i
FIS
Filter interviews by
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
Top trending discussions
I applied via campus placement at Vellore Institute of Technology (VIT) and was interviewed in Oct 2024. There were 4 interview rounds.
Total of 90 mins aptitude and computer networks and excel
45 mins it will be easy
The project involved developing a mobile application for tracking daily fitness activities.
Researched user needs and preferences for fitness tracking apps
Designed user interface for easy navigation and data input
Implemented features such as step tracking, calorie counting, and workout logging
Tested the application for bugs and usability issues
Collaborated with developers and designers to ensure project success
I am currently pursuing a Bachelor's degree in Computer Science with a focus on software development.
Studying various programming languages such as Java, C++, and Python
Learning about data structures and algorithms
Taking courses in web development and database management
Participating in coding competitions and hackathons
Linux,os,networks,sql,dbms
Factorial of a number is the product of all positive integers less than or equal to that number.
Factorial of 5 is 5! = 5 x 4 x 3 x 2 x 1 = 120
Factorial of 0 is defined as 1, 0! = 1
Factorial of negative numbers is not defined
Finding a subsequence of strings in an array
Iterate through the array and check if each string is part of the subsequence
Maintain a pointer for the subsequence and array to compare elements
Return true if all strings in the subsequence are found in the array
I applied via Campus Placement and was interviewed in Jun 2024. There were 2 interview rounds.
120 min,Maths, Reasoning,Verbal Ability Basic Questions
Implementing proper security measures like encryption, access control, and regular backups can help prevent database manipulation.
Use encryption to protect sensitive data from unauthorized access.
Implement access control to restrict who can make changes to the database.
Regularly backup the database to ensure data can be restored in case of manipulation.
Use parameterized queries to prevent SQL injection attacks.
Monitor
I applied via Campus Placement and was interviewed in Dec 2024. There were 2 interview rounds.
Technology is changing the way we interact and communicate, but it doesn't necessarily make us less human.
Technology enhances our abilities and connections with others.
It can improve efficiency and productivity in various aspects of life.
However, over-reliance on technology may lead to decreased face-to-face interactions and empathy.
Balancing technology use with real-life experiences is key to maintaining our humanity.
Based to compensation of employee.
Emerson offers a dynamic work environment, opportunities for growth, and a commitment to innovation.
Emerson provides a collaborative work culture that encourages creativity and problem-solving.
The company offers various training and development programs to help interns enhance their skills.
Emerson is known for its cutting-edge technology and commitment to sustainability.
Interns at Emerson have the opportunity to work o...
I applied via campus placement at Graphic Era University, Dehradun and was interviewed in Jan 2024. There were 4 interview rounds.
2 Questions of Medium leetcode difficulty.
The topic was given to 8-10 people and starting from a random person the GD starts.
Use SQL query with ORDER BY and LIMIT to get 3rd largest element.
Use ORDER BY clause to sort the elements in descending order.
Use LIMIT 2,1 to skip the first two largest elements and get the 3rd largest element.
Program to swap two objects (deep copy)
Create a temporary object to store one of the objects
Copy the values of the second object into the first object
Copy the values from the temporary object into the second object
Two questions and aptitude questions
Two data structures and algorithms questions
I applied via Company Website and was interviewed in Feb 2024. There was 1 interview round.
Revenue recognition is the process of recording revenue in a company's financial statements when it is earned.
Revenue recognition is important for accurately reflecting a company's financial performance.
It involves determining when revenue is earned and when it can be recognized on the income statement.
Revenue is typically recognized when goods are delivered or services are performed, regardless of when payment is rece...
based on 7 reviews
Rating in categories
Senior Software Engineer
2.7k
salaries
| ₹8 L/yr - ₹30 L/yr |
Software Engineer
1.7k
salaries
| ₹4.1 L/yr - ₹16 L/yr |
Lead Engineer
686
salaries
| ₹7.3 L/yr - ₹27.5 L/yr |
Team Member
664
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Senior Leader Engineer
642
salaries
| ₹9.9 L/yr - ₹32.1 L/yr |
TCS
Infosys
Wipro
HCLTech