Add office photos
Engaged Employer

Coforge

3.3
based on 4.8k Reviews
Video summary
Filter interviews by

50+ IGT Solutions Interview Questions and Answers

Updated 17 Nov 2024
Popular Designations

Q1. What do you consider while choosing between a SQL and nosql database.

Ans.

Consider data structure, scalability, consistency, and query requirements when choosing between SQL and NoSQL databases.

  • Consider data structure - SQL for structured data, NoSQL for unstructured or semi-structured data

  • Scalability - NoSQL databases are more scalable horizontally

  • Consistency - SQL databases offer strong consistency, while NoSQL databases may offer eventual consistency

  • Query requirements - SQL for complex queries, NoSQL for simple queries or real-time data processi...read more

Add your answer

Q2. Given array of objects [{model: apple , price: 2000}, {model : apple , price : 1000}, {model: samsung , price: 500}] Return output as {apple : 1000, samsung :500} Ie flatten the array to map if model is same re...

read more
Ans.

Flatten array of objects to map with minimum price for each model

  • Iterate through the array and create a map with model as key and minimum price as value

  • If model already exists in map, update the value with minimum price

  • Return the map as the output

Add your answer

Q3. SQL find 10 max salary from employee table , can use offset and limit Postgresql function

Ans.

Use SQL query with OFFSET and LIMIT to find 10 max salaries from employee table in PostgreSQL.

  • Use ORDER BY clause to sort salaries in descending order

  • Use LIMIT 10 to get only the top 10 salaries

  • Use OFFSET 0 to start from the beginning of the sorted list

View 1 answer

Q4. Given string : I am java developer return 4 non repeting character

Ans.

Find 4 non-repeating characters in the given string.

  • Create a hashmap to store character frequencies

  • Iterate through the string and count the occurrences of each character

  • Return the first 4 characters with frequency 1 as non-repeating characters

Add your answer
Discover IGT Solutions interview dos and don'ts from real experiences

Q5. Thread pool executer fire 3 method in parallel and wait for all 3 to complete

Ans.

Use a thread pool executor to execute 3 methods in parallel and wait for all 3 to complete.

  • Create a thread pool executor with a fixed number of threads.

  • Submit the 3 methods as tasks to the executor using the `submit()` method.

  • Use the `invokeAll()` method to wait for all tasks to complete.

  • Handle any exceptions thrown by the tasks.

  • Example: ThreadPoolExecutor executor = new ThreadPoolExecutor(3, 3, 0L, TimeUnit.MILLISECONDS, new LinkedBlockingQueue<>());

  • Example: Future task1 = e...read more

Add your answer

Q6. @async annotation usage how to make async api

Ans.

The @async annotation is used to make an API asynchronous.

  • Add the @async annotation to the method declaration

  • Use CompletableFuture or a similar mechanism to handle the asynchronous execution

  • Ensure the API returns a CompletableFuture or a similar asynchronous result

Add your answer
Are these interview questions helpful?

Q7. Given employee class find 10th Max. Salary

Ans.

To find the 10th highest salary for a given employee class.

  • Sort the salaries in descending order for the specific employee class.

  • Skip duplicates and find the 10th unique salary.

  • Return the 10th salary as the 10th Max. Salary.

Add your answer

Q8. Lazy loading of beans in spring boot

Ans.

Lazy loading of beans in Spring Boot allows beans to be loaded only when they are needed, improving performance.

  • Lazy loading can be achieved by using @Lazy annotation on bean definitions

  • Lazy loading can also be configured in application.properties using spring.main.lazy-initialization=true

  • Lazy loading is useful for optimizing application startup time and memory usage

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Javascript splice and slice difference

Ans.

splice is used to add/remove elements from an array, while slice is used to create a new array from a portion of an existing array.

  • splice modifies the original array, while slice does not

  • splice can add elements to an array at a specific index

  • slice can extract a portion of an array without modifying the original array

  • splice returns the removed elements, while slice returns the extracted elements

Add your answer
Q10. What is the Software Development Life Cycle (SDLC)?
Ans.

