Add office photos
Accenture logo
Employer?
Claim Account for FREE

Accenture

3.8
based on 56.6k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
Team Lead
Experienced
Clear (1)

50+ Accenture Team Lead Interview Questions and Answers

Updated 8 Jan 2025

Q1. which is fastest between java 8 intermediate and terminal operations

Ans.

Java 8 intermediate and terminal operations have the same speed.

  • Intermediate operations are lazy and do not execute until a terminal operation is called

  • Terminal operations trigger the execution of the entire stream pipeline

  • The speed of intermediate and terminal operations depends on the size of the stream and the complexity of the operations

  • Therefore, it is not accurate to say that one is always faster than the other

Add your answer
right arrow

Q2. difference between primary key and unique key

Ans.

Primary key uniquely identifies a record in a table, while unique key ensures uniqueness of a column.

  • Primary key cannot have null values, while unique key can have one null value.

  • A table can have only one primary key, but multiple unique keys.

  • Primary key is used as a foreign key in other tables, while unique key is not.

  • Example: Employee ID can be a primary key, while email address can be a unique key.

View 2 more answers
right arrow

Q3. What is directive and what are the different types of directive? What is Angular life cycle hook? Difference between ngOnChanges(), ngOnInit() and ngDoCheck()? What is closure? What is Hoisting? what is Lazy lo...

read more
Ans.

Directives in Angular are markers on a DOM element that tell Angular to attach a specific behavior to that element or transform the DOM element and its children.

  • Types of directives: Structural directives (ngIf, ngFor) and Attribute directives (ngModel, ngStyle)

  • Angular life cycle hook: A set of methods that Angular calls on a directive/component at defined points in time

  • Difference between ngOnChanges(), ngOnInit() and ngDoCheck(): ngOnChanges() is called when an input binding ...read more

Add your answer
right arrow

Q4. How will you design security for global implementation?

Ans.

Designing security for global implementation involves considering various factors and implementing a comprehensive strategy.

  • Conduct a thorough risk assessment to identify potential vulnerabilities and threats

  • Implement strong access controls and authentication mechanisms

  • Encrypt sensitive data both in transit and at rest

  • Establish a robust incident response plan

  • Regularly update and patch systems to address security vulnerabilities

  • Implement network segmentation to limit the impac...read more

View 1 answer
right arrow
Discover Accenture interview dos and don'ts from real experiences

Q5. four pillars of oops

Ans.

Four pillars of OOPs are Abstraction, Encapsulation, Inheritance, and Polymorphism.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions together and restricting access to them.

  • Inheritance: Acquiring properties and behavior of a parent class by a child class.

  • Polymorphism: Ability of an object to take many forms and perform different actions based on the context.

View 7 more answers
right arrow

Q6. Infrastructure of the application from resume, how to handle the non performing the member

Ans.

To handle non-performing team members in application infrastructure

  • Identify the root cause of non-performance

  • Provide feedback and coaching to improve performance

  • Set clear expectations and goals

  • Offer additional training or resources

  • Consider reassigning or terminating the team member if necessary

Add your answer
right arrow
Are these interview questions helpful?

Q7. What is cursor? What is REF CURSOR? Write the syntax for Before Insert row trigger What are all the DBMS_*** packages u have used? What are exceptions and how it is handled? What are Partitions and what is exch...

read more
Ans.

A cursor is a database object used to retrieve data row by row, while a REF CURSOR is a pointer to a cursor result set.

  • Cursor is used to fetch data row by row in a database query.

  • REF CURSOR is a pointer to a cursor result set, allowing it to be passed between PL/SQL programs.

  • Syntax for Before Insert row trigger: CREATE OR REPLACE TRIGGER trigger_name BEFORE INSERT ON table_name FOR EACH ROW BEGIN ... END;

  • DBMS_*** packages are built-in packages in Oracle for various functional...read more

Add your answer
right arrow

Q8. difference between hibernate get and load method

Ans.

Hibernate get and load method difference

  • get() method returns null if the object is not found in the database

  • load() method throws ObjectNotFoundException if the object is not found in the database

  • get() method hits the database immediately

  • load() method returns a proxy object and hits the database only when the actual data is needed

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q9. can instance variables be overridden

Ans.

Yes, instance variables can be overridden.

  • Instance variables can be overridden in subclasses.

