Filter interviews by
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
My name is sakshi hire
Hire Sakshi Rajnikant
Yes I like ordnance factory
Rate your
company
🤫 100% anonymous
How was your last interview experience?
I applied via Job Portal
I applied via Newspaper Ad and was interviewed before May 2023. There was 1 interview round.
Ordnance Factory interview questions for popular designations
I applied via Company Website and was interviewed in Mar 2022. There were 2 interview rounds.
Iti
A VMC machine typically has 3 or 4 axis.
VMC machines usually have X, Y, and Z axis.
Some advanced VMC machines may have a fourth axis, such as a rotary table.
The number of axis can vary depending on the specific machine and its capabilities.
A 4*4 vehicle is a four-wheel drive vehicle that uses all four wheels to provide power to the vehicle.
A 4*4 vehicle is also known as a four-wheel drive vehicle.
It uses all four wheels to provide power to the vehicle.
This allows the vehicle to have better traction and control in off-road or slippery conditions.
The working principle involves a transfer case that distributes power to both the front and rear axles.
Examples...
I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, and s...
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and ProtonMail.
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use VPNs
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Educatin...
Top trending discussions
I applied via Referral and was interviewed before Aug 2023. There were 2 interview rounds.
Application of ML with an example utilised in current machines
I am a motivated and enthusiastic individual with a strong interest in [Company Name].
The company was founded in 2005 by a group of entrepreneurs.
It specializes in providing innovative solutions in the tech industry.
The company has won several awards for its cutting-edge products and services.
I approach a problem by breaking it down into smaller parts, analyzing each part individually, brainstorming potential solutions, and then evaluating and implementing the best solution.
Break down the problem into smaller, more manageable parts
Analyze each part individually to understand its significance
Brainstorm potential solutions for each part
Evaluate and compare the potential solutions to determine the best course ...
based on 10 interviews
Interview experience
Anonymously discuss salaries, work culture, and many more
Get Ambitionbox App
based on 256 reviews
Rating in categories
Junior Works Manager
28
salaries
| ₹0 L/yr - ₹0 L/yr |
Chargeman
12
salaries
| ₹0 L/yr - ₹0 L/yr |
Technician
9
salaries
| ₹0 L/yr - ₹0 L/yr |
Graduate Apprentice Trainee
9
salaries
| ₹0 L/yr - ₹0 L/yr |
Apprentice Trainee
9
salaries
| ₹0 L/yr - ₹0 L/yr |
Hindustan Aeronautics
Bharat Electronics
BEML
Garden Reach Shipbuilders & Engineers