Faster and better experience!
i
Thales
Filter interviews by
Linux file permissions control access to files and directories using chmod and chown commands.
File permissions are represented by three types: owner, group, and others.
Each type has three permissions: read (r), write (w), and execute (x).
Use 'chmod' to change file permissions. Example: 'chmod 755 file.txt' grants full access to the owner and read/execute to others.
Use 'chown' to change file ownership. Example: 'ch...
My current CTC is $40,000 per year.
My current CTC is $40,000 per year
CTC stands for Cost to Company
It includes salary, bonuses, benefits, and any other perks provided by the company
Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.
Natting allows multiple devices on a local network to share a single public IP address
Types of Natting include Static NAT, Dynamic NAT, and Port Address Translation (PAT)
Natting helps improve security by hiding internal IP addresses from external networks
Example: A company uses NA...
SDLC stands for Software Development Life Cycle, a process used by software development teams to design, develop, and test high-quality software.
SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.
Each phase has its own set of activities and deliverables to ensure the successful completion of the software project.
Examples of SDLC models include Waterfall, ...
Abstraction is the process of hiding complex implementation details and exposing only the necessary information.
Abstraction helps in reducing complexity and increasing efficiency.
It allows us to focus on the essential features of an object or system.
For example, a car's dashboard abstracts the complex workings of the car's engine and presents only the necessary information to the driver.
Reverse a string and find a duplicate in an array of strings.
To reverse a string, we can use the built-in reverse() method or loop through the string and append each character to a new string in reverse order.
To find a duplicate in an array of strings, we can use a hash table to keep track of the frequency of each string and return the first string with a frequency greater than 1.
OOPS Concepts in .NET include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessa...
HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is hashed again ...
Create a program for string manipulation using an array of strings.
Use built-in string manipulation functions like substring, replace, and concat.
Iterate through the array of strings to perform different manipulations.
Consider edge cases like empty strings or null values.
Example: Reverse each string in the array and concatenate them together.
The cut command in Linux is used to extract sections from each line of input.
Used to cut out specific sections of text from a file or input stream
Can specify the delimiter used to separate fields
Options include -c for characters, -f for fields, and -d to specify the delimiter
Example: cut -d',' -f1,3 file.txt
I applied via Campus Placement and was interviewed in Dec 2024. There were 3 interview rounds.
I am ECE students, Analog and Digital, basic aptitude and some control system questions
I applied via Campus Placement and was interviewed in Dec 2024. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in Nov 2024. There were 3 interview rounds.
It was normal logical reasoning and basic questions on java, cyber security
I applied via Naukri.com and was interviewed in Mar 2024. There were 2 interview rounds.
I applied via LinkedIn and was interviewed in Apr 2024. There was 1 interview round.
I applied via LinkedIn and was interviewed in Feb 2024. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Feb 2024. There were 2 interview rounds.
Top trending discussions
Some of the top questions asked at the Thales interview -
The duration of Thales interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 40 interview experiences
Difficulty level
Duration
based on 400 reviews
Rating in categories
Bangalore / Bengaluru
6-8 Yrs
Not Disclosed
Senior Software Engineer
297
salaries
| ₹9.3 L/yr - ₹27 L/yr |
Technical Lead
291
salaries
| ₹11.8 L/yr - ₹37 L/yr |
Software Engineer
204
salaries
| ₹5.9 L/yr - ₹21 L/yr |
Senior Technical Lead
96
salaries
| ₹24 L/yr - ₹47.2 L/yr |
Senior Engineer
86
salaries
| ₹8.5 L/yr - ₹23 L/yr |
Accenture
Wipro
Cognizant
Capgemini