Filter interviews by
The UX design process involves research, ideation, prototyping, testing, and iteration to create user-centered designs.
1. Research: Understand user needs through surveys and interviews. Example: Conducting user interviews to gather insights.
2. Define: Create user personas and scenarios to clarify target users. Example: Developing a persona for a busy professional.
3. Ideation: Brainstorm ideas and sketch initial co...
I am open to working overtime when necessary to meet project deadlines and support team goals.
I understand that overtime may be required during peak periods, such as project launches.
In my previous role, I often worked extra hours to ensure client satisfaction and timely delivery.
I believe that putting in extra effort can lead to better team collaboration and success.
A brute force attempt is a trial-and-error method used to decode encrypted data by trying all possible combinations until the correct one is found.
Brute force attempts are often used in password cracking, where every possible combination of characters is tried until the correct password is discovered.
This method is time-consuming and resource-intensive, but can be effective if the password is weak or short.
Brute f...
Bachelor's degree in Economics from XYZ University
Bachelor's degree in Economics
Graduated from XYZ University
Specialized in macroeconomics
Completed coursework in statistics and econometrics
Three UX principles are usability, consistency, and empathy.
Usability focuses on making the product easy to use and efficient for the user.
Consistency ensures that elements like buttons, colors, and fonts are uniform throughout the design.
Empathy involves understanding the user's needs, emotions, and behaviors to create a more user-centric design.
On-premises systems are hosted locally on a company's own servers, while cloud systems are hosted on remote servers accessed via the internet.
On-premises systems require physical hardware and maintenance, while cloud systems are managed by a third-party provider.
On-premises systems may have higher upfront costs for hardware and infrastructure, while cloud systems typically have a pay-as-you-go pricing model.
On-pre...
Two risks in inventory are obsolescence and theft.
Obsolescence: Inventory becoming outdated or obsolete, leading to potential losses.
Theft: Inventory being stolen, resulting in financial losses and potential disruptions in operations.
P2P process flow involves requisition, approval, purchase order creation, goods receipt, invoice receipt, and payment.
Requisition: Request for goods or services is made by the user.
Approval: Requisition is approved by the appropriate authority.
Purchase Order Creation: Purchase order is generated based on the approved requisition.
Goods Receipt: Goods or services are received and verified against the purchase order.
...
The work of a Housekeeping Supervisor involves overseeing cleaning staff, ensuring cleanliness, and maintaining standards in facilities.
Supervising cleaning staff to ensure tasks are completed efficiently.
Conducting regular inspections of rooms and common areas for cleanliness.
Training new employees on cleaning protocols and safety procedures.
Managing inventory of cleaning supplies and equipment.
Coordinating with ...
Apex trigger is a piece of code that executes before or after specific data manipulation events occur on Salesforce records.
Apex triggers are used to perform custom actions on Salesforce records like creating new records, updating fields, etc.
Triggers can be written for different events like before insert, before update, after insert, after update, etc.
Apex triggers are written in Salesforce's proprietary language...
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
GD related to GenAi on cloud
I applied via Naukri.com and was interviewed in Jul 2024. There were 2 interview rounds.
On-premises systems are hosted locally on a company's own servers, while cloud systems are hosted on remote servers accessed via the internet.
On-premises systems require physical hardware and maintenance, while cloud systems are managed by a third-party provider.
On-premises systems may have higher upfront costs for hardware and infrastructure, while cloud systems typically have a pay-as-you-go pricing model.
On-premises...
I applied via Company Website and was interviewed in Jul 2024. There was 1 interview round.
I applied via Approached by Company and was interviewed in Mar 2024. There were 3 interview rounds.
Sorting and searching algorithms are essential for efficient data manipulation and retrieval.
Sorting algorithms like quicksort, mergesort, and heapsort rearrange elements in a specific order.
Searching algorithms like binary search and linear search help find specific elements in a dataset.
Efficient algorithms can significantly improve performance in large datasets.
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
I am currently working as a software developer at a tech company.
Developing and maintaining software applications
Collaborating with team members on projects
Participating in code reviews and testing
Troubleshooting and debugging issues
Implementing new features and enhancements
A brute force attempt is a trial-and-error method used to decode encrypted data by trying all possible combinations until the correct one is found.
Brute force attempts are often used in password cracking, where every possible combination of characters is tried until the correct password is discovered.
This method is time-consuming and resource-intensive, but can be effective if the password is weak or short.
Brute force ...
I applied via Naukri.com
Two risks in inventory are obsolescence and theft.
Obsolescence: Inventory becoming outdated or obsolete, leading to potential losses.
Theft: Inventory being stolen, resulting in financial losses and potential disruptions in operations.
P2P process flow involves requisition, approval, purchase order creation, goods receipt, invoice receipt, and payment.
Requisition: Request for goods or services is made by the user.
Approval: Requisition is approved by the appropriate authority.
Purchase Order Creation: Purchase order is generated based on the approved requisition.
Goods Receipt: Goods or services are received and verified against the purchase order.
Invoi...
Sharding in MongoDB involves partitioning data across multiple servers to improve scalability and performance.
Sharding is achieved by dividing data into chunks based on a shard key
Each shard contains a subset of the data, distributed across multiple servers
MongoDB's sharding architecture includes config servers, query routers, and shard servers
Sharding can be implemented at the collection level in MongoDB
I am passionate about software development and believe in the company's mission and values.
I admire the company's innovative projects and technologies.
I resonate with the company's culture of collaboration and continuous learning.
I am excited about the opportunity to work with a talented team of developers.
I believe my skills and experience align well with the company's needs.
Top trending discussions
Some of the top questions asked at the Deloitte Digital interview -
The duration of Deloitte Digital interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 66 interview experiences
Difficulty level
Duration
based on 452 reviews
Rating in categories
Senior Consultant
286
salaries
| ₹22 L/yr - ₹36.3 L/yr |
Consultant
256
salaries
| ₹11 L/yr - ₹20 L/yr |
Graphic Designer
223
salaries
| ₹2.1 L/yr - ₹6.4 L/yr |
Analyst
112
salaries
| ₹5.7 L/yr - ₹11 L/yr |
Client Servicing Executive
74
salaries
| ₹2.2 L/yr - ₹4.8 L/yr |
DXC Technology
Mphasis
EXL Service
Sutherland Global Services