Filter interviews by
Per square metre is a unit of measurement used to calculate the area of a space in square meters.
Per square metre is a metric unit of area measurement.
It is commonly used in real estate to describe the size of a property.
To calculate the area of a space in square meters, you multiply the length by the width.
I applied via Company Website and was interviewed in Jan 2023. There were 3 interview rounds.
Group discussion was very good and pretty
My name is John Smith and I am 35 years old.
My name is John Smith.
I am 35 years old.
Yes, I have experience as a relationship manager.
I have worked as a relationship manager for XYZ Bank for the past 5 years.
During my tenure, I successfully managed a portfolio of high net worth clients, ensuring their satisfaction and retention.
I developed and implemented effective strategies to deepen client relationships and increase revenue.
I regularly conducted client meetings to understand their financial goals an...
I applied via Approached by Company and was interviewed in Jan 2022. There were 2 interview rounds.
Health and welfare and work environment, violence at work, movement of people, construction hazards, working at height, excavation, transport, musclelskeletal, manual handling, mechanical handling, machinery, electrical, fire, chemical, physical, biological, hazards.
Pune Municipal Corporation interview questions for popular designations
Top trending discussions
posted on 5 Nov 2021
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Validations used in project
Input validation to ensure correct data type and format
Data validation to ensure data integrity and consistency
Business rule validation to ensure compliance with requirements
Authentication and authorization validation to ensure secure access
Error handling and exception validation to ensure proper handling of errors
Stored procedures are precompiled SQL statements that can be saved and reused in a database.
Stored procedures can improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic and provide a consistent interface to the database.
Parameters can be passed to stored procedures, allowing for dynamic queries.
Examples of stored procedures include ones that retrieve data,
Views in SQL are virtual tables that are based on the result of an SQL statement.
Views are created using the CREATE VIEW statement.
They can be used to simplify complex queries.
They can also be used to restrict access to sensitive data.
Views are updated automatically when the underlying tables are updated.
They can be used to join multiple tables into a single view.
posted on 26 Feb 2023
posted on 4 Jun 2022
posted on 23 Feb 2024
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
To create a web page
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 19 Jan 2025
Reverse the string, Reverse of an array, Data base related queries
based on 5 interviews
Interview experience
based on 81 reviews
Rating in categories
Medical Officer
20
salaries
| ₹4 L/yr - ₹7.2 L/yr |
Junior Engineer Civil
7
salaries
| ₹1.8 L/yr - ₹3 L/yr |
Civil Engineer
7
salaries
| ₹1.8 L/yr - ₹4.2 L/yr |
Intern
6
salaries
| ₹1.4 L/yr - ₹3.2 L/yr |
Legal Intern
6
salaries
| ₹1.2 L/yr - ₹3.8 L/yr |
National Informatics Centre
Csc E Governance Services
Central Public Works Department
Common Service Centres