Filter interviews by
I applied via Walk-in and was interviewed in Dec 2019. There was 1 interview round.
I applied via Recruitment Consultant and was interviewed in Jan 2021. There was 1 interview round.
ICT can be used in education to enhance teaching and learning through interactive tools and resources.
ICT can provide access to a wide range of educational resources and materials, such as online textbooks, videos, and simulations.
It can facilitate communication and collaboration among students and teachers through platforms like email, discussion forums, and video conferencing.
ICT can support personalized learning by ...
Yes, I have used various online teaching tools to enhance student learning and engagement.
I have used online simulations to help students visualize chemical reactions
I have used online quizzes to assess student understanding
I have used video conferencing tools to conduct virtual labs and demonstrations
I have used online discussion forums to facilitate student collaboration
I have used online resources such as Khan Acade...
I applied via Newspaper Ad and was interviewed before Sep 2021. There were 3 interview rounds.
Each candidate will give separate general topic related to teaching atmosphere. Each of us should write our experience and our concepts about the given topic in English. Through this assignment, they'll check our lanuage and also our ideas related to the topic
Top trending discussions
I applied via Naukri.com and was interviewed before Jul 2021. There were 2 interview rounds.
posted on 29 Aug 2024
Test of Excel knowledge
posted on 4 Jun 2022
posted on 26 Feb 2023
posted on 23 Feb 2024
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
To create a web page
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 19 Jan 2025
Reverse the string, Reverse of an array, Data base related queries
based on 70 reviews
Rating in categories
Maths Teacher
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Business Studies Teacher
6
salaries
| ₹0 L/yr - ₹0 L/yr |
Economics Teacher
6
salaries
| ₹0 L/yr - ₹0 L/yr |
English Teacher
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Chemistry Teacher
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Central Board of Secondary Education
National Institute of Open Schooling
Educomp Solutions
Pearson Education India