i
KANINI Software
Solutions
Filter interviews by
Aptitude was very general and basic with aptitude, logical reasoning and verbal test.
Coding test which has problems in for which we need to write code using the logic as expected.
Group discussion happens with general topics.
I applied via Campus Placement and was interviewed before Mar 2023. There were 2 interview rounds.
Topic-Social media
time-30 mins
Need to talk for 5 mins max
OOPS concepts refer to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation detail...
An object is a real-world entity that has state and behavior.
Objects are instances of classes in object-oriented programming.
They have attributes (data) and methods (functions).
For example, a car object may have attributes like color, model, and speed, and methods like accelerate and brake.
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example: Inheritance in object-oriented programming languages like Java allows for polymorphism.
Example: Overloading a method...
Top trending discussions
I applied via Referral and was interviewed before Jul 2020. There were 4 interview rounds.
I applied via LinkedIn and was interviewed before Jan 2021. There were 3 interview rounds.
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an...
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of...
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
I applied via Campus Placement and was interviewed before Feb 2023. There was 1 interview round.
Coding Questions on one of the preffered programming language. Most importantly Data Structures and algorithms.
I applied via Newspaper Ad
Basic coding questins
I applied via Campus Placement and was interviewed in Jul 2022. There were 5 interview rounds.
There were 48 questions to be done in 60 minutes.
the platform used was below average.
about 1400 gave the test
The Next round was a GD.
about 250 were shortlisted.
it was held in groups of 10 - 13.
there were 2 Panelists observing the body language, the fluency and time you speak for.
It is very important that you either start or conclude the GD.
leaves a good impression.
SQL Queries using Joins and sub-queries
Joins are used to combine rows from different tables based on a related column
Sub-queries are queries nested within another query
Joins and sub-queries can be used together to retrieve specific data from multiple tables
Prepare well on Python, SQL and be good at solving analytical problems
based on 3 interview experiences
Difficulty level
Duration
based on 13 reviews
Rating in categories
Senior Associate
168
salaries
| ₹11.9 L/yr - ₹22.9 L/yr |
Associate
79
salaries
| ₹4.9 L/yr - ₹12 L/yr |
Junior Associate
60
salaries
| ₹4 L/yr - ₹8.5 L/yr |
Softwaretest Engineer
42
salaries
| ₹3.8 L/yr - ₹8.6 L/yr |
Associate Trainee
33
salaries
| ₹4 L/yr - ₹6 L/yr |
Tekwissen
Damco Solutions
smartData Enterprises
In Time Tec Visionsoft