Filter interviews by
I applied via Walk-in and was interviewed in Dec 2022. There were 2 interview rounds.
Metrology Lab is a facility for measuring and analyzing physical properties of materials and products, while Metelogy Lab does not exist.
Metrology Lab is used for quality control and assurance in manufacturing industries.
It involves the use of precision instruments and techniques to measure and analyze physical properties of materials and products.
Metelogy Lab is not a term used in the field of quality control or manuf...
Top trending discussions
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
Product backlog is a prioritized list of tasks to be completed in a project. Defect triage is the process of prioritizing and assigning defects for resolution.
Product backlog is a dynamic list of features, enhancements, and bug fixes that need to be implemented in a project.
It is prioritized based on business value, urgency, and dependencies.
Defect triage involves categorizing and prioritizing reported defects based on...
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There was 1 interview round.
RCA involves identifying the root cause of a problem or issue to prevent its recurrence.
Gather relevant data and information related to the issue
Identify possible causes using tools like Fishbone diagram or 5 Whys
Verify the root cause by analyzing data and conducting tests
Develop and implement corrective actions to address the root cause
Monitor the effectiveness of the corrective actions to prevent recurrence
Feedback should be specific, constructive, and timely.
Be specific about what behavior or action needs to be addressed
Provide constructive criticism with suggestions for improvement
Deliver feedback in a timely manner to address issues promptly
Yes, I have worked on 7QC tools including Pareto analysis, cause and effect diagram, and control charts.
Yes, I have experience working with 7QC tools such as Pareto analysis.
I am familiar with cause and effect diagrams for root cause analysis.
I have used control charts to monitor process performance over time.
Seeking new challenges and growth opportunities.
Desire for career advancement
Looking for new challenges
Seeking better work-life balance
Relocation to a new area
Company downsizing or restructuring
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
I applied via Approached by Company and was interviewed in Sep 2024. There was 1 interview round.
Local variables are declared within a method and have limited scope, while instance variables are declared in a class and can be accessed throughout the class.
Local variables are only accessible within the method they are declared in.
Instance variables are accessible throughout the class they are declared in.
Local variables are created when the method is called and destroyed when the method ends.
Instance variables are ...
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
SDLC stands for Software Development Life Cycle, which is a process used by software development teams to design, develop, and test high-quality software.
SDLC is a systematic process for building software applications.
It consists of several phases including planning, analysis, design, implementation, testing, and maintenance.
Each phase has its own set of activities and deliverables to ensure the software meets quality ...
I applied via Company Website and was interviewed in Jun 2024. There was 1 interview round.
Cryptography is the practice and study of techniques for secure communication in the presence of third parties.
Cryptography involves encrypting and decrypting data to ensure confidentiality and integrity.
It uses algorithms and keys to transform plaintext into ciphertext and vice versa.
Examples include AES, RSA, and DES encryption algorithms.
Cryptography is used in securing communication over the internet, digital signa
OWASP top 10 vulnerabilities include injection, broken authentication, sensitive data exposure, etc.
Injection (e.g. SQL injection, LDAP injection)
Broken Authentication (e.g. session management flaws)
Sensitive Data Exposure (e.g. inadequate data protection)
XML External Entities (XXE)
Broken Access Control (e.g. insecure direct object references)
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Us...
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
Automation related questions and manual
I applied via Recruitment Consulltant and was interviewed in Oct 2024. There was 1 interview round.
Technical Executive
3
salaries
| ₹2 L/yr - ₹2.3 L/yr |
TCS
Accenture
Wipro
Cognizant