Filter interviews by
I applied via Walk-in and was interviewed before Jan 2020. There were 3 interview rounds.
A transformer is an electrical device that transfers electrical energy from one circuit to another through electromagnetic induction.
Transformers are used to increase or decrease the voltage of an alternating current (AC) power supply.
They consist of two coils of wire, known as the primary and secondary coils, which are wrapped around a magnetic core.
When an AC voltage is applied to the primary coil, it creates a magne...
Lt network is a decentralized blockchain platform for secure and transparent data sharing.
Lt network uses blockchain technology to ensure data security and transparency.
It allows users to share data without the need for intermediaries.
The platform is designed to be scalable and can handle large amounts of data.
It has various use cases such as supply chain management, healthcare, and finance.
Lt network also has its own
AT&C losses refer to Aggregate Technical and Commercial losses.
AT&C losses are the difference between the amount of electricity supplied and the amount of electricity billed.
They are caused by technical losses (due to transmission and distribution) and commercial losses (due to theft, billing errors, etc.).
AT&C losses are a major problem in developing countries, where they can be as high as 50%.
Reducing AT&C losses is ...
Collection efficiency is the percentage of outstanding debt that a company is able to collect from its customers.
It measures the effectiveness of a company's collection efforts.
It is calculated by dividing the amount of debt collected by the total amount of debt owed.
A high collection efficiency indicates that a company has a strong credit and collection policy.
A low collection efficiency may indicate that a company ne...
Transformers used in LT distribution are mainly of two types - Distribution Transformers and Power Transformers.
Distribution Transformers are used for distributing power to end-users at low voltage levels.
Power Transformers are used for stepping up or stepping down the voltage levels in the power transmission and distribution system.
Distribution Transformers have a lower power rating and are designed for continuous ope...
Different types of poles are used in distribution depending on the voltage level and location.
Wooden poles are commonly used for low voltage distribution in rural areas.
Concrete poles are used for medium voltage distribution in urban areas.
Steel poles are used for high voltage transmission and distribution.
Composite poles made of fiberglass and other materials are also used for their durability and resistance to weathe...
Top trending discussions
posted on 5 Nov 2021
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Validations used in project
Input validation to ensure correct data type and format
Data validation to ensure data integrity and consistency
Business rule validation to ensure compliance with requirements
Authentication and authorization validation to ensure secure access
Error handling and exception validation to ensure proper handling of errors
Stored procedures are precompiled SQL statements that can be saved and reused in a database.
Stored procedures can improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic and provide a consistent interface to the database.
Parameters can be passed to stored procedures, allowing for dynamic queries.
Examples of stored procedures include ones that retrieve data,
Views in SQL are virtual tables that are based on the result of an SQL statement.
Views are created using the CREATE VIEW statement.
They can be used to simplify complex queries.
They can also be used to restrict access to sensitive data.
Views are updated automatically when the underlying tables are updated.
They can be used to join multiple tables into a single view.
posted on 26 Feb 2023
posted on 4 Jun 2022
posted on 23 Feb 2024
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
To create a web page
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 17 Aug 2024
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
posted on 20 Dec 2024
I applied via Referral and was interviewed before Dec 2023. There were 2 interview rounds.
Selenium is a popular automation testing tool used for web applications.
Supports multiple programming languages like Java, Python, C#, etc.
Can automate web browsers across different platforms.
Allows for parallel test execution.
Integrates with popular CI/CD tools like Jenkins.
Supports various browsers like Chrome, Firefox, Safari, etc.
My salary expectations are based on my experience, skills, and the market rate for Senior Software Engineers.
Research the average salary for Senior Software Engineers in the specific location and industry
Consider your years of experience and relevant skills
Be prepared to negotiate based on the company's offer and benefits package
posted on 3 Jan 2023
OOPs concept in Java is a programming paradigm that focuses on objects and their interactions.
OOPs stands for Object-Oriented Programming
It emphasizes on encapsulation, inheritance, and polymorphism
Encapsulation is the process of hiding implementation details from the user
Inheritance allows a class to inherit properties and methods from another class
Polymorphism allows objects to take on multiple forms or behaviors
Exam...
StringTokenizer is a class in Java that breaks a string into tokens based on a delimiter.
It is a legacy class that is not recommended to use in new code.
It is used to split a string into smaller parts based on a delimiter.
The default delimiter is whitespace, but it can be changed to any character or string.
It is useful for parsing text files or data that is separated by a specific character.
Example: StringTokenizer st ...
I am comfortable with a wide range of technologies including Java, Python, JavaScript, and SQL.
Proficient in Java and Python programming languages
Familiar with JavaScript and its frameworks such as React and Angular
Experienced in working with SQL databases
Comfortable with version control systems like Git
Knowledgeable in software development methodologies like Agile and Scrum
posted on 11 Oct 2020
Server side state management is the process of storing and managing data on the server side of a web application.
It involves storing data on the server instead of the client side
It helps maintain consistency and security of data
Examples include session management and database management
Page life cycle refers to the series of events that occur between the time a user requests a web page and the time the page is rendered on the user's browser.
Page life cycle consists of several stages such as initialization, loading, rendering, and unloading.
During initialization, the page is created and controls are initialized.
During loading, the page is loaded with data and controls are populated.
During rendering, t...
The components of .NET include the Common Language Runtime, Framework Class Library, and ASP.NET.
Common Language Runtime (CLR) - manages memory, security, and execution of code
Framework Class Library (FCL) - collection of reusable classes, interfaces, and value types
ASP.NET - web application framework for building dynamic web pages and web services
Cookies are small text files stored on a user's computer by a website to remember user preferences and login information.
Cookies are used to track user activity on a website
They can be used to store user preferences and login information
Cookies can be either session cookies or persistent cookies
Session cookies are deleted when the user closes their browser
Persistent cookies remain on the user's computer until they expi
CLR stands for Common Language Runtime, a component of .NET framework that manages execution of .NET programs.
CLR is responsible for memory management, security, and exception handling.
It compiles code into an intermediate language (IL) and then executes it.
CLR allows for language interoperability, meaning that code written in different languages can be compiled to the same IL and run on the same runtime.
Examples of la...
based on 27 reviews
Rating in categories
Assistant Manager
3
salaries
| ₹3.2 L/yr - ₹4 L/yr |
Service Manager
3
salaries
| ₹1.1 L/yr - ₹3.2 L/yr |
Finance Manager
3
salaries
| ₹6 L/yr - ₹6.5 L/yr |
Senior Accounts Executive
3
salaries
| ₹3 L/yr - ₹3.2 L/yr |
Commercial Executive
3
salaries
| ₹1.9 L/yr - ₹2.5 L/yr |
Government of India
National Informatics Centre
Csc E Governance Services
Central Reserve Police Force