Competency Based Interview question

There is this hot topic in Human Resource world now a day, it is called Competency Based Interview. You need to answer these questions using EAR method.

E = Example Describe a specific situation and/or tasks that respond to the interview question.

A = Action(s) Discuss the approach you took to deal with the task, breaking down your actions one by one.

R = Results Conclude by describing specific, concrete outcomes of your actions. Make mention of accomplishments, awards, or improvements as a result of your actions. Describe what you learned/would do differently the next time. The most common error people make when using this method is to leave out the R-Results!

Below are the questions break down into 4 area, Accountability, Achievement Orientation, Communication, Commitment.

Accountability

1. Tell me about a time when you had to stand your ground against a group decision. What was the situation and how do you handle it? What was the outcome?
2. Please describe a situation in which you received negative feedback from a supervisor or coworker. How did you respond to this feedback? What was the outcome?

Achievement Orientation

1. Share with me a situation where you have made recommendations to achieve functional outcomes. What was the recommendations and how did you come out with it? What was the outcome as a results of your actions.
2. Describe a situation where you have to provide access to your resources for skill development purposes. How did you do it? What was the results?
3. Sometimes, no matter how hard we have tried, we may not achieve own work targets. Share a disappointment t hat you had in achieving your own goals. What happened? Why it happened? What did you learned from that experience
4. Tell me a time that you have to disagree with a change that was introduced to your function. How it impacted your function. How did you manage the situation? What was the outcome?
5. What was the most useful criticism you ever received?

Communication

Describe a time when you were able to effectively communicate a difficult or unpleasant idea to a superior.
How do you go about explaining a complex technical problem to a person who does not understand technical jargon? What approach do you take in communicating with people?
1. Tell me a situation where you have to demonstrate openness, receptive to new information and willing to listen when approached by others? How did you do? What was the result?
2. Describe a situation where you have to maintain continuous open and consistent communication with others? How did you do it? What was the outcome?
3. Share with me a situation when you have to communicate decisions or recommendation with sensitivity and tact decisions which did not go well as planned? What was the difficulty encountered? What did you learn from that experience?

Commitment

1. Tell me a situation where you have to make choices and sets priorities to meet the organisations needs? How did you do? What was the result?
2. Describe a situation where you have to consult with others to achieve organisational objectives? How did you do it? What was the outcome?
3. Share with me a situation where you have to show exemplary conduct in modelling respect for the organisations goals and culture? What was the difficulty encountered? What did you learn from that experience?
4. Tell me a situation where you were unsuccessful in gaining cooperation and support from team members to achieve departmental objectives. What happened? How did you rectify this situation? What was the outcome?

Reference:

https://cblginsights.wordpress.com/2014/02/10/preparing-for-behavioral-interview-just-think-ear/

Advertisements
Posted in Uncategorized | Tagged , , | Leave a comment

Windows Server Task Schedule stuck Running Powershell

This post gives you a quick suggestion if you Windows Server Task Schedule running PowerShell stuck at the Running status and does not return to Ready status.

When you configure the Action in your Task Schedule. Do not, I repeat, DO NOT put your PowerScirpt script in Program/Script. In Program/Script put in PowerShell.exe. Put your script under the Add argument (optional) that should resolve your issue,


Reference:

https://community.spiceworks.com/how_to/17736-run-powershell-scripts-from-task-scheduler

Posted in .Net, Cloud, Community, Computers and Internet | Tagged , , | Leave a comment

Power BI Create Pie Chart for a single none numeric column

This post dhows you 2 options to generate a pie chart using single none numeric column. This post expect you know how to get the data from Power BI.

As can see from the below table, there is a column InStatus only consist of Failed and Succeeded.


Click the Pie chart in VISUALIZATION area. Drag the InStatus to Details. Then Drag the InStatus to Values. As you can see it will convert to Count of InStatus automatically.


Another method to do this. Right click the InStatus then choose New measure.


Type the following on the formular bar.

Measure = COUNTAX(MessageLog,[InStatus])


Then you have a new Measure field.


To get the Pie chart. Click on both InStatus and Measure.


You will see the same Pie Chart.

Posted in .Net, Cloud, Community, Computers and Internet, Data Platform | Tagged , | Leave a comment

CYBERSECURITY AWARENESS

This article is published on page 27 CYBERSECURITY AWARENESS of Pelepas Insight_August 2018 issue (https://issuu.com/ahmadrifhan/docs/pelepas_insight_aug_2018).