SDLC is a process used by software development teams to design, develop, and test high-quality software efficiently.

  • SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.

  • Each phase has specific goals and deliverables to ensure the software meets requirements and is of high quality.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

  • SDLC helps in managing project timelines, costs, and resources effectively.

Add your answer
Q11. What is the difference between 32-bit and 64-bit operating systems?
Ans.

32-bit operating systems can only utilize up to 4GB of RAM, while 64-bit operating systems can handle much larger amounts of RAM.

  • 32-bit operating systems can only address up to 4GB of RAM, limiting the amount of memory that can be used by the system and applications.

  • 64-bit operating systems can handle larger amounts of RAM, allowing for better performance and the ability to run more demanding applications.

  • 64-bit operating systems also offer better security features and suppor...read more

Add your answer

Q12. What is the difference between 32bit and 64bit processor ?

Ans.

32-bit processors can handle 2^32 bits of data at a time, while 64-bit processors can handle 2^64 bits of data at a time.

  • 32-bit processors can address up to 4GB of RAM, while 64-bit processors can address much more.

  • 64-bit processors are generally faster and more efficient than 32-bit processors.

  • 64-bit processors can run both 32-bit and 64-bit applications, while 32-bit processors can only run 32-bit applications.

  • 64-bit processors are required to run certain software, such as ...read more

Add your answer

Q13. 1)Difference between findelement and find elements 2)Type of exception, name few in java and selenium.3) oops concept

Ans.

Answering questions related to Selenium and Java for Senior Test Engineer position.

  • findelement returns the first matching element on the page while find elements returns a list of all matching elements

  • Some exceptions in Java and Selenium are NullPointerException, NoSuchElementException, TimeoutException, ElementNotVisibleException

  • Object-Oriented Programming (OOP) concepts include inheritance, encapsulation, abstraction, and polymorphism

Add your answer

Q14. Write a program reverse the String

Ans.

Program to reverse a given string

  • Use a loop to iterate through the characters of the string

  • Swap characters from start and end of the string until reaching the middle

  • Return the reversed string

Add your answer
Q15. What is a bandpass filter?
Ans.

A bandpass filter is a type of electronic filter that allows signals within a certain frequency range to pass through while attenuating signals outside of that range.

  • Bandpass filters are used to selectively filter out unwanted frequencies in electronic circuits.

  • They have a lower cutoff frequency and an upper cutoff frequency that define the range of frequencies that can pass through.

  • Examples of bandpass filters include LC bandpass filters, active bandpass filters, and SAW ban...read more

View 1 answer
Q16. What is the cutoff frequency?
Ans.

Cutoff frequency is the frequency at which the output power is half of the maximum power.

  • Cutoff frequency is commonly used in signal processing and filter design.

  • It is the frequency at which the output power drops to half (-3 dB) of the maximum power.

  • In low-pass filters, cutoff frequency is the frequency at which the output signal is attenuated by 3 dB.

  • In high-pass filters, cutoff frequency is the frequency at which the output signal is attenuated by 3 dB.

Add your answer

Q17. Inheritance in Java and it's implementation

Ans.

Inheritance is a mechanism in Java where a class acquires the properties and methods of another class.

  • A subclass can inherit properties and methods from a superclass

  • The keyword 'extends' is used to create a subclass

  • A subclass can override methods of the superclass

  • Java does not support multiple inheritance, but it can be achieved through interfaces

Add your answer

Q18. What is bandpass filter?

Ans.

A bandpass filter is a type of electronic filter that allows a specific range of frequencies to pass through while blocking others.

  • It is used to separate a specific frequency range from a signal.

  • It consists of a combination of low-pass and high-pass filters.

  • It is commonly used in audio and radio frequency applications.

  • Examples include tuning circuits in radios and audio equalizers.

  • Bandwidth and center frequency are important parameters for bandpass filters.

Add your answer

Q19. What is cutoff frequency?

Ans.

Cutoff frequency is the frequency at which a filter attenuates a signal by half its power.

  • Cutoff frequency is a characteristic of filters used in signal processing.

  • It is the frequency at which the filter starts to attenuate the signal.

