Filter interviews by
Clear (1)
I was interviewed before Feb 2024.
Top trending discussions
During the lockdown, I focused on enhancing my technical skills and learning new technologies.
Took online courses and certifications to improve my knowledge in areas like networking and troubleshooting
Participated in virtual workshops and webinars to stay updated with the latest industry trends
Practiced troubleshooting scenarios on virtual machines to sharpen my problem-solving abilities
Contributed to online technical ...
As a Technical Support Engineer, my day is spent troubleshooting and resolving technical issues for customers.
I start my day by checking emails and responding to any urgent customer inquiries.
I prioritize and manage my workload, addressing high-priority issues first.
I collaborate with other team members to share knowledge and seek assistance when needed.
I troubleshoot technical problems reported by customers, analyzing...
posted on 8 Dec 2024
posted on 18 Jul 2024
I applied via Company Website and was interviewed in Jun 2024. There was 1 interview round.
To assign an IP address to a Windows PC, you can do so through the network settings.
Go to Control Panel > Network and Sharing Center
Click on Change adapter settings
Right-click on the network connection you want to assign an IP address to and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties
Choose 'Use the following IP address' and enter the IP address, subnet mask, default gateway,
When browsing a website, various components work at the backend to deliver content and functionality.
Web server processes requests and serves web pages
Database stores and retrieves data
Application server executes application logic
Content delivery network (CDN) may cache and deliver content
Load balancer distributes incoming traffic to multiple servers
Web browser renders the content for the user
posted on 14 Nov 2024
Ransomware is a type of malware that encrypts a user's files and demands payment in exchange for the decryption key.
Ransomware is typically spread through phishing emails, malicious websites, or software vulnerabilities.
Once a user's files are encrypted, the ransomware will display a message demanding payment in cryptocurrency.
Paying the ransom does not guarantee that the files will be decrypted, and it may encourage f...
Arithmetic questions and logical
I applied via Naukri.com and was interviewed in Mar 2024. There were 3 interview rounds.
15 questions Asked from related technology 5 from English 5 from math and 10 from misllenious.
Some questions asked theoretical and 4 questions based on coding 2 questions related to string manipulation and others 2 was python class based questions.
I was responsible for developing and maintaining software applications for the company.
Developed new features and functionalities for existing software applications
Fixed bugs and issues in the software
Collaborated with team members to design and implement solutions
Participated in code reviews and testing processes
Yes, I am available to join immediately.
I am available to start immediately
I can join as soon as needed
I have no prior commitments that would prevent me from starting right away
I applied via Naukri.com and was interviewed before Feb 2023. There were 3 interview rounds.
List sort, list comprehension, dacorators, middleware, django orm
I applied via Naukri.com and was interviewed before Feb 2023. There were 2 interview rounds.
Middleware is software that acts as a bridge between different applications or components, handling requests and responses.
Middleware is a layer of software that sits between different applications or components, facilitating communication and data exchange.
It can handle tasks such as authentication, logging, error handling, and data transformation.
Middleware can be used to modify or enhance the request or response bef...
List is mutable and can be modified, while tuple is immutable and cannot be changed.
List is defined using square brackets [], while tuple is defined using parentheses ().
Elements in a list can be modified, added, or removed, while elements in a tuple cannot be changed once defined.
Lists are typically used for collections of similar items that need to be modified, while tuples are used for fixed collections of items.
Exa...
Decorators are functions that modify the behavior of other functions or methods.
Decorators are used to add functionality to existing functions without modifying their code.
They are commonly used in Python to modify the behavior of functions or classes.
Examples include @staticmethod, @classmethod, and @property decorators in Python.
There are four main principles of Object-Oriented Programming: Inheritance, Encapsulation, Abstraction, and Polymorphism.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Abstraction: Hiding the complex implementation details and showing only the necessary features of an object.
Polymorphism: Allows objec...
A decorator is a design pattern that allows behavior to be added to individual objects, either statically or dynamically.
Decorators are used to add new functionality to an existing object without altering its structure.
They are commonly used in Python to modify the behavior of functions or methods.
Decorators are implemented using the @ symbol followed by the decorator function name.
Fibonacci sequence using recursion is a classic problem in programming.
Define a recursive function that takes an integer n as input
Base case: if n is 0 or 1, return n
Recursive case: return the sum of the previous two Fibonacci numbers
based on 1 interview
Interview experience
Technical Support Engineer
105
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
87
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Security Engineer
68
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
42
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer III
33
salaries
| ₹0 L/yr - ₹0 L/yr |
QUICK HEAL TECHNOLOGIES
Trend Micro
McAfee
Gen