Filter interviews by
Clear (1)
I applied via Approached by Company and was interviewed before Sep 2023. There were 2 interview rounds.
To export a service from one module to another, you can use dependency injection or module.exports in Node.js.
Use dependency injection to pass the service instance from one module to another
Use module.exports in Node.js to export the service as a module and require it in the other module
Display 25 nodes in a single page with sections divided into 5 nodes each
Create a grid layout with 5 columns and 5 rows
Assign each node to a specific cell in the grid
Use pagination or scroll functionality to navigate through the nodes
Include navigation buttons for easy access to different sections
Top trending discussions
posted on 5 Nov 2021
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Validations used in project
Input validation to ensure correct data type and format
Data validation to ensure data integrity and consistency
Business rule validation to ensure compliance with requirements
Authentication and authorization validation to ensure secure access
Error handling and exception validation to ensure proper handling of errors
Stored procedures are precompiled SQL statements that can be saved and reused in a database.
Stored procedures can improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic and provide a consistent interface to the database.
Parameters can be passed to stored procedures, allowing for dynamic queries.
Examples of stored procedures include ones that retrieve data,
Views in SQL are virtual tables that are based on the result of an SQL statement.
Views are created using the CREATE VIEW statement.
They can be used to simplify complex queries.
They can also be used to restrict access to sensitive data.
Views are updated automatically when the underlying tables are updated.
They can be used to join multiple tables into a single view.
posted on 17 Aug 2024
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
posted on 20 Dec 2024
I applied via Referral and was interviewed before Dec 2023. There were 2 interview rounds.
Selenium is a popular automation testing tool used for web applications.
Supports multiple programming languages like Java, Python, C#, etc.
Can automate web browsers across different platforms.
Allows for parallel test execution.
Integrates with popular CI/CD tools like Jenkins.
Supports various browsers like Chrome, Firefox, Safari, etc.
My salary expectations are based on my experience, skills, and the market rate for Senior Software Engineers.
Research the average salary for Senior Software Engineers in the specific location and industry
Consider your years of experience and relevant skills
Be prepared to negotiate based on the company's offer and benefits package
I applied via Walk-in and was interviewed in Apr 2022. There was 1 interview round.
Insurance is a contract between an individual and an insurance company to provide financial protection against potential losses.
Insurance is a form of risk management
It involves paying a premium to an insurance company in exchange for protection against potential losses
The insurance company agrees to pay out a sum of money if the insured event occurs
Types of insurance include life, health, auto, and home insurance
Market research tools include surveys, focus groups, social media analytics, and competitor analysis.
Surveys: Gather information directly from target audience through questionnaires.
Focus Groups: Conduct discussions with a small group of people to gather insights.
Social Media Analytics: Monitor and analyze social media platforms for consumer trends.
Competitor Analysis: Study competitors' strategies, products, and marke...
posted on 29 Oct 2022
I applied via AmbitionBox and was interviewed in Sep 2022. There were 3 interview rounds.
Realted to SDGs and ESG, rest about my experience in the field of social services.
SDGs are necessary to achieve sustainable development globally. ESG refers to environmental, social, and governance factors that impact a company's performance.
SDGs are a set of 17 goals established by the United Nations to end poverty, protect the planet, and ensure prosperity for all.
ESG factors are becoming increasingly important for investors as they consider a company's impact on the environment, society, and gove...
posted on 12 Feb 2024
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 20 May 2021
Questions related to software development concepts and technologies.
Class is a blueprint for creating objects in Java.
Object is an instance of a class.
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction.
Struts is a framework for developing Java web applications.
Database DDL commands are used to define database schema, while DML commands are used to manipulate data.
System testing is a type of...
based on 1 interview
Interview experience
Center Head
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Portfolio Manager
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Intern
4
salaries
| ₹0 L/yr - ₹0 L/yr |
World Health Organization
UNICEF
The World Bank
International Monetary Fund