Filter interviews by
Material availability refers to the accessibility and readiness of materials needed for production processes.
Material availability ensures that necessary components are on hand to meet production schedules.
It involves assessing lead times, stock levels, and supplier reliability.
For example, in automotive manufacturing, the availability of steel and electronic parts is crucial for assembly lines.
Effective inventory...
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Edu...
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and Proton...
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, ...
A VMC machine typically has 3 or 4 axis.
VMC machines usually have X, Y, and Z axis.
Some advanced VMC machines may have a fourth axis, such as a rotary table.
The number of axis can vary depending on the specific machine and its capabilities.
A 4*4 vehicle is a four-wheel drive vehicle that uses all four wheels to provide power to the vehicle.
A 4*4 vehicle is also known as a four-wheel drive vehicle.
It uses all four wheels to provide power to the vehicle.
This allows the vehicle to have better traction and control in off-road or slippery conditions.
The working principle involves a transfer case that distributes power to both the front and rear axles.
Exa...
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use ...
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
I am a skilled machinist with over 5 years of experience in precision machining and a passion for creating high-quality components.
Experience: Worked at XYZ Manufacturing for 3 years, specializing in CNC machining.
Skills: Proficient in operating lathes, mills, and grinders.
Projects: Successfully completed a project that improved production efficiency by 20%.
Certifications: Certified in CNC programming and safety protoc...
Hire Sakshi Rajnikant
Yes I like ordnance factory
I applied via Job Portal
Vernier caliper's least count is typically 0.02 mm or 0.001 inches, allowing precise measurements.
Least count is the smallest measurement that can be read accurately.
For a standard vernier caliper, the least count is usually 0.02 mm.
In inches, the least count can be 0.001 inches.
This precision is crucial for mechanical fitting and engineering applications.
I appeared for an interview before May 2024, where I was asked the following questions.
My name is anmol Sakhare . I am from nagpur , maharastra. I have completed my b.tech in mechanical branch from dbatu University.. I got experience for 1 years in production department . My strength are I am hardworking and self motivated person and my weaknesses is I am easily trust by any people ..that's all about me thank you....
Implementing quality control measures and continuous improvement strategies can significantly reduce product rejections.
Conduct regular training sessions for staff to ensure they understand quality standards.
Implement a robust quality assurance process, such as Six Sigma, to identify and eliminate defects.
Utilize statistical process control (SPC) to monitor production processes and detect variations early.
Encourage a c...
Material availability refers to the accessibility and readiness of materials needed for production processes.
Material availability ensures that necessary components are on hand to meet production schedules.
It involves assessing lead times, stock levels, and supplier reliability.
For example, in automotive manufacturing, the availability of steel and electronic parts is crucial for assembly lines.
Effective inventory mana...
Effective team management involves clear communication, setting goals, and fostering collaboration to achieve production targets.
Establish clear roles and responsibilities: Ensure each team member knows their specific tasks to avoid confusion.
Encourage open communication: Create an environment where team members feel comfortable sharing ideas and concerns.
Set measurable goals: Define specific, achievable objectives for...
posted on 22 May 2025
I appeared for an interview before May 2024, where I was asked the following questions.
A hydraulic pump system converts mechanical energy into hydraulic energy, powering various machinery through fluid movement.
Uses hydraulic fluid to transmit power.
Commonly found in construction equipment like excavators.
Operates based on Pascal's principle of fluid pressure.
Types include gear pumps, vane pumps, and piston pumps.
Used in automotive systems for power steering.
5S is a workplace organization method that improves efficiency and safety through five key steps.
Sort: Remove unnecessary items from the workspace. Example: Discard old tools that are no longer used.
Set in order: Organize tools and materials for easy access. Example: Label shelves and use shadow boards for tools.
Shine: Clean the workspace regularly to maintain standards. Example: Schedule daily cleaning routines.
Standa...
I appeared for an interview before Apr 2024, where I was asked the following questions.
I applied via Newspaper Ad and was interviewed before May 2023. There was 1 interview round.
I applied via Company Website and was interviewed in Mar 2022. There were 2 interview rounds.
Iti
A VMC machine typically has 3 or 4 axis.
VMC machines usually have X, Y, and Z axis.
Some advanced VMC machines may have a fourth axis, such as a rotary table.
The number of axis can vary depending on the specific machine and its capabilities.
A 4*4 vehicle is a four-wheel drive vehicle that uses all four wheels to provide power to the vehicle.
A 4*4 vehicle is also known as a four-wheel drive vehicle.
It uses all four wheels to provide power to the vehicle.
This allows the vehicle to have better traction and control in off-road or slippery conditions.
The working principle involves a transfer case that distributes power to both the front and rear axles.
Examples...
I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, and s...
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and ProtonMail.
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use VPNs ...
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Educatin...
Top trending discussions
based on 16 interview experiences
Difficulty level
Duration
based on 277 reviews
Rating in categories
Junior Works Manager
30
salaries
| ₹7.5 L/yr - ₹18 L/yr |
Chargeman
12
salaries
| ₹7 L/yr - ₹13.2 L/yr |
Technician
9
salaries
| ₹1.6 L/yr - ₹6 L/yr |
Graduate Apprentice Trainee
9
salaries
| ₹1 L/yr - ₹2.5 L/yr |
Graduate Engineer Trainee (Get)
7
salaries
| ₹1.1 L/yr - ₹2.1 L/yr |
Government of India
National Informatics Centre
Csc E Governance Services
Central Reserve Police Force