Add office photos
Engaged Employer

Encora

3.8
based on 665 Reviews
Filter interviews by

60+ Catvision Interview Questions and Answers

Updated 14 Dec 2024
Popular Designations

Q1. What is difference between dot net and dot net core?

Ans.

Dot net is a framework while dot net core is a cross-platform, open-source framework.

  • Dot net is Windows-only while dot net core is cross-platform.

  • Dot net core is open-source while dot net is not.

  • Dot net core is modular and lightweight while dot net is monolithic.

  • Dot net core supports microservices architecture while dot net does not.

  • Dot net core has better performance and scalability than dot net.

Add your answer

Q2. What is difference between interface and abstract class

Ans.

Interface defines only method signatures while abstract class can have both method signatures and implementation.

  • An interface can be implemented by multiple classes while an abstract class can only be extended by one class.

  • An abstract class can have constructors while an interface cannot.

  • An abstract class can have non-abstract methods while an interface can only have abstract methods.

  • An abstract class can have instance variables while an interface cannot.

  • An abstract class can...read more

Add your answer

Q3. What exceptions have u faced while creating framework?

Ans.

I faced exceptions related to compatibility, synchronization, and data handling while creating a framework.

  • Compatibility issues with different browsers and operating systems

  • Synchronization problems with dynamic web elements

  • Handling large amounts of data and optimizing performance

  • Handling unexpected errors and exceptions

  • Maintaining code modularity and reusability

Add your answer

Q4. Whats middlware and how to write custom middlewares in Django

Ans.

Middleware in Django is a framework of hooks into Django's request/response processing. Custom middlewares can be written to perform additional functions.

  • Middleware is a framework of hooks into Django's request/response processing

  • Custom middlewares can be written by creating a class with methods like process_request, process_response, etc.

  • Middleware classes should be defined in a middleware.py file in the Django app

  • Middleware classes should be added to the MIDDLEWARE setting ...read more

Add your answer
Discover Catvision interview dos and don'ts from real experiences

Q5. What is difference between .Net and .Net core?

Ans.

The main difference between .Net and .Net Core is that .Net is a framework while .Net Core is a cross-platform, open-source framework.

  • Net Core is modular and lightweight compared to .Net

  • .Net Core supports cross-platform development while .Net is limited to Windows

  • .Net Core has better performance and scalability than .Net

  • Both frameworks have different APIs and libraries

Add your answer

Q6. Tell me about oops concept

Ans.

OOPs is a programming paradigm based on the concept of objects that interact with each other.

  • OOPs stands for Object-Oriented Programming.

  • It focuses on creating objects that have properties and methods to interact with other objects.

  • Encapsulation, inheritance, and polymorphism are the three main pillars of OOPs.

  • Encapsulation is the process of hiding the internal details of an object from the outside world.

  • Inheritance allows a new class to be based on an existing class, inherit...read more

Add your answer
Are these interview questions helpful?

Q7. how to implement the docker image with the libraries required in the runtime with the updated changes based on the requirement.

Ans.

To implement docker image with required libraries and updated changes, use Dockerfile and build command.

  • Create a Dockerfile with base image and required libraries

  • Copy the updated changes to the Dockerfile

  • Build the Docker image using 'docker build' command

  • Run the Docker container using 'docker run' command

Add your answer

Q8. How you can manage disputes in work

Ans.

Disputes can be managed by promoting open communication, active listening, seeking common ground, and involving a mediator if necessary.

  • Promote open communication to address issues early on

  • Practice active listening to understand all perspectives

  • Seek common ground and compromise to find a resolution

  • Involve a mediator if necessary to facilitate discussions

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is inheritance ?

Ans.

Inheritance is a mechanism in object-oriented programming where a new class is derived from an existing class.

  • It allows the new class to inherit the properties and methods of the existing class.

  • The existing class is called the parent or base class, and the new class is called the child or derived class.

  • The child class can add new properties and methods or override the ones inherited from the parent class.

  • Inheritance promotes code reuse and helps in creating a hierarchy of cla...read more

Add your answer

Q10. If a is present map a or else b which function can be used instead of if

Ans.

The ternary operator can be used instead of if.

  • The ternary operator is a shorthand version of if-else statement.

  • Syntax: condition ? value_if_true : value_if_false

  • Example: a ? map(a) : b

Add your answer

Q11. How to create a theme in magento 2. Multi site concept in M2

Ans.

To create a theme in Magento 2, use the theme development process. For multi-site concept, create a new website and store view.

  • Use the theme development process to create a new theme in Magento 2

  • Create a new website and store view for multi-site concept

  • Assign the theme to the store view

  • Customize the theme using CSS and LESS

  • Use the Magento 2 documentation for more information

Add your answer

Q12. What are types of structured query languages

Ans.