  • For low-pass filters, frequencies below the cutoff frequency are passed through, while frequencies above are attenuated.

  • For high-pass filters, frequencies above the cutoff frequency are passed through, while frequencies below are attenuated.

  • Cuto...read more

Add your answer

Q20. What is os and type of os

Ans.

OS stands for Operating System. It is a software that manages computer hardware and software resources.

  • OS is the interface between the user and the computer hardware.

  • It manages memory, processes, and input/output devices.

  • Examples of OS include Windows, macOS, Linux, and Android.

  • Types of OS include single-user, multi-user, real-time, and embedded.

  • OS can be classified based on their architecture, such as 32-bit or 64-bit.

  • OS can also be classified based on their purpose, such as...read more

Add your answer

Q21. Oops Concept in java

Ans.

Oops concept in Java refers to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation involves bundling data and methods that operate on the data into a single unit.

  • Polymorphism allows objects to be treated as instances of their parent class.

  • Abstraction hides the implementation details and only shows the necessary features to the outsid...read more

Add your answer
Ans.

SDLC stands for Software Development Life Cycle, which is a process used to design, develop, and maintain software.

  • SDLC is a structured approach to software development.

  • It involves several stages such as planning, designing, coding, testing, and maintenance.

  • Each stage has its own set of activities and deliverables.

  • The goal of SDLC is to produce high-quality software that meets the customer's requirements.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

Add your answer

Q23. 1. difference between abstract vs interface

Ans.

Abstract classes are classes that cannot be instantiated and can have both abstract and non-abstract methods. Interfaces are contracts that define the methods that a class must implement.

  • Abstract classes can have constructors while interfaces cannot

  • A class can implement multiple interfaces but can only inherit from one abstract class

  • Abstract classes can have instance variables while interfaces cannot

  • Interfaces can have default methods while abstract classes cannot

  • Abstract cla...read more

Add your answer

Q24. What is Polymorphism ,

Ans.

Polymorphism is the ability of an object to take on many forms.

  • Polymorphism allows objects of different classes to be treated as if they are of the same class.

  • It can be achieved through method overloading or method overriding.

  • Example: A shape class can have different subclasses like circle, square, triangle, etc. and all can be treated as shapes.

  • Polymorphism helps in achieving code reusability and flexibility.

Add your answer

Q25. Throw and throws difference

Ans.

Throw and throws are keywords in Java used for exception handling. Throw is used to throw an exception while throws is used to declare an exception.

  • Throw is used to explicitly throw an exception in a method.

  • Throws is used to declare the exceptions that a method may throw.

  • Throw is followed by an instance of an exception class.

  • Throws is followed by the name of the exception class or classes separated by commas.

  • Throw is used within a method while throws is used in the method sig...read more

Add your answer

Q26. Tell me atleast 2minutes of Bangalore traffic

Ans.

Bangalore traffic is notorious for its congestion, chaotic driving, and unpredictable delays.

  • Traffic jams are a common occurrence, especially during peak hours.

  • Roads are often filled with vehicles of all sizes, from cars and motorcycles to buses and trucks.

  • Lane discipline is lacking, with vehicles frequently changing lanes without signaling.

  • Traffic signals are often ignored, leading to gridlocks at intersections.

  • Public transportation options like buses and metro trains also c...read more

Add your answer

Q27. How much layer and layer name.

Ans.

There are 7 layers in the OSI model. Layer names are Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • The OSI model has 7 layers.

  • The layers are Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with adjacent layers.

  • The layers are organized in a hierarchical manner.

  • Examples of protocols at each layer include Ethernet at the Data Link layer and HTTP at the Applicatio...read more

Add your answer

Q28. What is collection frameworks

Ans.

Collection frameworks in Java provide a set of classes and interfaces to store and manipulate groups of objects.

  • Collection frameworks provide reusable data structures like lists, sets, and maps.

  • They offer algorithms to manipulate and access the elements in these data structures.

  • Examples include ArrayList, HashSet, and HashMap in Java.

Add your answer

Q29. Different between hub , router, switch.

Ans.