  • The subclass can declare a variable with the same name as the superclass variable.

  • The subclass variable will then override the superclass variable.

  • This is known as variable shadowing.

  • Example: class A has an instance variable 'x', class B extends A and also has an instance variable 'x', B's 'x' will override A's 'x'.

Add your answer
right arrow

Q10. Have you worked on agile methodologies? what are the different artifacts in agile framework

Ans.

Yes, I have worked on agile methodologies. The different artifacts in agile framework include user stories, product backlog, sprint backlog, burndown charts, and retrospectives.

  • User stories: Descriptions of features from an end-user perspective

  • Product backlog: List of all desired features and enhancements for a product

  • Sprint backlog: Subset of the product backlog items selected for a sprint

  • Burndown charts: Visual representation of work remaining in a sprint

  • Retrospectives: Mee...read more

Add your answer
right arrow

Q11. can static method be overriden

Ans.

No, static methods cannot be overridden.

  • Static methods belong to the class and not to the instance of the class.

  • They can be called using the class name without creating an object.

  • Subclasses can have methods with the same name as the static method in the parent class, but it won't override it.

View 1 answer
right arrow

Q12. What is indexing policy of cosmosDB?

Ans.

Indexing policy in CosmosDB defines how documents are indexed and queried.

  • Indexing policy determines which properties of a document are indexed and how they are indexed.

  • It also defines the consistency level for queries.

  • Indexing policy can be set at the container level or at the document level.

  • Examples of indexing policies include Range, Hash, Spatial, and Composite indexes.

View 1 answer
right arrow

Q13. complie time & run time polymorphism

Ans.

Compile time polymorphism is achieved through function overloading and templates, while run time polymorphism is achieved through virtual functions.

  • Compile time polymorphism is resolved at compile time, while run time polymorphism is resolved at run time.

  • Function overloading allows multiple functions with the same name but different parameters to be defined.

  • Templates allow functions or classes to be defined with generic types that are determined at compile time.

  • Virtual functi...read more

View 1 answer
right arrow

Q14. How to create custom directive? Difference between AOT and JIT? Difference between Reactive form and Template driven form? Difference between var and let? Difference between Promise and Observable?

Ans.

Creating custom directives, differences between AOT and JIT compilation, Reactive form vs Template driven form, var vs let, Promise vs Observable

  • Custom directives in Angular are created using @Directive decorator and can be used to add behavior to elements in the DOM.

  • AOT (Ahead of Time) compilation happens during the build process, while JIT (Just in Time) compilation happens at runtime.

  • Reactive forms in Angular are more flexible and allow for complex form validation and dyna...read more

Add your answer
right arrow

Q15. Have you worked on Agile methodology. Can you describe different artifacts in the agile framework

Ans.

Yes, I have worked on Agile methodology. Different artifacts in Agile framework include user stories, product backlog, sprint backlog, burndown charts, and retrospective meetings.

  • User stories: Descriptions of features from an end-user perspective

  • Product backlog: List of all desired features and enhancements for the product

  • Sprint backlog: List of tasks to be completed during a sprint

  • Burndown charts: Visual representation of work remaining in a sprint

  • Retrospective meetings: Ref...read more

Add your answer
right arrow

Q16. difference between predicate and function

Ans.

A predicate is a statement that evaluates to true or false, while a function returns a value.

  • A predicate is used to test a condition and returns a boolean value.

  • A function takes input parameters and returns a value based on those parameters.

  • Predicates are commonly used in conditional statements and loops.

  • Functions can be used for a variety of purposes, such as calculations or data manipulation.

  • Example of a predicate: x > 5

  • Example of a function: sum(x, y) = x + y

Add your answer
right arrow

Q17. existing project mircro services architecture

Ans.

Existing project follows microservices architecture.

  • The project is divided into smaller, independent services.

  • Each service has its own database and communicates with other services through APIs.

  • This architecture allows for easier scalability and maintenance.

  • Examples of microservices in the project may include user authentication, payment processing, and inventory management.

Add your answer
right arrow

Q18. what is hibernate patch

Ans.

Hibernate patch is a fix for bugs or issues in the Hibernate framework.

  • Hibernate patch is a software update that addresses bugs or issues in the Hibernate framework.

  • It is used to fix problems related to database connectivity, performance, and security.

