i
Solugenix India Private Limited
Filter interviews by
I applied via Naukri.com
To find root cause of invoice rejection for client
Analyze the invoice submission process
Check for errors in the invoice
Review client's invoice acceptance criteria
Investigate communication breakdowns between client and vendor
Identify any system or process issues causing rejection
Collaborate with relevant stakeholders to resolve issues
Top trending discussions
I applied via Campus Placement and was interviewed before Feb 2023. There was 1 interview round.
Coding Questions on one of the preffered programming language. Most importantly Data Structures and algorithms.
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
I applied via Approached by Company and was interviewed before Sep 2021. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Dec 2020. There was 1 interview round.
Integration, middleware, and EAI systems are technologies that enable communication and data exchange between different software applications.
Integration involves connecting different software applications to enable data exchange and communication.
Middleware is software that sits between different applications and facilitates communication and data exchange.
EAI (Enterprise Application Integration) systems are a type of...
I applied via Naukri.com and was interviewed in May 2021. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Feb 2021. There were 3 interview rounds.
C language has various topics including data types, control structures, functions, arrays, pointers, structures, and file handling.
Data types - int, float, char, double, etc.
Control structures - if-else, switch-case, loops, etc.
Functions - user-defined functions, library functions, etc.
Arrays - one-dimensional, multi-dimensional, etc.
Pointers - pointer variables, pointer arithmetic, etc.
Structures - user-defined data t...
The type qualifier volatile is used to indicate that a variable's value may change unexpectedly.
The volatile qualifier is used when a variable can be modified by external factors that are beyond the control of the program.
It is commonly used when accessing hardware registers or shared memory in multi-threaded environments.
The const qualifier is used to indicate that a variable's value cannot be modified once it is assi...
Storage classes are keywords in C programming that define the scope and lifetime of variables.
There are four storage classes in C: auto, register, static, and extern.
Auto variables are local to a function and have a default value of garbage.
Register variables are stored in CPU registers for faster access.
Static variables retain their value between function calls.
Extern variables are declared outside of any function and...
Code to reverse words in a string
Split the string into an array of words
Loop through the array and reverse each word
Join the reversed words back into a string
The computer starts by executing the BIOS, which initializes hardware and loads the operating system.
When the power button is pressed, the computer sends a signal to the power supply to turn on.
The BIOS (Basic Input/Output System) is then executed, which performs a Power-On Self Test (POST) to check hardware components.
The BIOS then loads the boot loader from the hard drive or other bootable device.
The boot loader then...
A process is an instance of a program while a thread is a lightweight process that can run concurrently with other threads.
A process is a program in execution
A process has its own memory space and system resources
A thread is a subset of a process
A thread shares the same memory space and system resources as its parent process
Multiple threads can run concurrently within a single process
System call is a request made by a program to the operating system for a service or resource.
System calls provide an interface between a program and the operating system.
They allow programs to perform tasks such as reading and writing files, creating new processes, and managing memory.
Examples of system calls include open(), read(), write(), fork(), and exec().
I applied via Naukri.com and was interviewed in Jun 2021. There was 1 interview round.
Software Engineer
70
salaries
| ₹3.5 L/yr - ₹12 L/yr |
Senior System Analyst
62
salaries
| ₹9.4 L/yr - ₹18 L/yr |
Senior Software Engineer
51
salaries
| ₹7.8 L/yr - ₹26 L/yr |
System Analyst
51
salaries
| ₹4.7 L/yr - ₹16 L/yr |
Lead System Analyst
48
salaries
| ₹11.5 L/yr - ₹24.7 L/yr |
Apisero
Actalent Services
Cyber Infrastructure
TestingXperts