A hub is a simple device that connects multiple devices in a network. A switch is a more advanced device that directs data to specific devices. A router connects multiple networks and directs data between them.

  • A hub operates at the physical layer of the OSI model, while a switch operates at the data link layer.

  • A hub broadcasts data to all devices connected to it, while a switch sends data only to the device it is intended for.

  • A router uses IP addresses to direct data between ...read more

Add your answer

Q30. Given a String s = "aaaaa", find the count of substring matching given pattern "aa". Output : 4

Ans.

Count the occurrences of a given pattern in a string.

  • Iterate through the string and check for the pattern at each position

  • Increment a counter whenever the pattern is found

  • Return the final count

Add your answer

Q31. What is Active directory.

Ans.

Active Directory is a directory service developed by Microsoft for Windows domain networks.

  • It stores information about network resources such as computers, users, and groups.

  • It provides authentication and authorization services for Windows-based computers.

  • It allows administrators to manage network resources from a central location.

  • It uses a hierarchical structure of domains, trees, and forests to organize network resources.

  • It supports group policies that can be used to enforc...read more

Add your answer

Q32. How to judge ram faulty

Ans.

To judge RAM faulty, run memory diagnostics and check for errors.

  • Run memory diagnostics software like Memtest86+ or Windows Memory Diagnostic

  • Check for errors in the diagnostic report

  • Test each RAM module individually to identify the faulty one

  • Look for symptoms like frequent crashes, blue screens, and system freezes

Add your answer

Q33. Oops concepts in your framework where is it used

Ans.

Oops concepts are used in the framework for better code organization, reusability, and maintainability.

  • Encapsulation: Used to hide the internal state of objects and restrict access to it.

  • Inheritance: Helps in code reusability by allowing a class to inherit properties and methods from another class.

  • Polymorphism: Enables objects to be treated as instances of their parent class, allowing for flexibility in method implementation.

  • Abstraction: Focuses on the essential features of a...read more

Add your answer

Q34. Code on string manipulation

Ans.

String manipulation code

  • Use string methods like split(), replace(), substring() etc.

  • Loop through the string to manipulate each character

  • Regular expressions can also be used for complex manipulations

Add your answer

Q35. Polymorphism and its types

Ans.

Polymorphism is the ability of an object to take on many forms.

  • Polymorphism allows objects of different classes to be treated as if they are of the same class.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Compile-time polymorphism is achieved through method overloading, where multiple methods have the same name but different parameters.

  • Runtime polymorphism is achieved through method overriding, where a subclass provides...read more

View 1 answer

Q36. Explain your framework Brief yourself Opps concepts in your framework

Ans.

My framework is a data-driven framework that uses Selenium for automation testing.

  • Data-driven framework using Selenium

  • Modular approach for easy maintenance

  • Integration with CI/CD tools like Jenkins

  • Supports parallel execution for faster testing

  • Object-oriented programming for reusability

Add your answer

Q37. What is java and springboot

Ans.

Java is a popular programming language used for developing various applications. Spring Boot is a framework that simplifies the development of Java applications.

  • Java is an object-oriented programming language known for its platform independence and versatility.

  • Spring Boot is a framework that simplifies the development of Java applications by providing pre-configured settings and tools.

  • Spring Boot allows for rapid development and deployment of Java applications, making it popu...read more

Add your answer

Q38. What is collection framework

Ans.

Collection framework is a set of classes and interfaces that provide a standard way to store and manipulate groups of objects.

  • It provides interfaces like List, Set, and Map for storing collections of objects.

  • It includes classes like ArrayList, LinkedList, HashSet, and HashMap for implementing these interfaces.

  • Collections framework simplifies the process of storing, retrieving, and manipulating data in Java.

Add your answer

Q39. What is Asset management companies ?

Ans.

Asset management companies are firms that manage investment portfolios on behalf of clients to help them achieve their financial goals.

  • Asset management companies provide investment management services to individuals, corporations, and institutions.

  • They offer a range of investment products such as mutual funds, exchange-traded funds (ETFs), and separately managed accounts.

  • These companies analyze market trends, conduct research, and make investment decisions to maximize returns...read more

Add your answer

Q40. What is ad work.

