i
FIS
Filter interviews by
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
Top trending discussions
Linux,os,networks,sql,dbms
Factorial of a number is the product of all positive integers less than or equal to that number.
Factorial of 5 is 5! = 5 x 4 x 3 x 2 x 1 = 120
Factorial of 0 is defined as 1, 0! = 1
Factorial of negative numbers is not defined
Finding a subsequence of strings in an array
Iterate through the array and check if each string is part of the subsequence
Maintain a pointer for the subsequence and array to compare elements
Return true if all strings in the subsequence are found in the array
I applied via Campus Placement and was interviewed in Dec 2024. There were 2 interview rounds.
Technology is changing the way we interact and communicate, but it doesn't necessarily make us less human.
Technology enhances our abilities and connections with others.
It can improve efficiency and productivity in various aspects of life.
However, over-reliance on technology may lead to decreased face-to-face interactions and empathy.
Balancing technology use with real-life experiences is key to maintaining our humanity.
Based to compensation of employee.
Emerson offers a dynamic work environment, opportunities for growth, and a commitment to innovation.
Emerson provides a collaborative work culture that encourages creativity and problem-solving.
The company offers various training and development programs to help interns enhance their skills.
Emerson is known for its cutting-edge technology and commitment to sustainability.
Interns at Emerson have the opportunity to work o...
I applied via campus placement at Graphic Era University, Dehradun and was interviewed in Jan 2024. There were 4 interview rounds.
2 Questions of Medium leetcode difficulty.
The topic was given to 8-10 people and starting from a random person the GD starts.
Use SQL query with ORDER BY and LIMIT to get 3rd largest element.
Use ORDER BY clause to sort the elements in descending order.
Use LIMIT 2,1 to skip the first two largest elements and get the 3rd largest element.
Program to swap two objects (deep copy)
Create a temporary object to store one of the objects
Copy the values of the second object into the first object
Copy the values from the temporary object into the second object
Two questions and aptitude questions
Two data structures and algorithms questions
I applied via Job Portal
LR, DI, Analytics, Puzzles, Graph Problems
Trees, Linked List, Array
I applied via Company Website and was interviewed in Feb 2024. There was 1 interview round.
Revenue recognition is the process of recording revenue in a company's financial statements when it is earned.
Revenue recognition is important for accurately reflecting a company's financial performance.
It involves determining when revenue is earned and when it can be recognized on the income statement.
Revenue is typically recognized when goods are delivered or services are performed, regardless of when payment is rece...
I was interviewed before Aug 2022.
General - basic questions
Focused on communication skills
I applied via Walk-in and was interviewed before Aug 2022. There were 3 interview rounds.
Maths and English aptitude
based on 7 reviews
Rating in categories
Senior Software Engineer
2.7k
salaries
| ₹8 L/yr - ₹30 L/yr |
Software Engineer
1.7k
salaries
| ₹4.1 L/yr - ₹16 L/yr |
Lead Engineer
686
salaries
| ₹7.3 L/yr - ₹27.5 L/yr |
Team Member
664
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Senior Leader Engineer
642
salaries
| ₹9.9 L/yr - ₹32.1 L/yr |
TCS
Infosys
Wipro
HCLTech