Filter interviews by
I applied via Referral and was interviewed before May 2020. There were 3 interview rounds.
Introduction and types of calculation for economics
Economics involves various calculations to analyze and predict economic trends
Types of calculations in economics include cost-benefit analysis, inflation rate calculation, GDP calculation, etc.
Cost-benefit analysis helps determine the economic feasibility of a project or policy
Inflation rate calculation measures the rate at which prices of goods and services increase o...
Good communication with interviever
Vijay Rupani is the current Chief Minister of Gujarat.
Vijay Rupani took office as the Chief Minister of Gujarat on August 7, 2016.
He is a member of the Bharatiya Janata Party (BJP).
Rupani succeeded Anandiben Patel as the CM of Gujarat.
He has been actively involved in various developmental initiatives in the state.
The capital of Nagaland is Kohima.
Kohima is the capital city of Nagaland.
It is located in the northeastern part of India.
Kohima is known for its scenic beauty and rich Naga culture.
The charge of a proton is positive and equal to +1 elementary charge.
The charge of a proton is +1 elementary charge.
It is denoted as +e in equations.
Protons are positively charged particles found in the nucleus of an atom.
A Chief Minister (CM) does not change when there is a hung assembly or a coalition government.
CM does not change in a hung assembly where no single party has a clear majority.
CM does not change in a coalition government where multiple parties come together to form a government.
CM does not change when the incumbent CM retains power after elections but with a different party alliance.
The position of Statistics Minister does not exist.
There is no official position called Statistics Minister.
The government may have a Minister of Statistics or a Minister of Statistics and Data.
It is important to research the specific country or government in question to find the relevant ministerial position.
I was responsible for managing the front desk operations and providing administrative support in the department.
Managed front desk operations including answering phones, scheduling appointments, and greeting visitors
Provided administrative support such as data entry, filing, and preparing documents
Assisted with organizing department events and meetings
Collaborated with other staff members to ensure smooth operations
I have experience in handling various administrative tasks such as scheduling appointments, managing emails, and organizing files.
Scheduling appointments for executives and clients
Managing emails and responding to inquiries
Organizing files and maintaining records
Coordinating meetings and events
Assisting with office supply orders
I have a Bachelor's degree in Business Administration which has equipped me with the necessary skills to effectively manage administrative tasks and support the organization's operations.
Strong understanding of business principles and practices
Proficient in office management and organization
Excellent communication and interpersonal skills
Ability to prioritize tasks and meet deadlines
Experience in handling administrativ
National Sample Survey Office (nsso) interview questions for popular designations
posted on 17 Aug 2024
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
posted on 20 Dec 2024
I applied via Referral and was interviewed before Dec 2023. There were 2 interview rounds.
Selenium is a popular automation testing tool used for web applications.
Supports multiple programming languages like Java, Python, C#, etc.
Can automate web browsers across different platforms.
Allows for parallel test execution.
Integrates with popular CI/CD tools like Jenkins.
Supports various browsers like Chrome, Firefox, Safari, etc.
My salary expectations are based on my experience, skills, and the market rate for Senior Software Engineers.
Research the average salary for Senior Software Engineers in the specific location and industry
Consider your years of experience and relevant skills
Be prepared to negotiate based on the company's offer and benefits package
I'm sorry, but I cannot answer that question without more information.
My name is [insert name here]
My name is [insert name here]
I have been called by this name since birth
It is the name given to me by my parents
It is the name I use to introduce myself to others
I prefer not to disclose my age as it is not relevant to my qualifications and experience for this position.
Age should not be a factor in determining one's ability to perform a job
Experience, skills, and qualifications are more important than age
Employers are not allowed to discriminate based on age
I am confident that my qualifications and experience make me a strong candidate for this position
I oversee daily operations, manage staff, and ensure customer satisfaction.
Manage and supervise staff
Ensure customer satisfaction
Create and implement policies and procedures
Monitor inventory and sales
Handle customer complaints and resolve issues
Train new employees
Collaborate with upper management
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 19 Jan 2025
Reverse the string, Reverse of an array, Data base related queries
posted on 23 Feb 2024
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
To create a web page
based on 1 interview
Interview experience
based on 98 reviews
Rating in categories
Field Investigator
47
salaries
| ₹0 L/yr - ₹0 L/yr |
Field Officer
15
salaries
| ₹0 L/yr - ₹0 L/yr |
Survey Supervisor
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Surveyor
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Junior Statistical Officer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Ministry of Statistics and Programme Implementation
Indian Statistical Institute
Nielsen Holdings
Kantar