Ans.

Ad work refers to the process of creating and managing advertisements for a company or product.

  • Ad work involves researching target audiences and creating compelling ad copy and visuals.

  • It also includes selecting the appropriate advertising channels, such as social media or print media.

  • Ad work requires analyzing the effectiveness of ads and making adjustments as needed.

  • Examples of ad work include creating a TV commercial, designing a billboard, or running a Facebook ad campaig...read more

Add your answer

Q41. What is mortgage

Ans.

A mortgage is a loan used to purchase a property, where the property serves as collateral for the loan.

  • Mortgages are typically long-term loans, with repayment periods ranging from 15 to 30 years.

  • Interest rates on mortgages can be fixed or adjustable.

  • Mortgages are secured loans, meaning that if the borrower defaults on the loan, the lender can foreclose on the property.

  • Mortgages are commonly used to purchase homes, but can also be used to purchase commercial properties or inve...read more

Add your answer

Q42. DNS and DHCP different.

Ans.

DNS resolves domain names to IP addresses, while DHCP assigns IP addresses to devices on a network.

  • DNS stands for Domain Name System and is responsible for translating domain names into IP addresses.

  • DHCP stands for Dynamic Host Configuration Protocol and is responsible for assigning IP addresses to devices on a network.

  • DNS is used to locate resources on a network, while DHCP is used to manage IP addresses and network configuration.

  • DNS operates on port 53, while DHCP operates ...read more

Add your answer

Q43. By default pst size.

Ans.

The default size of a PST file varies depending on the version of Outlook.

  • In Outlook 2003 and earlier, the default size limit is 2GB.

  • In Outlook 2007 and 2010, the default size limit is 20GB.

  • In Outlook 2013 and later, the default size limit is 50GB.

  • The size limit can be changed by modifying the registry or using third-party tools.

Add your answer

Q44. Smoke testing and sanity testing explain

Ans.

Smoke testing and sanity testing are types of software testing used to quickly assess the stability of a build.

  • Smoke testing is a preliminary test to check if the critical functionalities of the software work without any major issues.

  • Sanity testing is a subset of regression testing and focuses on testing specific areas of the software after changes have been made.

  • Smoke testing is usually performed before more in-depth testing, while sanity testing is done after specific chang...read more

Add your answer

Q45. What is wealth management ?

Ans.

Wealth management involves financial planning, investment management, and other financial services to help individuals and families grow and protect their wealth.

  • Involves creating a personalized financial plan based on individual goals and risk tolerance

  • Includes investment management to grow wealth through various asset classes

  • Provides services such as tax planning, estate planning, and retirement planning

  • Focuses on long-term financial goals and wealth preservation

  • Often offer...read more

Add your answer

Q46. What are investment banks ?

Ans.

Investment banks are financial institutions that provide services such as underwriting, mergers and acquisitions, and trading of securities.

  • Provide financial services to corporations, governments, and other institutions

  • Assist in raising capital through underwriting and issuing securities

  • Advise on mergers and acquisitions

  • Engage in trading of stocks, bonds, and other financial instruments

  • Examples include Goldman Sachs, J.P. Morgan, and Morgan Stanley

Add your answer

Q47. IP range describe

Ans.

IP range refers to a set of IP addresses that fall within a specific numerical range.

  • IP range is defined by a starting IP address and an ending IP address

  • It is used to identify a group of devices on a network

  • CIDR notation is commonly used to represent IP ranges, such as 192.168.0.0/24

  • IP ranges can be used for security purposes, such as firewall rules or access control lists

Add your answer

Q48. What is Cost Accounting

Ans.

Cost accounting is a branch of accounting that focuses on analyzing and controlling costs within a business.

  • It involves tracking and recording all costs associated with producing a product or providing a service.

  • Cost accountants analyze cost behavior, cost-volume-profit relationships, and cost variances.

  • It helps management make informed decisions about pricing, budgeting, and resource allocation.

  • Examples include determining the cost of goods sold, calculating the break-even p...read more

Add your answer

Q49. What is investment banking

Ans.

