Filter interviews by
Poodle attack is a security vulnerability that exploits SSL 3.0 protocol to steal sensitive information.
Poodle attack stands for 'Padding Oracle On Downgraded Legacy Encryption'.
It is a type of man-in-the-middle attack that targets the SSL 3.0 protocol.
The attacker can decrypt secure HTTPS connections and steal sensitive information like login credentials or cookies.
To prevent poodle attacks, it is recommended to disab...
I applied via Naukri.com and was interviewed before Mar 2022. There were 2 interview rounds.
Template is a pre-designed format used for creating new documents while clone is an exact copy of an existing document.
Template is a starting point for creating new documents while clone is an exact copy of an existing document.
Templates are used to maintain consistency in design and formatting while clones are used to replicate an existing document.
Templates can be modified to suit specific needs while clones cannot b...
What people are saying about HCL Group
I applied via Naukri.com and was interviewed in Apr 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Oct 2020. There were 4 interview rounds.
I applied via Recruitment Consultant and was interviewed in Mar 2021. There was 1 interview round.
I applied via Recruitment Consultant
I applied via Campus Placement and was interviewed in Oct 2020. There were 4 interview rounds.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Start from the first element and compare it with the next element
If the next element is smaller, swap them
Repeat this process for all elements in the array
Continue this process until no more swaps are needed
A program to print all prime numbers
Take input from user for range of numbers
Loop through the range and check if each number is prime
Print the prime numbers
Hashmap is a data structure that stores key-value pairs and allows constant time access to values based on their keys.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when multiple keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Examples of hashmap implementations include Java's HashMap class and Python's dict type.
Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.
Inheritance allows code reuse and promotes code organization.
The existing class is called the parent or superclass, and the new class is called the child or subclass.
The child class inherits all the properties and methods of the parent class and can also add new properties and methods.
For...
based on 5 interviews
Interview experience
based on 14 reviews
Rating in categories
Technical Lead
3.2k
salaries
| ₹7 L/yr - ₹25 L/yr |
Software Engineer
3.1k
salaries
| ₹2 L/yr - ₹9.5 L/yr |
Senior Software Engineer
2.5k
salaries
| ₹4.9 L/yr - ₹18.1 L/yr |
Lead Engineer
2.2k
salaries
| ₹4.3 L/yr - ₹14 L/yr |
Senior Analyst
2k
salaries
| ₹2 L/yr - ₹10 L/yr |
HCLTech
TCS
Accenture
Wipro