  • Hibernate patches are released periodically and can be downloaded from the official website.

  • For example, Hibernate 5.4.30.Final is a patch release that fixes several issues in the previous version.

Add your answer
right arrow

Q19. How would you assign permission via lookup to a group

Ans.

Assigning permissions via lookup to a group involves mapping group IDs to permission levels.

  • Create a lookup table mapping group IDs to permission levels

  • Assign the appropriate permission level to each group

  • Use the lookup table to quickly assign permissions to groups

Add your answer
right arrow

Q20. different collection algorithms

Ans.

Collection algorithms are used to organize and manage data in data structures.

  • Some common collection algorithms include sorting, searching, and hashing.

  • Sorting algorithms include bubble sort, quicksort, and merge sort.

  • Searching algorithms include linear search and binary search.

  • Hashing algorithms include MD5 and SHA-1.

  • The choice of algorithm depends on the type of data and the desired outcome.

Add your answer
right arrow

Q21. How we can print specific to MRP controller?

Ans.

To print specific to MRP controller, use transaction code MRP1.

  • Use transaction code MRP1 to access the MRP controller printing options.

  • Select the specific MRP controller for which you want to print.

  • Choose the relevant output format and execute the print function.

  • Review the printed output to ensure it contains the desired information.

Add your answer
right arrow

Q22. Different criteria methods in hibernate

Ans.

Hibernate supports different criteria methods for querying data from the database.

  • Criteria API: used to create and execute object-oriented queries

  • Example: Criteria criteria = session.createCriteria(Employee.class);

  • DetachedCriteria: used to create criteria queries outside of a session

  • Example: DetachedCriteria criteria = DetachedCriteria.forClass(Employee.class);

  • Query by Example: used to query based on an example object

  • Example: Employee employee = new Employee(); Example exampl...read more

Add your answer
right arrow

Q23. different transactional propagations

Ans.

Transactional propagations refer to the way transactions are managed and propagated across multiple resources.

  • Propagation behavior determines how transactions are managed across multiple resources

  • There are different types of propagation behavior such as REQUIRED, REQUIRES_NEW, SUPPORTS, MANDATORY, NOT_SUPPORTED, NEVER

  • REQUIRED - transaction must be present, REQUIRES_NEW - new transaction is created, SUPPORTS - transaction is optional, MANDATORY - transaction must be present, N...read more

Add your answer
right arrow

Q24. How do you integrate Cloud with legacy

Ans.

Integrating Cloud with legacy systems requires careful planning and execution.

  • Assess the existing legacy systems and identify their dependencies and limitations

  • Choose the appropriate cloud service model (IaaS, PaaS, or SaaS) based on the requirements

  • Develop a migration strategy and roadmap, considering factors like data security, compliance, and performance

  • Implement integration mechanisms like APIs, connectors, or middleware to connect the cloud and legacy systems

  • Test and val...read more

View 1 answer
right arrow

Q25. guard let statement when to use

Ans.

Use guard let statement to safely unwrap optional values and handle nil cases.

  • Use guard let to check if an optional value is nil before using it.

  • It is commonly used to unwrap optionals in the beginning of a function.

  • If the optional value is nil, the guard statement will exit the current scope.

  • Example: guard let name = person.name else { return }

Add your answer
right arrow

Q26. What do you know about SharePoint?

Ans.

SharePoint is a web-based collaborative platform used for document management and team collaboration.

  • SharePoint is developed by Microsoft and is part of the Microsoft 365 suite.

  • It allows users to create websites, store and share documents, and collaborate with others.

  • SharePoint provides features like version control, workflow management, and search functionality.

  • It can be used for various purposes such as intranet portals, document management systems, and project management.

  • S...read more

Add your answer
right arrow

Q27. What are different types of Cloud

Ans.

Different types of Cloud include Public, Private, Hybrid, and Multi-Cloud.

  • Public Cloud: Services offered to anyone on the internet (e.g. AWS, Azure)

  • Private Cloud: Services offered to a single organization (e.g. VMware, OpenStack)

  • Hybrid Cloud: Combination of Public and Private Clouds (e.g. Google Anthos)

  • Multi-Cloud: Use of multiple Public Cloud providers (e.g. using AWS and Azure together)

Add your answer
right arrow

Q28. Difference between Angular and React

Ans.

Angular is a complete framework while React is a library for building UI components.