PTP has conducted a valuable awareness event in this month. To keep the momentum of what you have learnt we have compiled a list of things you should be thinking about whenever you’re using the Internet. You have probably heard many or all of these tips before, but repetition does not spoil the prayer. If you take security seriously, you are already using tools such as updated anti-virus or built-in firewall of your operating system to protect your computer from malware, ransomware, and other advanced threats. We believe you are smart and are aware that there’s no substitute for educating yourself and your co-workers. Share this list below with other users

  1. Don’t ever say “It won’t happen to me.” because you are always an attractive target to hackers.
  2. Practice good password management. Use a strong mix of characters such as P+PP@$$, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down somewhere that is easily noticeable, and definitely don’t write it on a post-it note attached to your monitor.
  3. Never leave your devices such as mobile, tablet, or laptop unattended. If you need to leave your devices for any length of time, no matter how short, lock your screen with password so no one can use it while you’re not around. If you are keeping highly sensitive information on a flash drive or external hard drive, make sure to lock it up physically as well.
  4. Always beware when clicking on any attachments or links in your email. If it’s suspicious or unexpected for any reason at all, don’t click on any link or attachment. Be careful when you type the URL because unscrupulous people will often take advantage of spelling mistakes to redirect you to a harmful domain.
  5. Sensitive browsing, such as online banking or online shopping, should only be performed on a device that belongs to you, on a home or office networks that you trust. Your data could be copied or stolen if you use a friend’s phone, a public computer, or a cafe’s free Wi-Fi.
  6. Always back up your data regularly, and your anti-virus software must always be up to date.
  7. Be cautious of what you plug in to your computer. Any type of malicious software such as malware or ransomware can be spread through infected flash drives, or external hard drives, and even smartphones.
  8. Watch what you’re sharing on social media networks such as Facebook or Instagram. Criminals will try to befriend you in order to easily gain access to a shocking amount of your information like which school you’re from, where you are working, when you’re on vacation and so on.
  9. When offline, be conscientious of social engineering, where someone endeavours to gain information from you through manipulation. If someone unknown calls or emails you asking for sensitive information such as bank account number, you should always say no. You can call the company directly to verify credentials before giving out any information.
  10. Be sure to monitor your bank accounts, email accounts, social media accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that your accounts have been compromised.

    Reference:

https://umbrella.cisco.com/blog/2013/10/08/top-ten-important-cyber-security-tips-users/

Special thanks to my son who edited this.

Posted in .Net, Community, Computers and Internet, Operating System | Tagged | Leave a comment

SQL Server Cannot generate SSPI context.

This short post shows you a tip of resolving the error “The target principal name is incorrect. Cannot generate SSPI context.”.

The normally happen when you are connecting to SQL Server remotely using Windows Authentication. If you search on the Internet for this error messages then you are very likely to get this link https://support.microsoft.com/en-us/help/811889/how-to-troubleshoot-the-cannot-generate-sspi-context-error-message.

This link explain everything in details but too details till you might not know where to start.

For me to resolve this, I ensure my DNS is pointing to the DNS server that the Domain Controller is pointing to. Well you will say the DNS that the Domain Controller is pointing to may not be able to access to some of the web site. You can either ask your admin to too the sites into the DNS server. Alternatively, you can point to the DNS that you like to till the error reoccur.

Posted in .Net, Cloud, Community, Computers and Internet, Data Platform | Tagged | Leave a comment

SQL Server Execution Plan eBook

This post suggests you to read the useful SQL Performance Tuning eBook.

The first two chapters will be fine for you to understand many of the SQL executions and test the performance. Even though this need substantial amount of time to test it. Somehow it is worth to do after the major development to keep the application running with decent amount of hardware resources.

Another very key statements, the JOIN, statements, are covered in chapter 4.

Once again, great thanks to Grant Fritchey sharing this book with us.

You can get the book through Redgate link https://www.red-gate.com/products/dba/sql-monitor/entrypage/execution-plans.

Posted in .Net, Cloud, Community, Computers and Internet, Data Platform | Tagged , | Leave a comment

SSIS Script Component as Data Source

This post is showing how to use Script Component as Data Source in SSIS.

This article expect you know what is Data Flow and Script Component in SSIS. In this article I will insert a row into Northwind database, Products table.

Drag the Script Component to Data Flow. The Select Script Component Type dialog box popped up. Choose Source instead of Destination or Transformation. Click OK.


Double click the Script Component to Script Transformation Editor.


In Inputs and Output, add the columns you want the Script Component to output. In my example I created NameOut and IdOut.


Click on the Script. Click on Edit Script…

Add the following code in the code editor.

public override void CreateNewOutputRows()

{

    Output0Buffer.AddRow();

    Output0Buffer.IdOut = 1;

    Output0Buffer.NameOut = “Laptop”;

}

You can the map the output columns to the database.

Posted in .Net, Cloud, Community, Computers and Internet, Data Platform | Tagged | Leave a comment