Filter interviews by
I applied via Company Website and was interviewed before Jul 2022. There were 4 interview rounds.
Which is the first electronic spreadsheet
DIB stands for Device-Independent Bitmap. It is a file format used for storing raster graphics images.
DIB is a bitmap file format that stores pixel data in a device-independent way.
It allows images to be displayed on different types of devices without losing quality.
DIB files can be created and edited using various image editing software.
Common file extensions for DIB files include .bmp and .dib.
The correct pair is QWERTY and keyboard.
QWERTY is a common keyboard layout
Keyboard is the physical input device used to type on a computer
The first generation of computers refers to the period from the 1940s to the early 1950s when vacuum tube technology was used.
Vacuum tube technology was used in first generation computers.
These computers were very large and consumed a lot of power.
They were primarily used for calculations and data processing.
Examples include ENIAC, UNIVAC, and EDVAC.
RAM (Random Access Memory) is the volatile memory in a computer system.
RAM loses its data when the power is turned off
RAM is used for storing data that is currently being used by the computer's processor
Examples of volatile memory include DRAM and SRAM
Output devices are used to display information from a computer or electronic device.
Monitors
Printers
Speakers
Projectors
A column heading in calc is represented using a letter or word that identifies the content of the column.
Column headings are typically placed at the top of a column in a table or spreadsheet.
They help users understand the data in each column.
Examples: 'Name', 'Age', 'Gender'
The fastest memory is the CPU cache.
CPU cache is faster than RAM and storage devices
It stores frequently accessed data for quick access by the CPU
Examples include L1, L2, and L3 cache in modern processors
The first various versions of Windows were released in the 1980s and 1990s.
Windows 1.0 was released in 1985
Windows 3.0 was released in 1990
Windows 95 was released in 1995
F2 is the shortcut key used to rename a file in Windows.
Press F2 key on the keyboard to rename a file in Windows Explorer
Alternatively, right-click on the file and select 'Rename' from the context menu
Ensure the file is not currently open in any program before renaming
The numbering options can be found in the 'Format' menu.
The numbering options are typically located under the 'Format' menu.
Look for options such as 'Numbered List' or 'Bullets and Numbering' within the 'Format' menu.
You may also find submenus or dropdowns within the 'Format' menu for more specific numbering styles.
Ctrl + Z is the shortcut key for undo.
Press Ctrl key and Z key simultaneously to undo the last action.
This shortcut is commonly used in various software applications like Microsoft Word, Excel, and Photoshop.
Find replace options can be found in the Edit menu.
Edit menu contains find replace options
Commonly used in word processing software like Microsoft Word
To become a lead software architect and contribute to cutting-edge technology advancements.
Continuously improve technical skills and knowledge through learning new technologies and tools.
Work on challenging projects that allow for growth and development in the field.
Lead a team of developers to successfully deliver innovative software solutions.
Contribute to open-source projects to give back to the community and stay e
Short term log refers to logs that are stored temporarily for a brief period of time.
Short term logs are typically used for debugging purposes.
They are not stored for long periods of time to save storage space.
Examples include temporary logs used to track a specific issue during development.
Top trending discussions
posted on 5 Nov 2021
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Validations used in project
Input validation to ensure correct data type and format
Data validation to ensure data integrity and consistency
Business rule validation to ensure compliance with requirements
Authentication and authorization validation to ensure secure access
Error handling and exception validation to ensure proper handling of errors
Stored procedures are precompiled SQL statements that can be saved and reused in a database.
Stored procedures can improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic and provide a consistent interface to the database.
Parameters can be passed to stored procedures, allowing for dynamic queries.
Examples of stored procedures include ones that retrieve data,
Views in SQL are virtual tables that are based on the result of an SQL statement.
Views are created using the CREATE VIEW statement.
They can be used to simplify complex queries.
They can also be used to restrict access to sensitive data.
Views are updated automatically when the underlying tables are updated.
They can be used to join multiple tables into a single view.
posted on 26 Feb 2023
posted on 4 Jun 2022
posted on 23 Feb 2024
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
To create a web page
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 19 Jan 2025
Reverse the string, Reverse of an array, Data base related queries
posted on 17 Aug 2024
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
posted on 20 Dec 2024
I applied via Referral and was interviewed before Dec 2023. There were 2 interview rounds.
Selenium is a popular automation testing tool used for web applications.
Supports multiple programming languages like Java, Python, C#, etc.
Can automate web browsers across different platforms.
Allows for parallel test execution.
Integrates with popular CI/CD tools like Jenkins.
Supports various browsers like Chrome, Firefox, Safari, etc.
My salary expectations are based on my experience, skills, and the market rate for Senior Software Engineers.
Research the average salary for Senior Software Engineers in the specific location and industry
Consider your years of experience and relevant skills
Be prepared to negotiate based on the company's offer and benefits package
based on 2 interviews
Interview experience
based on 12 reviews
Rating in categories
fresher
4
salaries
| ₹2 L/yr - ₹2.5 L/yr |
Teacher
3
salaries
| ₹0.4 L/yr - ₹4.5 L/yr |
Ministry of Home Affairs
Government of India
National Informatics Centre
Ministry of Defence