  • Angular has a steeper learning curve and requires more setup time

  • React is more flexible and can be used with other libraries

  • Angular has a built-in dependency injection system

  • React uses a virtual DOM for efficient rendering

  • Angular has a larger file size compared to React

  • Angular has a more opinionated approach to development

  • React is easier to test due to its modular nature

Add your answer
right arrow

Q29. Difference between Virtual Machine and Hypervisor?

Ans.

A hypervisor is a software that creates and runs virtual machines, while a virtual machine is an emulation of a physical computer.

  • Hypervisor is a software that allows multiple operating systems to share a single hardware host.

  • Virtual machine is an isolated environment created by the hypervisor to run guest operating systems.

  • Hypervisor provides the necessary abstraction to manage and allocate physical resources to virtual machines.

  • Examples of hypervisors include VMware ESXi, M...read more

Add your answer
right arrow

Q30. How to configure P2P VPN Tunnel

Ans.

P2P VPN tunnel can be configured by setting up VPN connections between two devices using a shared key or certificate.

  • Choose a VPN protocol such as IPsec or OpenVPN

  • Configure the VPN settings on both devices including IP addresses, shared key or certificates

  • Establish the VPN connection between the two devices

  • Test the connection to ensure data is securely transmitted

Add your answer
right arrow

Q31. What is Entity and Entity Relationship

Ans.

Entity is a real-world object or concept that has a unique identity. Entity Relationship is a diagrammatic representation of entities and their relationships.

  • Entity is a thing or object in the real world that can be distinguished from other objects.

  • Entity Relationship is a visual representation of how entities are related to each other.

  • Entities can have attributes that describe their characteristics.

  • Entities can have relationships with other entities, such as one-to-one, one-...read more

Add your answer
right arrow

Q32. Mapping experice with JD or opening they have

Ans.

Mapping experience with job description or requirements

  • Highlight relevant experience that aligns with the job description

  • Provide specific examples of how your skills match the requirements

  • Demonstrate understanding of the key responsibilities outlined in the job description

Add your answer
right arrow

Q33. What is CosmosDB sharding policy?

Ans.

CosmosDB sharding policy determines how data is partitioned across multiple physical partitions.

  • Sharding policy is set at the container level

  • It determines the partition key and the number of physical partitions

  • Hash-based sharding is the default policy

  • Range-based sharding can be used for scenarios where data is accessed in a specific order

  • Custom sharding can be implemented using stored procedures

Add your answer
right arrow

Q34. Explain the order to cash cycle?

Ans.

Order to cash cycle is the process of receiving and fulfilling customer orders, invoicing, and receiving payment.

  • Customer places an order for a product or service

  • Order is processed and fulfilled by the company

  • Invoice is generated and sent to the customer

  • Customer makes payment for the order

  • Payment is received and recorded by the company

Add your answer
right arrow

Q35. What is Page flow BPM?

Ans.

Page flow BPM is a process modeling technique that maps out the flow of pages in a web application.

  • It helps to identify the sequence of pages and actions required to complete a task

  • It can be used to optimize the user experience and improve efficiency

  • Example: Mapping out the flow of pages for an e-commerce website's checkout process

Add your answer
right arrow

Q36. What is architecture of ETL

Ans.

ETL architecture involves three main components: extraction, transformation, and loading.

  • Extraction involves retrieving data from various sources such as databases, files, and APIs.

  • Transformation involves cleaning, filtering, and converting data to make it usable for analysis.

  • Loading involves storing the transformed data into a target database or data warehouse.

  • ETL architecture can be designed using various tools such as Apache Spark, Talend, and Informatica.

  • The architecture ...read more

Add your answer
right arrow

Q37. Short lived BPM vs Long lived BPM

Ans.

Short lived BPMs are quick fixes while long lived BPMs are sustainable solutions.

  • Short lived BPMs are implemented to address immediate problems without considering long-term effects.

  • Long lived BPMs are designed to provide sustainable solutions that can adapt to changing circumstances.

  • Examples of short lived BPMs include quick process changes to meet a deadline or address a specific issue.

  • Examples of long lived BPMs include continuous process improvement initiatives and strate...read more

Add your answer
right arrow

Q38. Compile time vs run time polymorphism

Ans.

