Filter interviews by
To reverse an array of strings, iterate through the array and swap elements from start to end.
Iterate through the array using two pointers, one starting from the beginning and the other from the end.
Swap elements at the two pointers until they meet in the middle.
Repeat until all elements are swapped and the array is reversed.
Scrum is an agile framework for managing complex projects, emphasizing collaboration, flexibility, and iterative progress.
Scrum promotes teamwork through defined roles: Scrum Master, Product Owner, and Development Team.
It uses time-boxed iterations called Sprints, typically lasting 2-4 weeks, to deliver incremental value.
Daily Stand-ups are held to synchronize the team and address any obstacles.
The Sprint Review a...
ERP consulting involves providing expertise and guidance on implementing and optimizing ERP systems for businesses.
Helping businesses select the right ERP system for their needs
Assisting with the implementation and customization of the ERP system
Providing training to employees on how to use the ERP system effectively
Offering ongoing support and maintenance for the ERP system
Analyzing business processes to identify...
Dotnet SQL DB integration involves using ADO.NET, Entity Framework, and LINQ for database operations in .NET applications.
ADO.NET provides classes for connecting to SQL databases, executing commands, and retrieving results.
Entity Framework is an ORM that simplifies data access by allowing developers to work with data as objects.
LINQ (Language Integrated Query) allows querying SQL databases using C# syntax, making ...
ERP stands for Enterprise Resource Planning, a software system that helps organizations manage and integrate their important business processes.
ERP software typically includes modules for finance, human resources, supply chain management, and customer relationship management.
It helps streamline processes, improve efficiency, and provide real-time data for decision-making.
Examples of popular ERP systems include SAP...
OWASP Top 10 is a list of the top 10 most critical web application security risks and their mitigation strategies.
Injection: Use parameterized queries to prevent SQL injection.
Broken Authentication: Implement strong password policies and multi-factor authentication.
Sensitive Data Exposure: Encrypt sensitive data both at rest and in transit.
XML External Entities (XXE): Disable external entity references in XML pars...
My expected CTC is negotiable based on the job responsibilities and market standards.
My expected CTC is based on my experience, skills, and the job requirements.
I am open to discussing the salary range during the interview process.
I am looking for a competitive salary package that aligns with my expertise in security consulting.
OOPs concepts are the fundamental principles of object-oriented programming.
Encapsulation: bundling of data and methods that operate on that data
Inheritance: ability of a class to inherit properties and characteristics from its parent class
Polymorphism: ability of objects to take on multiple forms or behaviors
Abstraction: hiding of complex implementation details and showing only the necessary information
Lists are dynamic and can hold different data types, while arrays are fixed in size and can only hold one data type.
Lists can be resized during runtime, while arrays cannot.
Lists are implemented as classes in most programming languages, while arrays are primitive data types.
Lists can hold different data types, while arrays can only hold one data type.
Lists are more flexible and easier to work with, while arrays ar...
Yes, Java is an object-oriented programming language.
Java supports all the features of OOP such as encapsulation, inheritance, and polymorphism.
Objects are created from classes in Java.
Example: class Car { String make; int year; } Car myCar = new Car();
Java also has interfaces which allow for abstraction and multiple inheritance.
I applied via Campus Placement and was interviewed before May 2022. There were 4 interview rounds.
As i was fresher i need to appear in a test where i got around 40 mcq related to English, Aptitude and coding
Yes, Java is an object-oriented programming language.
Java supports all the features of OOP such as encapsulation, inheritance, and polymorphism.
Objects are created from classes in Java.
Example: class Car { String make; int year; } Car myCar = new Car();
Java also has interfaces which allow for abstraction and multiple inheritance.
Lists are dynamic and can hold different data types, while arrays are fixed in size and can only hold one data type.
Lists can be resized during runtime, while arrays cannot.
Lists are implemented as classes in most programming languages, while arrays are primitive data types.
Lists can hold different data types, while arrays can only hold one data type.
Lists are more flexible and easier to work with, while arrays are fas...
OOPs concepts are the fundamental principles of object-oriented programming.
Encapsulation: bundling of data and methods that operate on that data
Inheritance: ability of a class to inherit properties and characteristics from its parent class
Polymorphism: ability of objects to take on multiple forms or behaviors
Abstraction: hiding of complex implementation details and showing only the necessary information
Library management system
1 DBMS Query Questions and one programming based coding scenerio.
To reverse an array of strings, iterate through the array and swap elements from start to end.
Iterate through the array using two pointers, one starting from the beginning and the other from the end.
Swap elements at the two pointers until they meet in the middle.
Repeat until all elements are swapped and the array is reversed.
Scrum is an agile framework for managing complex projects, emphasizing collaboration, flexibility, and iterative progress.
Scrum promotes teamwork through defined roles: Scrum Master, Product Owner, and Development Team.
It uses time-boxed iterations called Sprints, typically lasting 2-4 weeks, to deliver incremental value.
Daily Stand-ups are held to synchronize the team and address any obstacles.
The Sprint Review allows...
I applied via Approached by Company and was interviewed in Jun 2024. There was 1 interview round.
I applied via Campus Placement and was interviewed in Jan 2024. There were 2 interview rounds.
Can artifical intelligence replace humans
I am a detail-oriented and analytical Auditor with a strong background in financial analysis and risk assessment.
I have a Bachelor's degree in Accounting and have obtained my CPA certification.
I have experience conducting audits for both public and private companies, ensuring compliance with regulations and identifying areas for improvement.
I am skilled in data analysis and have a keen eye for identifying discrepancies...
Aptitude topic was as generally appears in other placement tests , coding questions(not that much hard )
I applied via Monster and was interviewed in Jun 2023. There were 4 interview rounds.
Web application security testing involves assessing the security of web applications to identify vulnerabilities and weaknesses.
Identify potential security risks and threats in the web application
Conduct vulnerability assessments and penetration testing
Review code for security flaws and vulnerabilities
Test authentication and authorization mechanisms
Utilize tools like OWASP ZAP, Burp Suite, and Nmap for testing
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate databases. Mitigation involves input validation, parameterized queries, and using ORM frameworks.
Input validation: Validate and sanitize user input to prevent malicious SQL code from being executed.
Parameterized queries: Use parameterized queries to separate SQL code from user input, reducing the risk of SQL inj...
OWASP Top 10 is a list of the top 10 most critical web application security risks and their mitigation strategies.
Injection: Use parameterized queries to prevent SQL injection.
Broken Authentication: Implement strong password policies and multi-factor authentication.
Sensitive Data Exposure: Encrypt sensitive data both at rest and in transit.
XML External Entities (XXE): Disable external entity references in XML parsers.
S...
My expected CTC is negotiable based on the job responsibilities and market standards.
My expected CTC is based on my experience, skills, and the job requirements.
I am open to discussing the salary range during the interview process.
I am looking for a competitive salary package that aligns with my expertise in security consulting.
I applied via Campus Placement and was interviewed in Apr 2023. There were 5 interview rounds.
Aptitude test consist of basic aptitude questions, logical and reasoning questions, computer fundamentals questions, Automata questions etc.
GD was group wise we were in divided in groups and each groups were given a mentor. They give us two topics to choose. We were given 5G in India and How AI impacts future.
Top trending discussions
The duration of Crowe Horwath interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 23 interview experiences
Difficulty level
Duration
based on 129 reviews
Rating in categories
Senior Software Engineer
43
salaries
| ₹18.2 L/yr - ₹39 L/yr |
Senior Technical Consultant
30
salaries
| ₹9.3 L/yr - ₹36.3 L/yr |
Manager
28
salaries
| ₹14.5 L/yr - ₹41 L/yr |
Software Developer
27
salaries
| ₹6 L/yr - ₹13.4 L/yr |
Senior Consultant
22
salaries
| ₹12.9 L/yr - ₹27 L/yr |
BDO India LLP
RSM India
Grant Thornton Bharat
NAV Backoffice