Types of structured query languages include SQL, PL/SQL, T-SQL, and others.

  • SQL (Structured Query Language) - widely used for managing relational databases

  • PL/SQL (Procedural Language/SQL) - Oracle's proprietary extension for SQL

  • T-SQL (Transact-SQL) - Microsoft's extension for SQL used in SQL Server

  • Others - include languages like MySQL, PostgreSQL, SQLite, etc.

Add your answer

Q13. 3.How is Streaming implemented in Spark? Explain with examples.

Ans.

Spark Streaming is implemented using DStreams which are a sequence of RDDs.

  • DStreams are created by receiving input data streams from sources like Kafka, Flume, etc.

  • The input data is then divided into small batches and processed using Spark's RDD operations.

  • The processed data is then pushed to output sources like HDFS, databases, etc.

  • Example: val lines = ssc.socketTextStream("localhost", 9999)

  • Example: val words = lines.flatMap(_.split(" "))

Add your answer

Q14. What is the UX Process you are following to do project?

Ans.

I follow a user-centered design process for UX projects.

  • Conduct research to understand user needs and behaviors

  • Create personas and user journeys

  • Design wireframes and prototypes

  • Test prototypes with users for feedback

  • Iterate based on feedback to improve user experience

Add your answer

Q15. How will you modify the layout of webpage using layout.xml

Ans.

layout.xml is used to modify the layout of a webpage. It defines the structure of the page.

  • Modify the layout of a webpage using layout.xml by defining the structure of the page

  • Use layout.xml to specify the position and size of elements on the page

  • Add or remove elements from the page using layout.xml

  • Modify the styling of elements using layout.xml

Add your answer

Q16. 1.How do we create RDDs in Spark? 2.What do you understand by Transformations in Spark?

Ans.

Creating RDDs in Spark involves loading data from external sources or parallelizing an existing collection.

  • RDDs can be created by loading data from external sources like HDFS, local file system, or any other data source supported by Hadoop.

  • RDDs can also be created by parallelizing an existing collection in the driver program.

  • Transformations in Spark are operations that create a new RDD from an existing one.

  • Examples of transformations include map, filter, flatMap, groupByKey, ...read more

Add your answer

Q17. Netflix is expanding to a new territory. What are the key considerations?

Ans.

Key considerations for Netflix expanding to a new territory

  • Market research to understand local preferences and competition

  • Licensing agreements for content distribution in the new territory

  • Localization of content and user interface to cater to the new audience

  • Infrastructure setup for streaming services in the new territory

  • Compliance with local regulations and censorship laws

  • Marketing and promotion strategies tailored to the new market

Add your answer

Q18. What is the differnce b/w Business rule and JavaScript? When to use what?

Ans.

Business rules are guidelines or constraints defined by a business, while JavaScript is a programming language used for web development.

  • Business rules are specific to a business domain and define constraints or guidelines for operations.

  • JavaScript is a programming language used for creating interactive web pages and web applications.

  • Business rules are typically defined by business analysts or stakeholders, while JavaScript is written by developers.

  • Use business rules to enforc...read more

Add your answer

Q19. what is diffrance between drop delete and truncate

Ans.

Drop, delete, and truncate are SQL commands used to remove data from a table, but they differ in their functionality and implications.

  • DROP command removes the entire table structure along with its data

  • DELETE command removes specific rows from a table based on a condition

  • TRUNCATE command removes all rows from a table but keeps the table structure intact

  • DROP is non-recoverable, DELETE can be rolled back, TRUNCATE is faster than DELETE

  • Example: DROP TABLE table_name, DELETE FROM ...read more

Add your answer

Q20. What is difference between lookup and extract?

Ans.

Lookup is used to find a specific value in a table while extract is used to retrieve a subset of data from a larger dataset.

  • Lookup searches for a specific value in a table and returns a related value from the same row or column.

  • Extract retrieves a subset of data from a larger dataset based on certain criteria.

  • Lookup is used to join tables while extract is used to filter data.

  • Lookup is commonly used in Excel while extract is commonly used in data analysis tools like Tableau.

  • Lo...read more

Add your answer

Q21. How do you compare STI with Polymorphic association

Ans.

STI is used for inheritance while polymorphic association is used for multiple associations

  • STI is used for modeling inheritance relationships where different classes share common attributes and behaviors

  • Polymorphic association is used when a model can belong to more than one other model on a single association

  • STI can lead to a large number of columns in a table, while polymorphic association requires an additional column to store the association type and ID

  • STI can be more eff...read more

Add your answer

Q22. How to split a 1000 records into 100 from input

Ans.

To split 1000 records into 100, divide the total number of records by the desired number of splits.

