Filter interviews by
posted on 27 Oct 2021
I applied via Walk-in and was interviewed in Sep 2021. There were 3 interview rounds.
Spur and helical gears are two types of gears used in mechanical systems.
Spur gears have straight teeth and are used for low-speed applications.
Helical gears have angled teeth and are used for high-speed applications.
Spur gears are more efficient but produce more noise than helical gears.
Helical gears have a smoother operation and can handle more load than spur gears.
Both types of gears are commonly used in industrial
Assembly of fasteners involves selecting the appropriate fasteners and tools, aligning the parts to be joined, and tightening the fasteners to the correct torque.
Select appropriate fasteners based on material, size, and strength requirements
Use proper tools such as wrenches, sockets, and torque wrenches
Align parts to be joined to ensure proper fit and prevent damage
Tighten fasteners to the correct torque to ensure prop...
Top trending discussions
I applied via Company Website and was interviewed in Sep 2024. There were 4 interview rounds.
Simple aptitude qyestions
! simple and 1 medium levelleetcode questions
I excel as an individual contributor and transition smoothly into a team lead role by leveraging my technical expertise and leadership skills.
Demonstrate strong technical skills and consistently deliver high-quality work as an individual contributor.
Proactively seek opportunities to mentor and guide team members, showcasing leadership potential.
Communicate effectively with team members, fostering collaboration and driv...
posted on 14 Oct 2024
Good but noT bad but also it consists of good questions
They had asked me anagrams,linked list,doubly linked list
I applied via Naukri.com and was interviewed in Mar 2024. There were 4 interview rounds.
Java8 Stream program to filter even numbers and double them
Use Stream to filter even numbers
Use map to double the filtered numbers
Use collect to collect the results into a list
I applied via Walk-in and was interviewed in Aug 2024. There was 1 interview round.
I applied via Job Portal and was interviewed in Oct 2023. There was 1 interview round.
Yes
LiveData is lifecycle aware and can be used to observe changes in data.
ViewModel provides a way to store and manage UI-related data across configuration changes.
ViewModel can hold LiveData objects to provide data to the UI.
LiveData and ViewModel work together to ensure data consistency and prevent memory leaks.
The ViewModel survives configuration changes by being retained by the system.
ViewModels are designed to survive configuration changes like screen rotations or language changes.
When an activity is destroyed and recreated, the ViewModel is not destroyed and retains its data.
The ViewModel is associated with the activity's lifecycle and is retained until the activity is finished.
The retained ViewModel instance can be acces...
MVP offers better separation of concerns and easier unit testing compared to MVC.
MVP separates the presentation layer from the business logic, making it easier to maintain and modify the codebase.
MVP allows for easier unit testing as the presenter can be tested independently from the view.
MVP provides better decoupling between components, enabling easier code reuse and scalability.
MVP promotes a clear separation of con...
SSL pinning is a security technique that ensures a client only communicates with a server using a pre-defined public key.
SSL pinning involves hardcoding the server's public key in the client's code or configuration.
During the SSL handshake, the client checks if the server's public key matches the pinned key.
If the keys match, the connection is established; otherwise, it is rejected.
Pinning prevents man-in-the-middle at
Data security can be achieved through encryption, access controls, backups, and regular security audits.
Encrypt sensitive data using strong encryption algorithms.
Implement access controls to restrict unauthorized access to the data.
Regularly backup the data to prevent data loss.
Conduct regular security audits to identify and fix vulnerabilities.
Use secure protocols and communication channels for data transfer.
Implement...
Encryption keys should be securely stored in a separate key management system.
Encryption keys should not be stored alongside the encrypted data.
Use a dedicated key management system (KMS) to store and manage encryption keys.
Implement strong access controls and authentication mechanisms for the KMS.
Consider using hardware security modules (HSMs) for added security.
Regularly rotate encryption keys to minimize the impact
based on 3 reviews
Rating in categories
Mechanical Engg. Design
5
salaries
| ₹2.4 L/yr - ₹5.2 L/yr |
Quality Engineer
5
salaries
| ₹0.5 L/yr - ₹5 L/yr |
Electrical Design Engineer
4
salaries
| ₹3 L/yr - ₹3.6 L/yr |
Manager Erection Commisioning Aftersales
4
salaries
| ₹4.2 L/yr - ₹6 L/yr |
Electrical Supervisor
3
salaries
| ₹2.5 L/yr - ₹3.4 L/yr |
Cognizant
Teleperformance
Reliance Retail
iEnergizer