Filter interviews by
Drones work by using remote control or autonomous systems to fly and perform tasks. Managing protests in depots involves communication, de-escalation, and potentially involving law enforcement.
Drones can be controlled remotely by a pilot or autonomously using pre-programmed flight paths.
They typically use GPS for navigation and may have cameras or sensors for tasks like surveillance or delivery.
Managing protests in dep...
It was about agriculture current affairs
Top trending discussions
I applied via Referral and was interviewed before Aug 2021. There were 2 interview rounds.
posted on 11 Oct 2020
Server side state management is the process of storing and managing data on the server side of a web application.
It involves storing data on the server instead of the client side
It helps maintain consistency and security of data
Examples include session management and database management
Page life cycle refers to the series of events that occur between the time a user requests a web page and the time the page is rendered on the user's browser.
Page life cycle consists of several stages such as initialization, loading, rendering, and unloading.
During initialization, the page is created and controls are initialized.
During loading, the page is loaded with data and controls are populated.
During rendering, t...
CLR stands for Common Language Runtime, a component of .NET framework that manages execution of .NET programs.
CLR is responsible for memory management, security, and exception handling.
It compiles code into an intermediate language (IL) and then executes it.
CLR allows for language interoperability, meaning that code written in different languages can be compiled to the same IL and run on the same runtime.
Examples of la...
posted on 20 May 2021
Questions related to software development concepts and technologies.
Class is a blueprint for creating objects in Java.
Object is an instance of a class.
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction.
Struts is a framework for developing Java web applications.
Database DDL commands are used to define database schema, while DML commands are used to manipulate data.
System testing is a type of...
I want to join the UNCCD to contribute to global efforts in combating desertification and promoting sustainable land management.
Passion for environmental sustainability: I believe in protecting ecosystems and biodiversity.
Desire to work on global issues: The UNCCD addresses critical challenges like land degradation and climate change.
Interest in policy-making: I want to be involved in developing strategies that promote...
I applied via Internshala and was interviewed before Jun 2022. There were 4 interview rounds.
The interview process may include a technical round to assess skills and a manager round for cultural fit and team dynamics.
Technical Round: Focuses on specific skills and knowledge relevant to the analyst role, such as data analysis or programming.
Example: You might be asked to analyze a dataset and present your findings using statistical tools.
Manager Round: Evaluates soft skills, teamwork, and alignment with company...
Ppt Wireframing workflow and decision making
posted on 21 Sep 2022
I applied via Approached by Company and was interviewed in Aug 2022. There were 3 interview rounds.
posted on 23 Feb 2024
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
To create a web page
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
based on 1 interview experience
Manager
29
salaries
| ₹8.9 L/yr - ₹16 L/yr |
Technical Assistant
17
salaries
| ₹5.1 L/yr - ₹8.7 L/yr |
Data Entry Operator
16
salaries
| ₹1.2 L/yr - ₹3 L/yr |
Accounts Manager
12
salaries
| ₹10 L/yr - ₹16.5 L/yr |
Cost Trainee
11
salaries
| ₹1.5 L/yr - ₹2.2 L/yr |
Government of Bihar
Ministry of Home Affairs
World Health Organization
Gujarat State Electricity Corporation