  • Use a loop to iterate through the records and add them to an array or list

  • Calculate the number of records per split by dividing the total number of records by the desired number of splits

  • Use another loop to split the records into the desired number of splits based on the calculated number of records per split

  • Ensure that any remaining records are added to the last split

Add your answer

Q23. Different between let , const,var. Closure in javascript

Ans.

let, const, and var are used to declare variables in JavaScript. Closures are functions that have access to their outer scope even after the outer function has finished executing.

  • let: block-scoped variable declaration, can be reassigned

  • const: block-scoped variable declaration, cannot be reassigned, but its properties can be modified

  • var: function-scoped variable declaration, can be reassigned

  • Closure: inner function has access to outer function's variables even after outer func...read more

Add your answer

Q24. Can we have lookup ( lookup in a single rule

Ans.

Yes, lookup can be used in a single rule.

  • Lookup can be used to retrieve data from another table or object.

  • It can be used in a single rule to fetch data and use it in the current rule.

  • Lookup can be used with filters to retrieve specific data.

  • Lookup can also be used to retrieve data from related objects.

Add your answer

Q25. How will you add multiple language support in M2

Ans.

Multiple language support in M2 can be added by creating language packs and configuring store views.

  • Create language packs for each language to be supported

  • Configure store views for each language

  • Translate all text strings in the theme and extensions

  • Use language switcher to allow users to switch between languages

Add your answer

Q26. Hibernate One to Many Relationships

Ans.

Hibernate allows mapping one-to-many relationships between entities using annotations or XML configuration.

  • Use @OneToMany annotation in the parent entity to define the relationship

  • Use @JoinColumn annotation to specify the foreign key column in the child entity

  • Use mappedBy attribute in @OneToMany annotation to specify the field in the child entity that owns the relationship

Add your answer

Q27. Give some examples for High priority and Low severity?

Ans.

High priority and low severity examples in software testing

  • High priority, low severity: Spelling mistakes in user interface text

  • High priority, low severity: Cosmetic issues like alignment of elements

  • High priority, low severity: Minor functionality bugs that do not impact critical features

Add your answer

Q28. Test method for private methods, trigger for updating related data of opportunity's contact and account

Ans.

Test private methods in trigger for updating related data of opportunity's contact and account

  • Create test data for Opportunity, Contact, and Account records

  • Call the private methods in the test class using System.assertEquals to verify the expected results

  • Use Test.startTest and Test.stopTest to isolate the trigger execution

Add your answer

Q29. What are types of join in SQL

Ans.

Types of joins in SQL include inner join, left join, right join, and full outer join.

  • Inner join: Returns rows when there is a match in both tables

  • Left join: Returns all rows from the left table and the matched rows from the right table

  • Right join: Returns all rows from the right table and the matched rows from the left table

  • Full outer join: Returns all rows when there is a match in either table

Add your answer

Q30. How you do competitive analysis, user research?

Ans.

I conduct competitive analysis by studying competitors' products and user research by gathering insights from target users.

  • Identify key competitors and analyze their products, features, and user experience.

  • Conduct user interviews, surveys, and usability tests to gather insights and feedback.

  • Create user personas and user journey maps to understand user needs and behaviors.

  • Utilize tools like Google Analytics, Hotjar, and A/B testing for data-driven decision making.

Add your answer

Q31. write down the terraform configuration file for implementing the virtual machine in azure cloud

Ans.

Terraform configuration file for creating a virtual machine in Azure cloud

  • Define the provider and resource blocks for Azure

  • Specify the virtual machine name, location, and resource group

  • Set the size of the virtual machine and the operating system image

  • Configure the network interface and security group

  • Define the storage account and disk for the virtual machine

  • Specify the admin username and password for the virtual machine

  • Add any additional configuration options as needed

Add your answer

Q32. Explain oops concepts in detail. Difference between Abstraction and interface.

Ans.

OOPs concepts include encapsulation, inheritance, polymorphism, and abstraction. Abstraction is a concept where only relevant information is shown to the user, while interface is a blueprint for classes.

  • OOPs concepts: encapsulation, inheritance, polymorphism, abstraction

  • Abstraction: showing only relevant information to the user

  • Interface: blueprint for classes, defines methods without implementation

  • Example: Abstraction - Car dashboard displaying speed without showing internal ...read more

Add your answer

Q33. Difference between bug severity and priority?

Ans.

Bug severity refers to the impact of a bug on the system, while bug priority refers to the urgency of fixing the bug.

  • Bug severity is the impact of a bug on the system, while bug priority is the urgency of fixing the bug.

  • Severity is usually categorized as low, medium, high, or critical based on the impact on the system.

