Faster and better experience!
i
Teamware
Solutions
Filter interviews by
Security measures for Azure cloud services include network security groups, encryption, multi-factor authentication, and regular security audits.
Implement network security groups to control inbound and outbound traffic to virtual machines
Enable encryption at rest and in transit to protect data
Utilize multi-factor authentication for added security when accessing resources
Regularly conduct security audits and assess...
Joins in SQL are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
Syntax for joins typically involves specifying the tables to join, the columns to join on, and any additional conditions
Transform message is a Mule component used to modify the payload of a message during integration.
Transform message can be used to change the structure or format of the data in a message
It can be used to extract specific data from a message and map it to a different field
Transform message can also be used to enrich the message by adding additional information
Examples: converting XML to JSON, extracting data from a ...
I have completed 10 implementations and 15 support projects.
I have experience in both implementation and support projects.
I have completed 10 implementations successfully.
I have also worked on 15 support projects.
I have experience in handling various issues and providing solutions.
I have worked with different clients and industries.
OSI and TCP models are networking models used to standardize communication between devices on a network.
OSI model has 7 layers and TCP model has 4 layers
OSI model is a theoretical model while TCP model is a practical model
OSI model is used for understanding and designing networks while TCP model is used for actual communication
Examples of layers in OSI model: Physical, Data Link, Network, Transport, Session, Prese...
A burn up chart is a visual representation of work completed over time, showing progress towards a goal.
Shows how much work has been completed over time
Displays progress towards a goal
Compares actual progress to expected progress
Helps identify if a project is on track or falling behind
Can be used in agile project management
Defect life cycle is the process of identifying, reporting, fixing, and verifying defects in software development.
Defect is identified by testers during testing
Defect is reported to development team
Development team fixes the defect
Fixed defect is verified by testers
If defect is not fixed, it goes back to development team
If defect is fixed, it is closed
Agile and Waterfall are two different software development methodologies.
Agile is iterative and flexible, while Waterfall is linear and rigid.
Agile emphasizes collaboration and customer feedback, while Waterfall focuses on documentation and planning.
Agile is better suited for projects with changing requirements, while Waterfall is better for projects with well-defined requirements.
Agile allows for continuous deliv...
I appeared for an interview in Apr 2025, where I was asked the following questions.
Movement type 701 is used for goods issue for sales order
Movement type 701 is used to post goods issue for sales order
It reduces the stock quantity in the system
It is typically used in the context of delivering goods to customers against sales orders
Aptitude and coding logis asked
Few coding questions and MCQ based
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters network traffic based on rules set by the administrator
Helps prevent unauthorized access to or from a private network
Examples include hardware firewalls, software firewalls, and cloud-base...
A proxy is an intermediary server that acts as a gateway between a user and the internet, providing anonymity and security.
A proxy server can be used to access websites anonymously by masking the user's IP address.
Proxies can also be used to bypass geo-restrictions on certain websites or services.
There are different types of proxies such as HTTP proxies, SOCKS proxies, and transparent proxies.
I applied via Naukri.com and was interviewed before May 2021. There were 4 interview rounds.
Experienced IT Recruiter with a passion for connecting top talent with leading tech companies.
Over 5 years of experience in IT recruitment
Strong understanding of technical roles and requirements
Proven track record of successfully placing candidates in top tech companies
Excellent communication and negotiation skills
Passionate about building relationships and networking within the tech industry
Key responsibility in my experience is sourcing, screening, and interviewing candidates for IT positions.
Sourcing candidates through job boards, social media, and networking events
Screening resumes and conducting initial phone interviews
Coordinating interviews with hiring managers
Maintaining candidate database and tracking progress
Providing feedback to candidates and closing offers
Ensuring a positive candidate experien...
Explain about situation were new employee is not satisfied with all policies how u convince him to stay in company
Joins in SQL are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
Syntax for joins typically involves specifying the tables to join, the columns to join on, and any additional conditions
posted on 8 Apr 2025
I appeared for an interview in Mar 2025, where I was asked the following questions.
Understanding various testing types and managing testing modules effectively is crucial for software quality assurance.
Unit Testing: Testing individual components for correctness, e.g., testing a function that calculates tax.
Integration Testing: Ensuring that combined components work together, e.g., testing a payment gateway with an e-commerce platform.
System Testing: Validating the complete and integrated software pro...
I appeared for an interview in Feb 2025, where I was asked the following questions.
I appeared for an interview in Feb 2025, where I was asked the following questions.
Experienced SAP Consultant with a strong background in ERP solutions, project management, and client engagement.
Over 5 years of experience in SAP implementation and support.
Specialized in SAP S/4HANA and SAP Fiori applications.
Successfully led a project that improved supply chain efficiency by 30%.
Strong communication skills, facilitating workshops and training sessions for end-users.
Certified SAP Consultant with a foc...
Top trending discussions
The duration of Teamware Solutions interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 55 interview experiences
Difficulty level
Duration
based on 715 reviews
Rating in categories
4-10 Yrs
Not Disclosed
3-6 Yrs
Not Disclosed
4-10 Yrs
Not Disclosed
Talent Acquisition Executive
249
salaries
| ₹1.8 L/yr - ₹4.2 L/yr |
Software Engineer
101
salaries
| ₹2.8 L/yr - ₹9.2 L/yr |
Software Developer
91
salaries
| ₹3.5 L/yr - ₹10 L/yr |
Senior Software Engineer
82
salaries
| ₹4.3 L/yr - ₹10.6 L/yr |
Information Technology Recruiter
56
salaries
| ₹1.9 L/yr - ₹4 L/yr |
Randstad
Team Lease
Innovsource Services
IMPACT Infotech