays and string questions
OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs focuses on creating reusable code through classes and objects
Encapsulation: bundling data and methods that operate on the data within a single unit
Inheritance: allows a class to inherit properties and behavior from another class
Polymorphism: ability for objects to be treated as instances of...
Session in PHP is a way to store information (variables) to be used across multiple pages during a user's visit to a website.
Sessions are used to store user-specific information, such as username, shopping cart items, etc.
Sessions are started with session_start() function and can be accessed using the $_SESSION superglobal array.
Sessions are stored on the server and identified by a unique session ID, which is usually s
I applied via Approached by Company and was interviewed in Nov 2023. There was 1 interview round.
Top trending discussions
Interview experience
based on 247 reviews
Rating in categories
Software Developer
242
salaries
| ₹2.5 L/yr - ₹9.5 L/yr |
Junior Software Developer
108
salaries
| ₹2 L/yr - ₹5.6 L/yr |
Junior Developer
56
salaries
| ₹2 L/yr - ₹5.4 L/yr |
Senior Software Developer
52
salaries
| ₹4.7 L/yr - ₹11.5 L/yr |
Team Lead
29
salaries
| ₹8 L/yr - ₹16 L/yr |
TCS
Infosys
Wipro
HCLTech