Filter interviews by
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
My name is sakshi hire
Hire Sakshi Rajnikant
Yes I like ordnance factory
I applied via Job Portal
I applied via Newspaper Ad and was interviewed before May 2023. There was 1 interview round.
Ordnance Factory interview questions for popular designations
I applied via Company Website and was interviewed in Mar 2022. There were 2 interview rounds.
Iti
A VMC machine typically has 3 or 4 axis.
VMC machines usually have X, Y, and Z axis.
Some advanced VMC machines may have a fourth axis, such as a rotary table.
The number of axis can vary depending on the specific machine and its capabilities.
A 4*4 vehicle is a four-wheel drive vehicle that uses all four wheels to provide power to the vehicle.
A 4*4 vehicle is also known as a four-wheel drive vehicle.
It uses all four wheels to provide power to the vehicle.
This allows the vehicle to have better traction and control in off-road or slippery conditions.
The working principle involves a transfer case that distributes power to both the front and rear axles.
Examples...
I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, and s...
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and ProtonMail.
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use VPNs
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Educatin...
Top trending discussions
I applied via Job Portal
I selected this job because it aligns with my passion for teaching and sharing knowledge.
Passion for teaching and sharing knowledge
Opportunity to make a positive impact on students' lives
Enjoyment of public speaking and engaging with an audience
Desire to contribute to the field of education
Ability to inspire and motivate others
I have a Bachelor's degree in Computer Science and a Master's degree in Business Administration.
Bachelor's degree in Computer Science
Master's degree in Business Administration
I have a strong technical background with expertise in various programming languages and software development.
Proficient in Java, C++, and Python
Experience with web development using HTML, CSS, and JavaScript
Familiarity with database management systems like MySQL and MongoDB
Knowledge of software development methodologies such as Agile and Scrum
Strong problem-solving and analytical skills
Ability to quickly learn new tec
I am a highly motivated and experienced lecturer with a passion for teaching and helping students succeed.
I have been teaching for over 10 years at various universities and have received excellent feedback from students.
I specialize in computer science and have published several research papers in top-tier conferences.
I believe in creating an interactive and engaging learning environment to foster student participation...
I have always been a hardworking individual, committed to achieving my goals.
I consistently put in extra hours to complete projects on time.
I am proactive in seeking out additional responsibilities and challenges.
I continuously strive to improve my skills and knowledge through self-study and professional development.
I am dedicated to delivering high-quality work and meeting or exceeding expectations.
I have received rec...
posted on 12 Jan 2022
The location of posting for the Regional Head position is determined based on the company's needs and the candidate's qualifications.
The location may be specified in the job description or discussed during the interview process.
It could be a specific city, region, or even multiple locations depending on the company's operations.
The location may also be subject to change or require travel to different areas.
The candidat...
My ambition is to continuously learn and grow, while making a positive impact in my role and industry.
Continuously seek out new challenges and opportunities for growth
Strive to make a positive impact in my role and industry
Develop and refine my leadership skills
Stay up-to-date with industry trends and advancements
Collaborate with and learn from colleagues and industry experts
based on 247 reviews
Rating in categories
Junior Works Manager
26
salaries
| ₹7 L/yr - ₹20 L/yr |
Chargeman
12
salaries
| ₹7 L/yr - ₹13.2 L/yr |
Graduate Apprentice Trainee
9
salaries
| ₹1 L/yr - ₹2.5 L/yr |
Technician
9
salaries
| ₹1.6 L/yr - ₹6 L/yr |
Apprentice Trainee
9
salaries
| ₹0.1 L/yr - ₹2.2 L/yr |
Hindustan Aeronautics
Bharat Electronics
BEML
Garden Reach Shipbuilders & Engineers