Compile time polymorphism is achieved through function overloading and operator overloading, while run time polymorphism is achieved through virtual functions and inheritance.

  • Compile time polymorphism is resolved during compile time based on the number and types of arguments passed to a function.

  • Run time polymorphism is resolved during runtime based on the actual type of object being referred to.

  • Compile time polymorphism is also known as static polymorphism, while run time po...read more

Add your answer
right arrow

Q39. Explain the architecture of the project

Ans.

The project architecture follows a microservices design pattern with separate components for different functionalities.

  • The project is divided into multiple microservices, each responsible for a specific functionality.

  • Communication between microservices is typically done through APIs or message queues.

  • There is a central service registry for service discovery and load balancing.

  • Data storage may be distributed across multiple databases or data stores.

  • Scalability and fault tolera...read more

Add your answer
right arrow

Q40. Process to define approval flows

Ans.

Approval flows are defined by mapping out the steps and decision points in a process to determine who needs to approve at each stage.

  • Identify all stakeholders involved in the approval process

  • Map out the steps and decision points in the process

  • Determine the criteria for approval at each stage

  • Assign specific approvers to each step based on criteria

  • Implement a system or tool to automate and track approval flows

Add your answer
right arrow

Q41. What are Java Collections?

Ans.

Java Collections are frameworks that provide an architecture to store and manipulate a group of objects.

  • Java Collections provide interfaces (List, Set, Map) and classes (ArrayList, LinkedList, HashSet, HashMap) to store and manipulate groups of objects.

  • Collections framework includes algorithms to manipulate collections, such as sorting and searching.

  • Collections are dynamic in nature, meaning they can grow and shrink in size as needed.

  • Examples: ArrayList, LinkedList, HashSet, ...read more

Add your answer
right arrow

Q42. Explained Worksoft Architecture

Ans.

Worksoft Architecture is a framework for automated testing of enterprise applications.

  • Worksoft Architecture is based on a modular design that allows for easy customization and integration with other tools.

  • It uses a component-based approach to testing, with reusable components that can be easily assembled into test cases.

  • Worksoft Architecture supports a wide range of technologies and platforms, including SAP, Oracle, and web applications.

  • It provides a centralized repository fo...read more

Add your answer
right arrow

Q43. What is Static keyword

Ans.

Static keyword is used in programming languages to declare variables, methods, or classes that belong to the class itself rather than instances of the class.

  • Static variables retain their values across all instances of a class.

  • Static methods can be called without creating an instance of the class.

  • Static classes cannot be instantiated and are used for grouping related methods and variables.

  • In Java, static keyword is used to create class variables and methods.

  • Example: public sta...read more

Add your answer
right arrow

Q44. Compatibility with the organization

Ans.

I am highly compatible with the organization and its values.

  • I have researched the organization and its mission statement to ensure alignment with my personal values.

  • I have experience working in similar environments and understand the importance of teamwork and communication.

  • I am adaptable and willing to learn and grow within the organization.

  • I am excited about the opportunity to contribute to the organization's success.

Add your answer
right arrow

Q45. Twhat is test strategy

Ans.

Test strategy is a high-level plan to achieve testing objectives and goals.

  • Test strategy outlines the approach to be used for testing a particular product or project.

  • It includes the scope of testing, resources, timelines, and risks involved.

  • Test strategy helps in identifying the testing methods, techniques, and tools to be used.

  • It also defines the entry and exit criteria for testing phases.

  • Example: A test strategy for a mobile application may include testing on various device...read more

Add your answer
right arrow

Q46. How to do Deployment

Ans.

Deployment involves releasing software updates to production servers.

  • Create a deployment plan outlining steps and responsibilities

  • Test the deployment process in a staging environment

  • Use automation tools like Jenkins or Ansible for seamless deployments

  • Monitor the deployment process for any issues

  • Rollback plan in case of deployment failure

Add your answer
right arrow

Q47. What is osgi model

Ans.

OSGi is a modular architecture for Java applications.

  • OSGi allows applications to be composed of small, reusable modules called bundles.

  • Each bundle can contain Java classes, resources, and metadata.

  • Bundles can be dynamically installed, started, stopped, updated, and uninstalled at runtime.

  • OSGi provides a service registry for bundles to publish and consume services.

  • OSGi is commonly used in enterprise applications and IoT devices.

Add your answer
right arrow

Q48. C++ coding on polymorphism

Ans.

