i
Collegedunia
Filter interviews by
Clear (1)
I applied via Company Website and was interviewed before Jan 2023. There was 1 interview round.
I applied via Campus Placement and was interviewed in Nov 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2020. There were 3 interview rounds.
Top trending discussions
I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.
I was interviewed in Jan 2025.
I am a seasoned Operations Executive with over 10 years of experience in optimizing processes and driving efficiency.
Managed cross-functional teams to streamline operations
Implemented cost-saving initiatives resulting in 20% reduction in expenses
Led successful implementation of new ERP system
Improved customer satisfaction by 15% through process improvements
I applied via Referral and was interviewed in Jul 2019. There was 1 interview round.
I was interviewed in Jun 2020.
I applied via Company Website and was interviewed before Mar 2020. There was 1 interview round.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Start from the first element and compare it with the next element
If the first element is greater than the next element, swap them
Repeat this process for all elements in the list
Continue this process until no more swaps are needed
A Turing Machine is a theoretical device that can simulate any algorithmic computation.
It was proposed by Alan Turing in 1936 as a model for computation.
It consists of a tape, a head that can read and write symbols on the tape, and a set of rules for transitioning between states.
It can simulate any algorithmic computation, making it a powerful tool for theoretical computer science.
It is often used as a theoretical basi...
A hash function is a mathematical function that converts input data of arbitrary size into a fixed-size output.
Hash functions are used to index data in hash tables.
They are also used in cryptography to securely store passwords.
Examples of hash functions include MD5, SHA-1, and SHA-256.
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Business Development Manager
215
salaries
| ₹0 L/yr - ₹0 L/yr |
Content Writer
179
salaries
| ₹0 L/yr - ₹0 L/yr |
Operations Analyst
112
salaries
| ₹0 L/yr - ₹0 L/yr |
Business Analyst
90
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Analyst
87
salaries
| ₹0 L/yr - ₹0 L/yr |
Shiksha
Careers360
MeritNation
Toppr