Filter interviews by
I am passionate about environmental conservation and sustainable development.
I have a strong interest in using GIS technology to analyze and visualize data related to land use, natural resource management, and climate change.
I believe that GIS can play a crucial role in helping organizations make informed decisions to protect the environment and promote sustainable practices.
For example, I have worked on projects mappi...
Keep focus on your communication skills
GIS stands for Geographic Information System, a tool that helps us visualize, analyze, and interpret data related to locations on Earth.
GIS is like a digital map that shows us information about different places on Earth.
It helps us understand where things are located and how they are connected to each other.
For example, GIS can show us where all the schools are in a city, or where all the rivers are in a country.
It is ...
GIS impacts everyday life by providing location-based information for decision-making and planning.
Helps in emergency response and disaster management by mapping affected areas and resources
Assists in urban planning by analyzing population distribution and infrastructure needs
Facilitates navigation and location-based services on mobile devices
Supports businesses in market analysis and site selection based on demographi...
I applied via Campus Placement and was interviewed in Dec 2023. There were 3 interview rounds.
Our topic was about positive and negative views of politics
The 5 components of ArcGIS are ArcMap, ArcCatalog, ArcToolbox, ArcGlobe, and ArcScene.
ArcMap is the main mapping application for creating and analyzing geographic data
ArcCatalog is used for organizing and managing GIS data
ArcToolbox contains tools for geoprocessing tasks
ArcGlobe is a 3D globe application for visualizing spatial data
ArcScene is a 3D visualization application for creating realistic scenes
Recoding is the process of changing the values of a variable in a dataset to new values based on certain criteria.
Recoding is commonly used in data analysis to simplify or reclassify data for easier interpretation.
It involves creating new categories or grouping existing categories together.
For example, recoding age into age groups (e.g. 0-18, 19-30, 31-50) for analysis purposes.
posted on 26 Jul 2024
I am a dedicated and experienced training professional with a passion for developing others.
Over 5 years of experience in training and development roles
Strong background in designing and delivering effective training programs
Skilled in assessing training needs and implementing solutions
Excellent communication and interpersonal skills
Proven track record of improving employee performance and engagement
I have conducted various training sessions for new hires and existing employees.
Developed training materials and modules for onboarding new employees
Facilitated workshops on communication skills and conflict resolution
Implemented a mentorship program to support employee development
Evaluated training effectiveness through surveys and feedback
Collaborated with department heads to identify training needs and goals
Cybertech Systems & Software interview questions for popular designations
I applied via Newspaper Ad and was interviewed in Oct 2022. There were 3 interview rounds.
My name is padma and recently I have done my graduation and I have a good knowledge in cybersecurity,ethical hacking, SoC analyst.
Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity aims to ensure the confidentiality, integrity, and availability of data and systems.
It includes various techniques such as encryption, firewalls, antivirus software, intrusio...
Pass the hash attack is a technique used by hackers to gain unauthorized access to a computer system by using hashed passwords.
In a pass the hash attack, the attacker captures the hashed password of a user and uses it to authenticate themselves without knowing the actual password.
This attack is possible because the Windows operating system stores hashed passwords in memory, allowing an attacker to extract and reuse the...
A dictionary attack is a method used to gain unauthorized access to a system by systematically trying all possible words or combinations from a pre-existing list.
Dictionary attack is a type of brute force attack.
It involves using a list of commonly used passwords or words from a dictionary to guess the password of a user or system.
The attacker tries each word in the list until a match is found or all possibilities are ...
A rainbow attack is a type of brute force attack that involves precomputing and storing the hash values of all possible passwords.
Rainbow attacks are used to crack password hashes by comparing them to precomputed hash values.
They are based on the idea of reducing the time and computational resources required for brute force attacks.
Rainbow tables are used to store precomputed hash values and their corresponding passwor...
Scanning is the process of systematically examining a network or system for vulnerabilities or potential security threats.
Scanning involves sending network requests to identify open ports, services, and potential vulnerabilities.
It helps in identifying weaknesses in the network or system that can be exploited by attackers.
Scanning can be performed using various tools like Nmap, Nessus, or OpenVAS.
Different types of sca...
I applied via campus placement at Pune University and was interviewed in Jun 2022. There were 3 interview rounds.
Focus on communicate skills.
Was asked to speak on a current affairs topic.
Components of GIS include hardware, software, data, people, and methods.
Hardware: computers, GPS devices, scanners, printers, etc.
Software: GIS software, database management systems, image processing software, etc.
Data: spatial data, attribute data, metadata, etc.
People: GIS professionals, data collectors, analysts, etc.
Methods: data collection, analysis, visualization, etc.
Examples: ArcGIS, QGIS, Google Earth, OpenStr
Firewall is a security system that monitors and controls incoming and outgoing network traffic.
Firewalls can be hardware or software-based
Types of firewalls include packet-filtering, stateful inspection, and application-level
Packet-filtering firewalls examine packets and filter them based on pre-defined rules
Stateful inspection firewalls keep track of the state of network connections and filter traffic based on that in...
I applied via Naukri.com and was interviewed before Sep 2021. There was 1 interview round.
Top trending discussions
I applied via campus placement at Arya Institute of Engineering & Technology, Jaipur and was interviewed in Oct 2020. There were 5 interview rounds.
Interview experience
based on 99 reviews
Rating in categories
GIS Analyst
85
salaries
| ₹2.5 L/yr - ₹9.1 L/yr |
Senior GIS Analyst
39
salaries
| ₹3.8 L/yr - ₹10.1 L/yr |
Software Engineer
32
salaries
| ₹4.4 L/yr - ₹15.4 L/yr |
Senior Software Engineer
23
salaries
| ₹10 L/yr - ₹23.5 L/yr |
System Administrator
13
salaries
| ₹7.5 L/yr - ₹13 L/yr |
Infosys
TCS
Wipro
HCLTech