Filter interviews by
Clear (1)
I was interviewed before Sep 2016.
Bachelor's degree in Industrial Design
Studied industrial design at XYZ University
Focused on technical aspects of design
Completed coursework in CAD software and prototyping
Participated in design projects and internships
I have 5 years of experience in technical design.
I have worked in technical design for 5 years.
I have experience with CAD software and creating technical drawings.
I have collaborated with engineers and product developers on design projects.
Top trending discussions
I was interviewed in Oct 2016.
I would create a comprehensive marketing plan, including market research, target audience identification, pricing strategy, and promotional tactics.
Conduct market research to identify target audience and competitors
Develop a pricing strategy based on cost analysis and market demand
Create a promotional plan including advertising, PR, and social media campaigns
Coordinate with sales team to ensure product availability and...
I applied via Naukri.com and was interviewed before Jun 2021. There were 4 interview rounds.
Case study on two of three business questions.
5 case study on excel
I applied via Recruitment Consulltant and was interviewed before Feb 2023. There was 1 interview round.
I applied via Referral and was interviewed before Apr 2023. There were 2 interview rounds.
I applied via Approached by Company and was interviewed before Oct 2023. There were 4 interview rounds.
Experienced Senior Manager with a proven track record in leading teams and driving business growth.
Over 10 years of experience in management roles
Strong leadership skills and ability to motivate teams
Track record of achieving targets and exceeding expectations
Excellent communication and problem-solving skills
Previous experience in successfully launching new products
Cyber threats in a system can include malware, phishing attacks, ransomware, insider threats, and DDoS attacks.
Malware: malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Phishing attacks: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
Ransomware: a type of malware that encrypts a user's files and demand...
To obtain ISO 27001 certification, I would approach by conducting a gap analysis, implementing necessary controls, training employees, and undergoing a certification audit.
Conduct a gap analysis to identify current security measures and areas needing improvement
Implement necessary controls and policies to meet ISO 27001 requirements
Train employees on security protocols and best practices
Prepare for a certification audi...
I am looking for a competitive salary that reflects my experience, skills, and the responsibilities of the Senior Manager role.
I have X years of experience in management roles, including Y years in a similar senior position.
I have successfully led teams and projects, resulting in increased efficiency and profitability.
Based on research of industry standards and the responsibilities of the Senior Manager role, I believe...
I can join within 2 weeks of receiving a formal offer.
I currently have a two-week notice period at my current job.
I am available to start immediately after that.
I can provide any necessary documentation promptly.
I consider factors such as career growth opportunities, company culture, work-life balance, and job satisfaction when deciding on the length of my stay.
Career growth opportunities: I look for opportunities to advance my skills and take on new challenges within the company.
Company culture: I value a positive and supportive work environment where I can thrive and collaborate with colleagues.
Work-life balance: I prioritiz...
Separate out 0's, 1's, and 2's in an array
Create three variables to count the number of 0's, 1's, and 2's in the array
Loop through the array and increment the respective variable for each occurrence
Create a new array and add the counted number of 0's, 1's, and 2's in order
Remove duplicates from given array of strings
Create a new empty array
Loop through the original array and check if the element already exists in the new array
If not, add it to the new array
Return the new array
Loop in linked list can be detected using Floyd's cycle-finding algorithm.
Floyd's cycle-finding algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop, the faster pointer will eventually catch up to the slower pointer.
If there is no loop, the faster pointer will reach the end of the list.
Time complexity of this algorithm is O(n) and space complexity is O(1).
I applied via LinkedIn and was interviewed in Feb 2024. There were 5 interview rounds.
It was lengthy, detailed, interesting and difficult
Legal Associate
42
salaries
| ₹0 L/yr - ₹0 L/yr |
Review Analyst
25
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Legal Associate
17
salaries
| ₹0 L/yr - ₹0 L/yr |
Legal Consultant
13
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Associate
13
salaries
| ₹0 L/yr - ₹0 L/yr |
BYJU'S
upGrad
Unacademy
Upstox