Filter interviews by
I chose data science because of its potential to solve complex problems and make meaningful insights from data.
Fascination with the power of data to drive decision-making
Interest in solving real-world problems using data-driven approaches
Passion for exploring patterns and trends in data
Desire to contribute to advancements in technology and innovation
Excitement about the interdisciplinary nature of data science
Examples:...
Recommendation, personalization, fraud detection, search algorithms are used in e-commerce companies.
Recommendation algorithms suggest products based on user behavior and preferences.
Personalization algorithms customize the user experience based on their past behavior.
Fraud detection algorithms identify and prevent fraudulent transactions.
Search algorithms help users find products based on their search queries.
Clusteri...
Market basket analysis algorithm is used to identify the relationship between products frequently purchased together.
It is a data mining technique.
It helps in identifying the co-occurrence of items in a transactional database.
It is used in retail, e-commerce, and marketing industries.
It helps in cross-selling and up-selling products.
Example: If a customer buys bread, there is a high probability that they will also buy ...
Top trending discussions
Logical reasoning, deduction reasoning
I applied via Referral and was interviewed in Aug 2024. There were 2 interview rounds.
Topics like sql, python, aptitude were covered.
I was interviewed in Dec 2024.
Our team follows a CI/CD workflow that includes automated testing, code reviews, and continuous integration.
Automated testing is run on every code change to catch bugs early.
Code reviews are conducted before merging changes to ensure code quality.
Continuous integration is used to automatically build and test code changes in a shared repository.
Deployment pipelines are set up to automate the release process.
Version cont...
Yes, there have been security incidents and I have handled them effectively.
Implemented security protocols to prevent future incidents
Conducted thorough investigation to identify the root cause
Collaborated with IT team to strengthen security measures
Communicated with stakeholders to ensure transparency and trust
Provided training to employees on cybersecurity best practices
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization determines the level of access or permissions a user has once their identity is confirmed.
Authentication is the process of logging in, while authorization is the process of granting or denyin...
LLD for an authentication and authorization system
Separate modules for authentication and authorization
Use of secure hashing algorithms for storing passwords
Role-based access control implementation
Audit logging for tracking user actions
Integration with external identity providers
Design a document managed storage like Google Drive as an E2E solution.
Implement user authentication and authorization for secure access.
Create a user-friendly interface for uploading, organizing, and sharing documents.
Include features like version control, file syncing, and search functionality.
Utilize cloud storage for scalability and accessibility.
Implement encryption for data security.
Integrate with third-party app
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
posted on 11 Sep 2024
I applied via Company Website and was interviewed in Aug 2024. There was 1 interview round.
RAG pipeline is a data processing pipeline used in data science to categorize data into Red, Amber, and Green based on certain criteria.
RAG stands for Red, Amber, Green which are used to categorize data based on certain criteria
Red category typically represents data that needs immediate attention or action
Amber category represents data that requires monitoring or further investigation
Green category represents data that...
Confusion metrics are used to evaluate the performance of a classification model by comparing predicted values with actual values.
Confusion matrix is a table that describes the performance of a classification model.
It consists of four different metrics: True Positive, True Negative, False Positive, and False Negative.
These metrics are used to calculate other evaluation metrics like accuracy, precision, recall, and F1 s...
DSA and ML, AI, Coding question
I applied via Recruitment Consulltant and was interviewed in Apr 2024. There was 1 interview round.
SQL, Python coding …
based on 1 review
Rating in categories
Data Science Intern
5
salaries
| ₹2 L/yr - ₹4 L/yr |
Data Scientist
3
salaries
| ₹3.6 L/yr - ₹5.5 L/yr |
EXL Service
Access Healthcare
S&P Global
AGS Health