Filter interviews by
My next career goal is to gain hands-on experience in my field, develop my skills, and contribute meaningfully to my team.
I aim to secure a full-time position after my internship, where I can apply my knowledge and skills.
I plan to pursue certifications relevant to my field, such as a project management certification to enhance my capabilities.
I want to take on leadership roles in projects to develop my teamwork and co...
I want to join the UNCCD to contribute to global efforts in combating desertification and promoting sustainable land management.
Passion for environmental sustainability: I believe in protecting ecosystems and biodiversity.
Desire to work on global issues: The UNCCD addresses critical challenges like land degradation and climate change.
Interest in policy-making: I want to be involved in developing strategies that promote...
I applied via Referral and was interviewed before Aug 2021. There were 2 interview rounds.
Top trending discussions
posted on 17 Aug 2024
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
I expect a competitive salary based on my skills, experience, and industry standards.
Research industry standards: For example, Glassdoor or Payscale can provide insights into average salaries for similar roles.
Consider my experience level: With 5 years of experience, I would expect a salary in the range of $80,000 to $100,000.
Factor in location: Salaries can vary significantly based on the cost of living in different c...
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
posted on 5 Nov 2021
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Validations used in project
Input validation to ensure correct data type and format
Data validation to ensure data integrity and consistency
Business rule validation to ensure compliance with requirements
Authentication and authorization validation to ensure secure access
Error handling and exception validation to ensure proper handling of errors
Stored procedures are precompiled SQL statements that can be saved and reused in a database.
Stored procedures can improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic and provide a consistent interface to the database.
Parameters can be passed to stored procedures, allowing for dynamic queries.
Examples of stored procedures include ones that retrieve data, ...
Views in SQL are virtual tables that are based on the result of an SQL statement.
Views are created using the CREATE VIEW statement.
They can be used to simplify complex queries.
They can also be used to restrict access to sensitive data.
Views are updated automatically when the underlying tables are updated.
They can be used to join multiple tables into a single view.
posted on 22 Oct 2022
I applied via Walk-in and was interviewed before Oct 2021. There were 3 interview rounds.
Nice environment for interview
I am detail-oriented and a strong communicator, but I can be overly critical of my work at times.
Positive Point: Detail-oriented - I ensure that every aspect of my code is clean and well-documented, which helps in team collaboration.
Positive Point: Strong communicator - I actively engage with team members to clarify requirements and provide updates on project progress.
Negative Point: Overly critical - I sometimes spend...
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
I am a passionate Java Full Stack Developer with a strong foundation in Java, Spring, and front-end technologies like React.
Educational Background: I hold a degree in Computer Science, where I developed a solid understanding of software development principles.
Technical Skills: Proficient in Java, Spring Boot for backend development, and React for building dynamic user interfaces.
Project Experience: Developed a full-sta...
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 1 Oct 2024
I applied via Company Website and was interviewed before Oct 2023. There was 1 interview round.
I have experience with a variety of tools commonly used in DevOps, including Jenkins, Docker, Kubernetes, Ansible, and Git.
Proficient in Jenkins for continuous integration and continuous deployment
Familiar with Docker for containerization of applications
Experience with Kubernetes for container orchestration
Skilled in Ansible for configuration management and automation
Proficient in Git for version control and collaborat...
posted on 11 Oct 2020
Server side state management is the process of storing and managing data on the server side of a web application.
It involves storing data on the server instead of the client side
It helps maintain consistency and security of data
Examples include session management and database management
Page life cycle refers to the series of events that occur between the time a user requests a web page and the time the page is rendered on the user's browser.
Page life cycle consists of several stages such as initialization, loading, rendering, and unloading.
During initialization, the page is created and controls are initialized.
During loading, the page is loaded with data and controls are populated.
During rendering, t...
The components of .NET include the Common Language Runtime, Framework Class Library, and ASP.NET.
Common Language Runtime (CLR) - manages memory, security, and execution of code
Framework Class Library (FCL) - collection of reusable classes, interfaces, and value types
ASP.NET - web application framework for building dynamic web pages and web services
Cookies are small text files stored on a user's computer by a website to remember user preferences and login information.
Cookies are used to track user activity on a website
They can be used to store user preferences and login information
Cookies can be either session cookies or persistent cookies
Session cookies are deleted when the user closes their browser
Persistent cookies remain on the user's computer until they expi...
CLR stands for Common Language Runtime, a component of .NET framework that manages execution of .NET programs.
CLR is responsible for memory management, security, and exception handling.
It compiles code into an intermediate language (IL) and then executes it.
CLR allows for language interoperability, meaning that code written in different languages can be compiled to the same IL and run on the same runtime.
Examples of la...
posted on 20 May 2021
Questions related to software development concepts and technologies.
Class is a blueprint for creating objects in Java.
Object is an instance of a class.
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction.
Struts is a framework for developing Java web applications.
Database DDL commands are used to define database schema, while DML commands are used to manipulate data.
System testing is a type of...
I applied via Internshala and was interviewed before Jun 2022. There were 4 interview rounds.
Quality Council of India is a government body established to promote and sustain quality in all spheres of economic and social life.
Established in 1997 by the Government of India
Operates under the Ministry of Commerce and Industry
Promotes quality standards and certifications across various sectors
Provides training and consultancy services to improve quality management practices
Works with organizations to enhance their ...
The interview process may include a technical round to assess skills and a manager round for cultural fit and team dynamics.
Technical Round: Focuses on specific skills and knowledge relevant to the analyst role, such as data analysis or programming.
Example: You might be asked to analyze a dataset and present your findings using statistical tools.
Manager Round: Evaluates soft skills, teamwork, and alignment with company...
based on 1 interview experience
based on 1 review
Rating in categories
Consultant
7
salaries
| ₹12.4 L/yr - ₹25 L/yr |
Center Head
6
salaries
| ₹3.6 L/yr - ₹15.1 L/yr |
Software Developer
4
salaries
| ₹13 L/yr - ₹18 L/yr |
Portfolio Manager
4
salaries
| ₹50 L/yr - ₹51 L/yr |
Programme Officer
4
salaries
| ₹6 L/yr - ₹30 L/yr |
Government of India
National Informatics Centre
Csc E Governance Services
Central Reserve Police Force