Filter interviews by
Factorial is the product of all positive integers up to a given number, denoted as n!.
Factorial of 0 is 1 (0! = 1).
Factorial of 1 is also 1 (1! = 1).
For n > 1, n! = n × (n-1) × (n-2) × ... × 1.
Example: 5! = 5 × 4 × 3 × 2 × 1 = 120.
Factorials grow very quickly; 10! = 3,628,800.
I want to join ConnectWise to leverage my skills in product management and contribute to innovative solutions in the tech industry.
ConnectWise's commitment to innovation aligns with my passion for developing cutting-edge technology solutions.
The company's focus on empowering IT service providers resonates with my desire to make a meaningful impact in the tech community.
I admire ConnectWise's collaborative culture,...
React key concepts include Props, State, and Hooks, essential for building dynamic user interfaces.
Props: Short for properties, used to pass data from parent to child components. Example: <ChildComponent name='John' />.
State: A component's internal data storage that can change over time. Example: const [count, setCount] = useState(0);.
Hooks: Functions that let you use state and other React features in functi...
Find and remove duplicates in an array of strings
Iterate through the array and use a Set to keep track of unique elements
Check if each element is already in the Set, if so, remove it from the array
There are several promise methods in JavaScript, including .then(), .catch(), .finally(), and more.
Common promise methods include .then(), .catch(), and .finally()
Other promise methods include .all(), .race(), and .resolve()
Examples: promise.then(), promise.catch(), promise.finally()
Closures are functions that have access to variables from their outer scope even after the outer function has finished executing.
Closures allow functions to access variables from their parent function's scope
They maintain references to their outer scope even after the outer function has finished executing
Closures are commonly used in event handlers and callbacks
XSS attack is a type of cyber attack where attackers inject malicious scripts into web pages viewed by other users.
XSS stands for Cross-Site Scripting.
Attackers inject malicious scripts into web pages to steal sensitive information or manipulate content.
Types of XSS attacks include stored, reflected, and DOM-based.
Prevent XSS attacks by validating input, encoding output, and using Content Security Policy.
Top 10 vulnerabilities include SQL injection, cross-site scripting, insecure deserialization, etc.
SQL injection
Cross-site scripting (XSS)
Insecure deserialization
Sensitive data exposure
Broken authentication
Security misconfigurations
XML external entities (XXE)
Broken access control
Security misconfigurations
Insufficient logging and monitoring
I tend to be overly critical of my own work, which can sometimes lead to perfectionism.
I often spend too much time on a task trying to make it perfect
I have difficulty delegating tasks to others because I want to ensure they are done correctly
I can be self-critical and have high expectations for myself
An array of strings can be used to implement a stack data structure.
Use an array to store the elements of the stack.
Keep track of the top of the stack using an index variable.
Push elements onto the stack by adding them to the end of the array.
Pop elements from the stack by removing the element at the top of the array.
I applied via Approached by Company and was interviewed in Sep 2024. There was 1 interview round.
There are several promise methods in JavaScript, including .then(), .catch(), .finally(), and more.
Common promise methods include .then(), .catch(), and .finally()
Other promise methods include .all(), .race(), and .resolve()
Examples: promise.then(), promise.catch(), promise.finally()
Closures are functions that have access to variables from their outer scope even after the outer function has finished executing.
Closures allow functions to access variables from their parent function's scope
They maintain references to their outer scope even after the outer function has finished executing
Closures are commonly used in event handlers and callbacks
Delegates are type-safe function pointers in C# that allow methods to be passed as parameters.
Delegates are similar to function pointers in C/C++.
They are used to create callback functions and event handling in C#.
Delegates can reference methods with matching signatures.
Example: delegate void MyDelegate(string message);
I applied via LinkedIn and was interviewed in Aug 2024. There were 2 interview rounds.
I contributed to process improvements, enhanced team collaboration, and ensured high-quality deliverables in my previous organization.
Implemented a new quality assurance process that reduced defects by 30%, leading to improved customer satisfaction.
Conducted regular training sessions for team members on best practices in quality analysis, fostering a culture of continuous improvement.
Collaborated with cross-functional ...
I seek to downgrade to focus on quality work and team collaboration rather than managerial responsibilities.
Desire to focus on hands-on quality analysis rather than administrative tasks.
Want to enhance my technical skills and contribute directly to projects.
Enjoy collaborating with team members and mentoring junior analysts.
Believe that a normal position allows for deeper engagement with quality processes.
I contributed several process improvements and quality initiatives that enhanced efficiency and reduced errors in my previous organization.
Implemented a new automated testing tool that reduced testing time by 30%.
Proposed a standardized documentation process that improved knowledge sharing among teams.
Conducted regular training sessions on quality standards, leading to a 15% decrease in defects.
Suggested a feedback loo...
I value both roles for their unique contributions to operational success and quality improvement.
Quality Assurance provides a strong foundation in process improvement, which is essential for effective leadership.
As a Quality Analyst, I develop a keen eye for detail, which is crucial in ensuring operational excellence.
Transitioning to an Operations Team Leader role would allow me to implement quality initiatives on a la...
I appeared for an interview in Mar 2025, where I was asked the following questions.
React key concepts include Props, State, and Hooks, essential for building dynamic user interfaces.
Props: Short for properties, used to pass data from parent to child components. Example: <ChildComponent name='John' />.
State: A component's internal data storage that can change over time. Example: const [count, setCount] = useState(0);.
Hooks: Functions that let you use state and other React features in functional ...
3 dsa questions online gfg platform
I have worked on various projects, including a mobile app for health tracking and a data analysis project for market research.
Developed a mobile app for tracking daily health metrics, which included features for logging food intake and exercise.
Conducted a data analysis project using Python and SQL to identify market trends for a local startup, resulting in actionable insights.
Collaborated on a team project to create a...
I admire this company's commitment to innovation and its positive impact on the community, aligning with my career goals and values.
The company's focus on cutting-edge technology resonates with my passion for innovation, as seen in my project on AI-driven healthcare solutions.
I appreciate the company's dedication to sustainability, which aligns with my values demonstrated through my volunteer work in environmental init...
I tend to be overly critical of my own work, which can sometimes lead to perfectionism.
I often spend too much time on a task trying to make it perfect
I have difficulty delegating tasks to others because I want to ensure they are done correctly
I can be self-critical and have high expectations for myself
I appeared for an interview in Mar 2025, where I was asked the following questions.
I want to join ConnectWise to leverage my skills in product management and contribute to innovative solutions in the tech industry.
ConnectWise's commitment to innovation aligns with my passion for developing cutting-edge technology solutions.
The company's focus on empowering IT service providers resonates with my desire to make a meaningful impact in the tech community.
I admire ConnectWise's collaborative culture, whic...
Pune does not have a native lion population; lions are primarily found in the Gir Forest of Gujarat, India.
Native Habitat: Lions are not native to Pune; they primarily reside in the Gir Forest National Park in Gujarat.
Conservation Efforts: The Asiatic lion population is protected and monitored in their natural habitat, with efforts to increase their numbers.
Zoos and Sanctuaries: While Pune may have lions in zoos, such ...
I applied via Job Portal and was interviewed in Oct 2024. There was 1 interview round.
Find and remove duplicates in an array of strings
Iterate through the array and use a Set to keep track of unique elements
Check if each element is already in the Set, if so, remove it from the array
As a Senior Software Engineer 2, I lead projects, mentor teams, and ensure high-quality software delivery.
Lead the design and architecture of software solutions, ensuring scalability and performance. For example, I designed a microservices architecture for a large-scale application.
Mentor junior engineers, providing guidance on best practices and code reviews to enhance their skills and productivity.
Collaborate with cr...
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
Authentication is the process of verifying the identity of a user, while authorization is the process of determining what resources a user can access.
Authentication can be done using various methods such as username/password, tokens, or biometrics.
Authorization involves assigning roles or permissions to users based on their identity.
Authentication and authorization are often implemented using frameworks like OAuth or J...
Use SQL query with ORDER BY and LIMIT to find 3rd highest salary
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 2,1 to skip first two highest salaries and get the third highest salary
Top trending discussions
The duration of Connectwise India interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 38 interview experiences
Difficulty level
Duration
based on 354 reviews
Rating in categories
5-10 Yrs
Not Disclosed
5-8 Yrs
Not Disclosed
2-4 Yrs
₹ 7-15 LPA
Technical Support Engineer
182
salaries
| ₹3.2 L/yr - ₹6 L/yr |
Senior Software Engineer
138
salaries
| ₹16.5 L/yr - ₹29.6 L/yr |
Security Analyst
122
salaries
| ₹3.5 L/yr - ₹6.1 L/yr |
Software Support Specialist
79
salaries
| ₹3.5 L/yr - ₹6.2 L/yr |
Software Engineer
67
salaries
| ₹4.5 L/yr - ₹14.8 L/yr |
ITC Infotech
CMS IT Services
KocharTech
3i Infotech