Investment banking involves providing financial services to corporations, governments, and other institutions, including raising capital, mergers and acquisitions, and advisory services.

  • Investment banking helps companies raise capital through issuing stocks and bonds

  • It also involves advising companies on mergers and acquisitions

  • Investment bankers provide financial advisory services to clients

Add your answer

Q50. What is NAV ?

Ans.

NAV stands for Net Asset Value, which is the value of a fund's assets minus its liabilities, divided by the number of shares outstanding.

  • NAV is used to determine the price of a single share in a mutual fund or ETF.

  • It is calculated by subtracting the fund's liabilities from its assets and dividing by the number of shares outstanding.

  • NAV is typically calculated at the end of each trading day.

  • Investors use NAV to track the performance of their investments and to buy or sell shar...read more

Add your answer

Q51. What is Hedging ?

Ans.

Hedging is a risk management strategy used to offset potential losses in investments by taking an opposite position in a related asset.

  • Hedging involves taking a position in a financial instrument to reduce or offset the risk of price movements in another asset.

  • Common hedging techniques include using options, futures contracts, and derivatives.

  • For example, a company may hedge against currency fluctuations by entering into a forward contract to lock in an exchange rate.

  • Hedging ...read more

Add your answer

Q52. Difference between hashset and hashcode

Ans.

HashSet is a collection that does not allow duplicate elements, while hashCode is a method used to generate a unique integer value for an object.

  • HashSet is a collection class in Java that does not allow duplicate elements.

  • HashCode is a method in Java that returns a unique integer value for an object.

  • HashSet uses hashCode method to determine uniqueness of elements.

  • Example: HashSet set = new HashSet<>(); set.add("apple"); set.add("banana");

  • Example: int hashCode = object.hashCod...read more

Add your answer

Q53. Explain salery and process requirement

Ans.

Salary and process requirements are important factors to consider when hiring a Senior Team Member.

  • Salary requirement refers to the expected compensation the candidate is seeking for the position.

  • Process requirement refers to the specific procedures or steps the candidate is experienced in or expects to follow in their work.

  • Salary and process requirements are usually discussed during the interview to ensure alignment between the candidate's expectations and the company's offe...read more

Add your answer

Q54. What is BFSI Domain

Ans.

BFSI stands for Banking, Financial Services, and Insurance domain which includes institutions and companies providing financial services.

  • BFSI domain encompasses banking, financial services, and insurance sectors

  • It includes institutions like banks, credit unions, insurance companies, investment funds, and stock brokerages

  • Professionals in BFSI domain deal with financial products, services, regulations, and risk management

  • Examples include JPMorgan Chase, Goldman Sachs, State Far...read more

Add your answer
Ans.

VPN is a secure way to access a private network remotely over the internet.

  • VPN stands for Virtual Private Network

  • It encrypts the data transmitted over the internet

  • It allows remote access to a private network

  • It provides security and privacy to the users

  • Examples of VPNs are OpenVPN, Cisco AnyConnect, etc.

Add your answer

Q56. Explain defect life cycle

Ans.

Defect life cycle is the process of identifying, reporting, fixing, retesting, and closing defects in software.

  • Defect identification: Defects are identified through testing or user feedback.

  • Defect reporting: Defects are reported in a defect tracking tool with details like steps to reproduce, severity, and priority.

  • Defect fixing: Developers fix the reported defects based on the information provided.

  • Defect retesting: Testers verify that the fixed defects are resolved and do not...read more

Add your answer

Q57. Golden rules of Accounting

Ans.

Golden rules of Accounting are basic principles that guide the recording of financial transactions.

  • Debit what comes in, credit what goes out (Real Accounts)

  • Debit the receiver, credit the giver (Personal Accounts)

  • Debit all expenses and losses, credit all incomes and gains (Nominal Accounts)

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at IGT Solutions

based on 31 interviews
Interview experience
3.8
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 362 Interview Questions
3.3
 • 318 Interview Questions
3.8
 • 211 Interview Questions
3.6
 • 195 Interview Questions
3.9
 • 152 Interview Questions
View all
Top Coforge Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter