Filter interviews by
Clear (1)
I was interviewed before Feb 2024.
Presentations on Stakeholder management
Scenario based presentation
Top trending discussions
I applied via Referral and was interviewed before Aug 2022. There were 3 interview rounds.
Yes, aggregate functions can be used with HAVING and WHERE clauses. WHERE filters rows before grouping, HAVING filters groups after grouping.
Aggregate functions can be used with HAVING clause to filter groups based on the result of the aggregate function.
Aggregate functions can also be used with WHERE clause to filter rows before grouping.
WHERE clause filters rows before grouping, while HAVING clause filters groups aft...
The order of execution of a SQL query is: FROM, WHERE, GROUP BY, HAVING, SELECT, ORDER BY.
FROM: Specifies the tables involved in the query
WHERE: Filters the rows based on specified conditions
GROUP BY: Groups the rows that have the same values into summary rows
HAVING: Filters the groups based on specified conditions
SELECT: Selects the columns to be displayed in the result set
ORDER BY: Sorts the result set based on speci
User Defined Functions, Stored Procedures, and Triggers are database objects used to perform specific tasks in database management systems.
User Defined Functions are custom functions created by users to perform specific calculations or operations in a database.
Stored Procedures are precompiled SQL statements that can be executed by calling the procedure name.
Triggers are special types of stored procedures that are auto...
Gave some scenario based questions
Case study walkthrough
posted on 18 Jul 2024
I applied via Company Website and was interviewed in Jun 2024. There was 1 interview round.
To assign an IP address to a Windows PC, you can do so through the network settings.
Go to Control Panel > Network and Sharing Center
Click on Change adapter settings
Right-click on the network connection you want to assign an IP address to and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties
Choose 'Use the following IP address' and enter the IP address, subnet mask, default gateway,
When browsing a website, various components work at the backend to deliver content and functionality.
Web server processes requests and serves web pages
Database stores and retrieves data
Application server executes application logic
Content delivery network (CDN) may cache and deliver content
Load balancer distributes incoming traffic to multiple servers
Web browser renders the content for the user
posted on 14 Nov 2024
Ransomware is a type of malware that encrypts a user's files and demands payment in exchange for the decryption key.
Ransomware is typically spread through phishing emails, malicious websites, or software vulnerabilities.
Once a user's files are encrypted, the ransomware will display a message demanding payment in cryptocurrency.
Paying the ransom does not guarantee that the files will be decrypted, and it may encourage f...
posted on 8 Dec 2024
During the lockdown, I focused on enhancing my technical skills and learning new technologies.
Took online courses and certifications to improve my knowledge in areas like networking and troubleshooting
Participated in virtual workshops and webinars to stay updated with the latest industry trends
Practiced troubleshooting scenarios on virtual machines to sharpen my problem-solving abilities
Contributed to online technical ...
As a Technical Support Engineer, my day is spent troubleshooting and resolving technical issues for customers.
I start my day by checking emails and responding to any urgent customer inquiries.
I prioritize and manage my workload, addressing high-priority issues first.
I collaborate with other team members to share knowledge and seek assistance when needed.
I troubleshoot technical problems reported by customers, analyzing...
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
To find a loop in a linked list, we use Floyd's cycle-finding algorithm.
Floyd's cycle-finding algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop in the linked list, the two pointers will eventually meet.
To detect the meeting point, we reset one of the pointers to the head of the linked list and move both pointers at the same speed.
The meeting point is the start of the loop.
LRU, MRU and LFU are caching algorithms used to manage memory in computer systems.
LRU stands for Least Recently Used and removes the least recently used items from the cache when the cache is full.
MRU stands for Most Recently Used and removes the most recently used items from the cache when the cache is full.
LFU stands for Least Frequently Used and removes the least frequently used items from the cache when the cache i...
posted on 7 May 2017
I was interviewed in Feb 2017.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Technical Support Engineer
105
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
87
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Security Engineer
68
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
42
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer III
33
salaries
| ₹0 L/yr - ₹0 L/yr |
QUICK HEAL TECHNOLOGIES
Trend Micro
McAfee
Gen