Polymorphism in C++ allows objects of different classes to be treated as objects of a common superclass.

  • Polymorphism is achieved through virtual functions in C++.

  • Derived classes can override the virtual functions of the base class.

  • Example: Base class 'Shape' with virtual function 'draw()', derived classes 'Circle' and 'Rectangle' overriding 'draw()'.

Add your answer
right arrow

Q49. Resolve deadlocks in database

Ans.

Deadlocks in databases can be resolved by using techniques such as deadlock detection, prevention, and avoidance.

  • Use deadlock detection algorithms to identify and break deadlocks

  • Implement timeouts to automatically release locks if deadlock occurs

  • Ensure transactions acquire locks in the same order to prevent deadlocks

  • Use lock escalation to reduce the number of locks held by transactions

Add your answer
right arrow

Q50. What is Test plan

Ans.

A test plan is a document outlining the approach, resources, schedule, and scope of testing activities for a software project.

  • Defines the objectives, scope, and approach of testing

  • Outlines the resources, schedule, and responsibilities for testing

  • Includes test cases, test scenarios, and test data

  • Helps in identifying risks and mitigation strategies

  • Serves as a guide for the testing team throughout the project

Add your answer
right arrow

Q51. What is current ctc

Ans.

My current CTC is $80,000 per year.

  • My current CTC is $80,000 per year

  • I am currently earning $80,000 annually

  • My current salary package is $80,000 per annum

Add your answer
right arrow

Q52. Explain about System refresh

Ans.

System refresh is the process of copying production data to a non-production environment for testing or training purposes.

  • System refresh involves copying data from a production environment to a non-production environment.

  • It is commonly done to ensure that the non-production environment is up-to-date and accurate for testing or training purposes.

  • System refresh can help identify any issues or discrepancies that may arise when moving data between environments.

  • Examples of non-pro...read more

Add your answer
right arrow

Q53. Explain about Design patterns

Ans.

Design patterns are reusable solutions to common problems in software design.

  • Design patterns help in creating flexible, maintainable, and scalable software.

  • They provide a common language for developers to communicate about solutions.

  • Examples include Singleton, Factory, Observer, and Strategy patterns.

Add your answer
right arrow

Q54. Useful hooks in React js

Ans.

Useful hooks in React js include useState, useEffect, useContext, and useRef.

  • useState: for managing state in functional components

  • useEffect: for handling side effects in functional components

  • useContext: for accessing context in functional components

  • useRef: for accessing DOM elements or values in functional components

Add your answer
right arrow

Q55. PTP cycle meaning

Ans.

PTP cycle refers to the Procure-to-Pay cycle, which is the process of obtaining and paying for goods and services.

  • PTP cycle involves requisitioning, purchasing, receiving, and paying for goods and services.

  • It starts with a purchase requisition, followed by supplier selection, purchase order creation, goods receipt, invoice verification, and payment processing.

  • Efficient PTP cycle ensures timely delivery of goods and services while maintaining cost control.

  • Example: A company fo...read more

Add your answer
right arrow

More about working at Accenture

Back
Awards Leaf
AmbitionBox Logo
Top Rated Mega Company - 2024
Awards Leaf
Awards Leaf
AmbitionBox Logo
Top Rated Company for Women - 2024
Awards Leaf
Awards Leaf
AmbitionBox Logo
Top Rated IT/ITES Company - 2024
Awards Leaf
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at Accenture Team Lead

based on 126 interviews
4 Interview rounds
Technical Round
HR Round - 1
HR Round - 2
HR Round - 3
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Team Lead Interview Questions from Similar Companies

Tech Mahindra Logo
3.5
 • 26 Interview Questions
Infosys Logo
3.6
 • 18 Interview Questions
ElasticRun Logo
3.5
 • 17 Interview Questions
Delhivery Logo
3.9
 • 13 Interview Questions
TCS Logo
3.7
 • 13 Interview Questions
Bank of America Logo
4.2
 • 11 Interview Questions
View all
Recently Viewed
SALARIES
Amazon
SALARIES
Startek
REVIEWS
Startek
No Reviews
SALARIES
Amazon
SALARIES
Amazon
SALARIES
Amazon
SALARIES
Amazon
SALARIES
Amazon
SALARIES
Startek
SALARIES
Amazon
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter