Filter interviews by
I applied via Referral and was interviewed before Sep 2017. There were 4 interview rounds.
jQuery is a fast, small, and feature-rich JavaScript library that simplifies HTML document traversal and manipulation, event handling, and animation.
jQuery is a JavaScript library that makes it easier to work with HTML documents.
It simplifies tasks like traversing and manipulating the DOM, handling events, and creating animations.
It provides a wide range of functions and methods to perform common web development tasks.
...
Classes are blueprints for creating objects in object-oriented programming. They define the properties and behaviors of an object.
Classes are used to create objects, which are instances of the class.
They encapsulate data and methods that operate on that data.
Classes promote code reusability and maintainability.
Real-world example: A class 'Car' can have properties like 'color', 'brand', and 'model', and methods like 'st
Top trending discussions
I applied via Monster and was interviewed in Mar 2024. There were 3 interview rounds.
Learn java c+ and python based
Study the entire full topic of subject
OOPs is a programming paradigm that uses objects to represent real-world entities and their interactions.
OOPs stands for Object-Oriented Programming.
It is used to organize and structure code for better readability, reusability, and maintainability.
OOPs concepts include encapsulation, inheritance, polymorphism, and abstraction.
Examples of OOPs languages include Java, Python, C++, and Ruby.
posted on 15 Aug 2023
I appeared for an interview before Aug 2022.
posted on 20 Mar 2024
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
SIEM stands for Security Information and Event Management. It is a software solution that aggregates and analyzes security data from various sources.
SIEM collects logs and data from network devices, servers, applications, and more to identify security incidents.
It correlates and analyzes this data in real-time to detect threats, monitor security events, and provide alerts.
SIEM solutions help organizations to comply wit...
Endpoint security refers to the protection of individual devices like computers, smartphones, and tablets from cyber threats.
Focuses on securing endpoints like computers, smartphones, and tablets
Involves protecting devices from malware, ransomware, and other cyber threats
Includes measures like antivirus software, firewalls, and encryption
Ensures that only authorized users and devices can access the network
Helps prevent...
A closure is a function that has access to its own scope, the scope in which it was defined, and the global scope.
A closure is created when a function is defined inside another function.
The inner function has access to the variables and parameters of the outer function, even after the outer function has finished executing.
Closures are useful for creating private variables and functions in JavaScript.
They can also be us...
Encapsulation is the process of hiding internal details and providing a public interface for accessing and manipulating data.
Encapsulation bundles data and methods together into a single unit.
It helps in achieving data abstraction and data hiding.
By encapsulating data, we can control access to it and prevent unauthorized modifications.
Encapsulation promotes code reusability and maintainability.
Example: A class in objec...
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Inheritance allows for code reuse and promotes the concept of hierarchy.
The class that is being inherited from is called the superclass or base class.
The class that inherits from the superclass is called the subclass or derived class.
The subclass can access the public and protected members of the s...
Abstraction is the process of simplifying complex systems by focusing on essential details.
Abstraction involves hiding unnecessary details and exposing only relevant information.
It allows developers to create models or representations that capture the essential aspects of a system.
Abstraction helps in managing complexity, improving code reusability, and enhancing maintainability.
For example, in object-oriented programm...
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.
Polymorphism is a fundamental concept in object-oriented programming.
It enables code reusability and flexibility.
Polymorphism can be achieved through method overriding and method overloading.
Example: A parent class Animal can have multiple child classes like Dog, Cat, and Bird. They can ...
I applied via Naukri.com and was interviewed before Feb 2023. There were 2 interview rounds.
I perform internal audits by conducting thorough reviews of company processes, policies, and controls.
I start by understanding the objectives and scope of the audit.
I gather relevant documentation and data to analyze.
I conduct interviews with key personnel to gain insights.
I assess the effectiveness of internal controls and identify any weaknesses or gaps.
I document my findings and recommendations in a comprehensive re...
CIA in information security management system refers to Confidentiality, Integrity, and Availability.
Confidentiality ensures that information is only accessible to authorized individuals.
Integrity ensures that information is accurate, complete, and unaltered.
Availability ensures that information is accessible and usable when needed.
These three principles form the foundation of a secure information system.
For example, e...
based on 1 review
Rating in categories
Software Developer
41
salaries
| ₹1 L/yr - ₹7.5 L/yr |
Software Engineer
30
salaries
| ₹4 L/yr - ₹7.5 L/yr |
Front end Developer
15
salaries
| ₹3.6 L/yr - ₹8 L/yr |
Graduate Engineer Trainee (Get)
12
salaries
| ₹3.6 L/yr - ₹4.2 L/yr |
Quality Control Specialist
9
salaries
| ₹1 L/yr - ₹4.8 L/yr |
Aptara
MPS Limited
Lionbridge Technologies
Crimson Interactive