Filter interviews by
Clear (1)
posted on 19 Sep 2024
I applied via Company Website and was interviewed in Aug 2024. There were 2 interview rounds.
Top trending discussions
During the lockdown, I focused on enhancing my technical skills and learning new technologies.
Took online courses and certifications to improve my knowledge in areas like networking and troubleshooting
Participated in virtual workshops and webinars to stay updated with the latest industry trends
Practiced troubleshooting scenarios on virtual machines to sharpen my problem-solving abilities
Contributed to online technical ...
As a Technical Support Engineer, my day is spent troubleshooting and resolving technical issues for customers.
I start my day by checking emails and responding to any urgent customer inquiries.
I prioritize and manage my workload, addressing high-priority issues first.
I collaborate with other team members to share knowledge and seek assistance when needed.
I troubleshoot technical problems reported by customers, analyzing...
posted on 8 Dec 2024
posted on 18 Jul 2024
I applied via Company Website and was interviewed in Jun 2024. There was 1 interview round.
To assign an IP address to a Windows PC, you can do so through the network settings.
Go to Control Panel > Network and Sharing Center
Click on Change adapter settings
Right-click on the network connection you want to assign an IP address to and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties
Choose 'Use the following IP address' and enter the IP address, subnet mask, default gateway,
When browsing a website, various components work at the backend to deliver content and functionality.
Web server processes requests and serves web pages
Database stores and retrieves data
Application server executes application logic
Content delivery network (CDN) may cache and deliver content
Load balancer distributes incoming traffic to multiple servers
Web browser renders the content for the user
posted on 14 Nov 2024
Ransomware is a type of malware that encrypts a user's files and demands payment in exchange for the decryption key.
Ransomware is typically spread through phishing emails, malicious websites, or software vulnerabilities.
Once a user's files are encrypted, the ransomware will display a message demanding payment in cryptocurrency.
Paying the ransom does not guarantee that the files will be decrypted, and it may encourage f...
I applied via Naukri.com and was interviewed before May 2023. There were 3 interview rounds.
Multiple question math GK reasoning etc
String is mutable which mean one values assign then it can not change It create new object every execute String builder is immutable its values is changes dynamically means it can not create new object
Select *from table1,table and execute result Join queres
JavaScript anonymous functions in jQuery are used to create functions without a name, while JavaScript functions are named functions.
JavaScript functions are named and can be reused multiple times.
jQuery anonymous functions are used for event handling and callbacks.
JavaScript functions can be defined using the function keyword, while jQuery anonymous functions are created using the $ symbol.
Constructor type casting involves converting one data type to another in a constructor.
Constructor type casting is used to convert one data type to another in a constructor.
It can be done implicitly or explicitly depending on the languages.
For example, in Java, you can explicitly cast a data type in a constructor like this: int num = (int) doubleNum;
Reverse a string in C# without using built-in features
Create a character array from the input string
Use two pointers to swap characters at the beginning and end of the array
Continue swapping until the pointers meet in the middle
Sql queries and c# coding
Code a revised string by replacing certain characters with specified values.
Create a function that takes in a string and an array of replacement values
Iterate through the string and replace characters based on the replacement values
Return the revised string
A program for polymer involves creating a code to model the behavior of polymer chains.
Define the structure of a polymer chain using classes or data structures
Implement functions to simulate polymer chain movement and interactions
Consider factors like chain length, bond angles, and energy levels in the simulation
I applied via Naukri.com and was interviewed before Jun 2023. There was 1 interview round.
Mixin is a way to reuse code in multiple classes by including the code in another class.
Mixin allows for code reuse by combining methods and attributes from multiple classes into a single class.
It helps in avoiding code duplication and promotes modular design.
An example of mixin is a class 'Logger' that contains logging methods and can be included in other classes to enable logging functionality.
Assets pipeline in Rails is a feature that helps manage and compile assets like CSS, JavaScript, and images for a Rails application.
The assets pipeline in Rails combines and minifies assets to improve performance.
It allows for easy organization and management of assets in a Rails project.
By default, Rails uses Sprockets as the assets pipeline to handle asset compilation and management.
You can customize the assets pipel...
Please pose a question related to Python and also write a Python program, in addition to inquiring about Django.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Technical Support Engineer
105
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
87
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Security Engineer
68
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
42
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer III
33
salaries
| ₹0 L/yr - ₹0 L/yr |
QUICK HEAL TECHNOLOGIES
Trend Micro
McAfee
Gen