Filter interviews by
Be the first one to contribute and help others!
Shear force is the force that acts parallel to the surface of a material, while bending moment is the measure of bending effect on a material.
Shear force is the force that tends to cause deformation by sliding one part of the material over another in opposite directions.
Bending moment is the measure of the bending effect on a material due to an external force applied perpendicular to the material.
Shear force and bendin...
Steel is required in tension members to resist tensile forces and prevent failure.
Steel has high tensile strength, making it ideal for resisting tension forces.
Steel is ductile and can deform before failure, providing warning signs of potential failure.
Steel is commonly used in tension members of structures like bridges, buildings, and cranes.
Deep foundation is a type of foundation that transfers building loads to deeper, more stable soil or rock below the surface.
Deep foundations are used when shallow foundations are not feasible due to weak soil near the surface.
Common types of deep foundations include piles, drilled shafts, and caissons.
Deep foundations are typically used for tall buildings, bridges, and structures on soft soil or near water bodies.
They ...
Cement is used in concrete to bind the materials together and provide strength and durability.
Cement acts as a binding agent in concrete, holding the aggregates together.
It reacts with water to form a paste that hardens over time, creating a strong and durable material.
Different types of cement, such as Portland cement, are used based on the specific requirements of the project.
Proper proportioning of cement in concret...
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
As a team lead, my daily tasks include overseeing project progress, assigning tasks, providing guidance and support to team members, and ensuring deadlines are met.
Overseeing project progress and ensuring tasks are completed on time
Assigning tasks to team members based on their strengths and workload
Providing guidance and support to team members to help them succeed
Communicating with stakeholders to provide updates on ...
Database credentials can be stored securely in cloud using encryption, environment variables, and key management services.
Use encryption to protect sensitive information such as passwords and keys.
Store credentials in environment variables rather than hardcoding them in code.
Utilize key management services provided by cloud providers for secure storage and access control.
Avoid storing credentials in plain text files or...
Database credentials can be stored in a secure external vault service like HashiCorp Vault or AWS Secrets Manager.
Store database credentials in a secure external vault service like HashiCorp Vault or AWS Secrets Manager.
Utilize Kubernetes secrets to store the access credentials for the external vault service.
Implement proper access controls and encryption mechanisms to ensure the security of the stored credentials.
Yes, I have experience with React.
I have worked on multiple projects using React for front-end development.
I am proficient in using React components, state management, and hooks.
I have integrated React with backend technologies like Node.js for full-stack development.
I applied via Recruitment Consulltant and was interviewed in Jul 2024. There were 2 interview rounds.
Product case study and experience-based questions.
Write debounce in js, with leading and trailing edge. A react question, make 5 star a rating widget.
I applied via Naukri.com and was interviewed in Mar 2024. There were 2 interview rounds.
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection occurs when an attacker inserts malicious SQL code into input fields on a website.
This code can then manipulate the database, steal data, or perform other unauthorized actions.
Example: Entering ' OR '1'='1' into a login form to bypass authentication.
XSS attack is a type of cyber attack where attackers inject malicious scripts into web pages viewed by other users.
XSS stands for Cross-Site Scripting.
Attackers inject malicious scripts into web pages viewed by other users.
These scripts can steal sensitive information, deface websites, redirect users to malicious sites, etc.
There are three types of XSS attacks: stored, reflected, and DOM-based.
Preventing XSS attacks in...
OTP flooding is a type of cyber attack where a large number of one-time passwords are sent to a target in order to overwhelm them.
OTP flooding is a form of denial-of-service attack.
Attackers flood the target with numerous OTPs, making it difficult for the target to use their legitimate OTP.
This type of attack can be used to disrupt services or gain unauthorized access to accounts.
Examples of OTP flooding include sendin...
Resource flooding is a type of cyber attack where an attacker overwhelms a system with excessive requests, causing it to become slow or unresponsive.
Resource flooding is a type of denial of service (DoS) attack.
Attackers flood a system with excessive requests, such as HTTP requests or network traffic, to overwhelm its resources.
This can lead to the system becoming slow or unresponsive, disrupting normal operations.
Comm...
I applied via Approached by Company and was interviewed before May 2023. There was 1 interview round.
An operation executive is responsible for overseeing and managing the day-to-day operations of a company.
Responsible for ensuring smooth functioning of operations
Developing and implementing operational policies and procedures
Managing resources and budgets
Ensuring compliance with regulations and standards
Analyzing data and making strategic decisions
Examples: COO, Operations Manager, Operations Director
There are several types of operations, including manufacturing, service, financial, marketing, and human resources.
Manufacturing operations involve the production of goods.
Service operations involve providing services to customers.
Financial operations involve managing financial resources.
Marketing operations involve promoting and selling products or services.
Human resources operations involve managing employees.
Yes, Google Sheet is a cloud-based spreadsheet program offered by Google.
Google Sheet is similar to Microsoft Excel but is accessible online.
It allows multiple users to collaborate on a single document in real-time.
It offers various features such as data validation, conditional formatting, and chart creation.
It can be integrated with other Google services such as Google Forms and Google Drive.
It can also be used for da...
Vlookup and Hlookup are Excel functions used to search for a specific value in a table and return a corresponding value.
Vlookup searches for a value in the first column of a table and returns a value in the same row from a specified column.
Hlookup searches for a value in the first row of a table and returns a value in the same column from a specified row.
Both functions are useful for quickly finding data in large table...
Creating a Google Form is easy and can be done in a few simple steps.
Log in to your Google account and go to Google Forms
Click on the plus sign to create a new form
Add questions and customize the form as per your requirements
Preview the form and make necessary changes
Share the form with others via email or a link
Cold calling is making unsolicited calls to potential customers, while hot calling is contacting leads who have shown interest.
Cold calling involves reaching out to people who have not expressed any interest in the product or service being offered.
Hot calling involves contacting leads who have shown some level of interest, such as filling out a form or requesting more information.
Cold calling is often used as a way to ...
posted on 15 Sep 2021
I was interviewed in Dec 2020.
Round duration - 90 minutes
Round difficulty - Medium
This round had 2 coding questions. In both of them, You need to implement those functions such that it returns the correct answer based on what the problem is about.
Given an array ARR
of size 'N', where each integer is in the range from 0 to N - 1, identify all elements that appear more than once.
Return the duplicate elements in any orde...
Given two strings, Version1
and Version2
, each representing version numbers, determine which one is the latest version.
The input strings consist of digits and dots only....
Round duration - 45 minutes
Round difficulty - Medium
The Interviewer has 5 years of experience and was very friendly. He introduced himself first and asked me for a quick introduction. Then he jumped into coding questions
You are provided with a 2-dimensional matrix having N
rows and M
columns, containing only 1s (land) and 0s (water). Your goal is to determine the number of islands in t...
Given two integers N and K, determine how many ways you can partition the number N into K non-empty groups such that the size of each group[i] >= group[i-1] f...
Tip 1 : Go through the previously asked problems
Tip 2 : Make some good projects
Tip 3 : Prefer solving the 450 questions sheet from love babbar which is also available on codestudio.
Tip 1 : Attach your resume to linkedin profile, several recruiters are always looking for hiring
Tip 2 : Mention your projects carefully in resume
Tip 3 : Be prepared for cross questioning based on skills in your resume
posted on 2 Apr 2020
I applied via Campus Placement and was interviewed in Mar 2020. There were 4 interview rounds.
Amazon
Flipkart
Indiamart Intermesh
JustDial