Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2024. There were 2 interview rounds.
Basic types of CCTV include analog, IP, and wireless cameras.
Analog CCTV cameras use a wired connection to transmit video footage.
IP CCTV cameras connect to a network and can be accessed remotely.
Wireless CCTV cameras transmit video footage wirelessly.
Examples: Analog - Swann Security Camera, IP - Nest Cam, Wireless - Arlo Pro
The protocol commonly used in CCTV is IP (Internet Protocol).
IP (Internet Protocol) is the most commonly used protocol in CCTV systems.
It allows for the transmission of video and audio data over a network.
Other protocols like TCP/IP and UDP/IP may also be used in CCTV systems.
IP cameras are connected to a network and can be accessed remotely for monitoring.
Some CCTV systems may also use proprietary protocols for commun
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
I have strong working capability and effective situation handling strategies.
I am highly organized and able to prioritize tasks effectively.
I have excellent communication skills to work with team members and stakeholders.
I am adaptable and can quickly adjust to changing situations.
I am proactive in identifying potential issues and finding solutions before they escalate.
I have experience in project management software l...
Top trending discussions
posted on 21 Dec 2024
posted on 11 Nov 2024
During wainad flood rescue operation I have searched and recovered 01 casuality after 08 hrs hard work and in jhansi flood saved 03 personal who were trapped inside temple.
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There were 2 interview rounds.
ETL stands for Extract, Transform, Load. It is a process used to extract data from various sources, transform it into a consistent format, and load it into a target database or data warehouse.
Extract: Involves extracting data from different sources such as databases, files, APIs, etc.
Transform: Data is cleaned, validated, and transformed into a consistent format suitable for analysis.
Load: The transformed data is loade...
The correct structure of a DBMS diagram includes entities, attributes, relationships, and keys.
Entities represent the main objects in the database (e.g. Customer, Product).
Attributes are characteristics of entities (e.g. CustomerID, ProductName).
Relationships show how entities are related to each other (e.g. one-to-many, many-to-many).
Keys uniquely identify each record in a table (e.g. Primary Key, Foreign Key).
ChatGpt will replace the employment
posted on 29 Oct 2024
I applied via Company Website and was interviewed in Sep 2024. There were 3 interview rounds.
I have 11 years of security experience and a strong understanding of security protocols and procedures.
I have worked as a security guard for 5 years, ensuring the safety and security of various premises.
I am well-versed in security protocols and
procedures, including access control, surveillance, and emergency response. During my time as a security guard, I have successfully handled various security incidents, such as trespassing, theft, and disturbances.
I have received training in first aid and CPR, enabling me to provide immediate assistance in case of medical emergencies.
I am skilled in using security equipment and technology, such as CCTV cameras, alarm systems, and metal detectors.
The roles of a security guard include protecting people and property, monitoring surveillance equipment, enforcing laws and regulations, and responding to emergencies.
Protecting people and property from theft, vandalism, and other illegal activities
Monitoring surveillance equipment to detect suspicious behavior or activities
Enforcing laws and regulations on the premises
Responding to emergencies such as fires, medical incidents, or security breaches
Communication skills, Computer knowledge, common sense, and how to handle emergency situation
I had a very positive experience and was able to learn many things outside the conventional approaches. Overall, the quality was good.
I generate leads through a combination of digital marketing strategies, networking events, and referrals.
Utilize social media platforms to create targeted ads and engage with potential leads
Attend industry conferences and trade shows to network and generate leads
Ask satisfied customers for referrals to expand the lead pool
Heat detectors are devices that sense abnormally high temperatures and are typically used in areas where smoke detectors may not be suitable.
Types of heat detectors include fixed temperature detectors, rate-of-rise detectors, and combination detectors.
Fixed temperature detectors activate when a specific temperature is reached.
Rate-of-rise detectors activate when the temperature increases rapidly.
Combination detectors c...
NWC, NWF, and NWD are different file formats used in BIM modeling.
NWC (Navisworks Cache) is a lightweight file format used for sharing models with stakeholders who do not have access to the original software.
NWF (Navisworks File) is a project file format that references multiple NWD files and allows for collaboration and coordination.
NWD (Navisworks Document) is a published file format that contains all the data and ge
based on 21 reviews
Rating in categories
Software Developer
28
salaries
| ₹2.1 L/yr - ₹4.5 L/yr |
Business Development Executive
12
salaries
| ₹2.2 L/yr - ₹4.8 L/yr |
Software Tester
11
salaries
| ₹2.6 L/yr - ₹4.2 L/yr |
UI/UX Designer
6
salaries
| ₹2.6 L/yr - ₹3 L/yr |
Java Developer
6
salaries
| ₹1 L/yr - ₹3.2 L/yr |
Zicom Electronic Security Systems
Godrej Security Solutions
Bosch Security Systems
CP Plus