i
HCLTech
Filter interviews by
CI/CD stands for Continuous Integration/Continuous Deployment. It is a DevOps practice that involves automating the process of building, testing, and deploying software.
CI/CD is a software development approach that aims to deliver code changes more frequently and reliably.
Continuous Integration involves merging code changes into a shared repository and running automated tests to detect integration issues early.
Con...
DevOps is a software development approach that combines development and operations teams to improve collaboration and efficiency.
DevOps is a cultural shift that promotes collaboration and communication between software developers and IT operations.
It aims to automate and streamline the software delivery process, from development to deployment and maintenance.
DevOps emphasizes continuous integration, continuous del...
Cyber security is the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves implementing measures to prevent cyber attacks and data breaches
It includes protecting against viruses, malware, and other malicious software
Cyber security also involves educating users on safe online practices
Examples of cyber security measures inclu...
Security refers to the measures taken to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information.
Security involves protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction
It includes measures such as encryption, firewalls, access controls, and security policies
Security is important in all areas, including person...
What people are saying about HCLTech
Cloud is a virtual space that allows users to store, manage, and access data and applications remotely.
Cloud is a virtualized infrastructure that provides on-demand access to computing resources.
It allows users to store and access data and applications remotely over the internet.
Cloud services are typically categorized into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software...
Implementing security in the cloud involves various measures to protect data and systems from cyber threats.
Use strong authentication and access controls to prevent unauthorized access
Encrypt data both in transit and at rest to ensure confidentiality
Implement network security measures like firewalls and intrusion detection systems
Regularly update and patch software to address vulnerabilities
Monitor and log activit...
Cloud is a virtual space that allows users to store, manage, and access data and applications remotely.
Cloud is a virtualized infrastructure that provides on-demand access to computing resources.
It allows users to store and access data and applications remotely over the internet.
Cloud services are typically categorized into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a...
DevOps is a software development approach that combines development and operations teams to improve collaboration and efficiency.
DevOps is a cultural shift that promotes collaboration and communication between software developers and IT operations.
It aims to automate and streamline the software delivery process, from development to deployment and maintenance.
DevOps emphasizes continuous integration, continuous delivery...
CI/CD stands for Continuous Integration/Continuous Deployment. It is a DevOps practice that involves automating the process of building, testing, and deploying software.
CI/CD is a software development approach that aims to deliver code changes more frequently and reliably.
Continuous Integration involves merging code changes into a shared repository and running automated tests to detect integration issues early.
Continuo...
Implementing security in the cloud involves various measures to protect data and systems from cyber threats.
Use strong authentication and access controls to prevent unauthorized access
Encrypt data both in transit and at rest to ensure confidentiality
Implement network security measures like firewalls and intrusion detection systems
Regularly update and patch software to address vulnerabilities
Monitor and log activities t...
Cyber security is the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves implementing measures to prevent cyber attacks and data breaches
It includes protecting against viruses, malware, and other malicious software
Cyber security also involves educating users on safe online practices
Examples of cyber security measures include fi...
Security refers to the measures taken to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information.
Security involves protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction
It includes measures such as encryption, firewalls, access controls, and security policies
Security is important in all areas, including personal, b...
I applied via Company Website and was interviewed in Oct 2021. There was 1 interview round.
I applied via LinkedIn and was interviewed in Feb 2021. There were 3 interview rounds.
I applied via Company Website and was interviewed in Jul 2020. There were 3 interview rounds.
I appeared for an interview before May 2021.
I applied via Campus Placement and was interviewed before Dec 2020. There were 4 interview rounds.
I have an iPhone 12 and a MacBook Pro, both classified as premium devices.
My iPhone 12 is a premium smartphone from Apple with a 6.1-inch Super Retina XDR display and A14 Bionic chip.
My MacBook Pro is a premium laptop from Apple with a 13-inch Retina display and M1 chip.
Both devices are classified as premium due to their high-end specifications and premium build quality.
I applied via Campus Placement and was interviewed before Jul 2020. There were 3 interview rounds.
Explanation of horizontal and vertical scaling, MySQL vs MongoDB, Primary Key vs Unique Key
Horizontal scaling involves adding more machines to distribute load, while vertical scaling involves adding more resources to a single machine
MySQL is a relational database while MongoDB is a NoSQL database
Primary key is a unique identifier for a record while unique key ensures that a column has unique values
MySQL supports both h...
based on 6 interview experiences
Difficulty level
based on 49 reviews
Rating in categories
Software Engineer
24.9k
salaries
| ₹2.7 L/yr - ₹8.1 L/yr |
Technical Lead
22.9k
salaries
| ₹10.9 L/yr - ₹21 L/yr |
Senior Software Engineer
16.8k
salaries
| ₹5.4 L/yr - ₹15.8 L/yr |
Lead Engineer
16.4k
salaries
| ₹5.3 L/yr - ₹12.4 L/yr |
Analyst
15.9k
salaries
| ₹2.3 L/yr - ₹6.5 L/yr |
TCS
Wipro
Accenture
Cognizant