  • Priority is usually categorized as low, medium, high, or urgent based on the urgency of fixing the bug.

  • For example, a bug that causes the system to crash would ...read more

Add your answer

Q34. What is defect life cycle

Ans.

Defect life cycle is the process of identifying, reporting, fixing, retesting, and closing defects in software development.

  • Defect identification: Defects are identified through testing or user feedback.

  • Defect reporting: Defects are reported in a defect tracking system with details like steps to reproduce and severity.

  • Defect fixing: Developers fix the reported defects based on the information provided.

  • Defect retesting: Testers verify that the fixed defects are indeed resolved....read more

View 1 answer

Q35. String reverse program Factorial program

Ans.

String reverse and factorial programs in array of strings.

  • For string reverse program, iterate through the string from end to beginning and append each character to a new string.

  • For factorial program, use a loop to multiply numbers from 1 to n.

  • Example for string reverse: Input 'hello' -> Output 'olleh'

  • Example for factorial: Input 5 -> Output 120 (5*4*3*2*1)

Add your answer

Q36. Importance of CSRF tokens and CSP headers

Ans.

CSRF tokens and CSP headers are important security measures to protect against cross-site scripting attacks.

  • CSRF tokens are used to prevent cross-site request forgery attacks by generating a unique token for each user session.

  • CSP headers help prevent cross-site scripting attacks by specifying which resources can be loaded on a webpage.

  • Both CSRF tokens and CSP headers are essential in securing web applications against malicious attacks.

Add your answer

Q37. Addition of two array and array reverse

Ans.

Add two arrays element-wise and reverse the resulting array of strings.

  • Iterate through both arrays and add corresponding elements together.

  • Reverse the resulting array of strings.

  • Handle edge cases like arrays of different lengths.

  • Example: ['1', '2', '3'] + ['4', '5', '6'] = ['5', '7', '9'] -> reverse -> ['9', '7', '5']

Add your answer

Q38. String method with explanation any 5

Ans.

String methods are used to manipulate and work with strings in programming languages.

  • toUpperCase(): Converts a string to uppercase

  • toLowerCase(): Converts a string to lowercase

  • charAt(index): Returns the character at the specified index

  • indexOf(substring): Returns the index of the first occurrence of a substring

  • split(delimiter): Splits a string into an array of substrings based on a delimiter

Add your answer

Q39. What is hoisting in javascript

Ans.

Hoisting is a JavaScript mechanism where variable and function declarations are moved to the top of their containing scope during compilation.

  • Variable declarations are hoisted to the top of their scope, but not their initializations.

  • Function declarations are fully hoisted, including their definitions.

  • Hoisting can lead to unexpected behavior if not understood properly.

Add your answer

Q40. What is bug life cycle

Ans.

Bug life cycle is the process of identifying, reporting, fixing, retesting, and closing bugs in software development.

  • Bug identification: QA engineer identifies a bug in the software.

  • Bug reporting: QA engineer reports the bug to the development team.

  • Bug fixing: Development team fixes the bug.

  • Bug retesting: QA engineer retests the bug to ensure it is fixed.

  • Bug closing: QA engineer closes the bug after verification.

Add your answer

Q41. How does export works in node js

Ans.

Export in Node.js allows modules to be reused in other files.

  • Exported modules can be imported using the require() function.

  • Exported modules can be a function, object, or a class.

  • Exported modules can also be renamed during import using the 'as' keyword.

  • Default exports can be used to export a single module from a file.

Add your answer

Q42. How do you scale the node application

Ans.

Scaling a node application involves horizontal or vertical scaling, load balancing, caching, and optimizing database queries.

  • Use horizontal scaling by adding more nodes to the cluster

  • Use vertical scaling by increasing the resources of the existing node

  • Implement load balancing to distribute traffic evenly

  • Use caching to reduce the load on the server

  • Optimize database queries to reduce response time

  • Use a containerization platform like Docker to manage the application

  • Implement aut...read more

Add your answer

Q43. Different types of agile ceremonies

Ans.

Agile ceremonies include sprint planning, daily stand-ups, sprint review, and retrospective.

  • Sprint planning: Team plans work for upcoming sprint

  • Daily stand-ups: Daily meetings to discuss progress and plan for the day

  • Sprint review: Demo of completed work to stakeholders

  • Retrospective: Team reflects on sprint and identifies improvements

Add your answer

Q44. What is steps of tablet production?

Ans.

Tablet production involves several steps including blending, granulation, compression, coating, and packaging.

  • Blending: Mixing active pharmaceutical ingredients with excipients.

  • Granulation: Forming granules from the blended mixture.

  • Compression: Compacting the granules into tablets.

  • Coating: Applying a protective or functional coating on the tablets.

  • Packaging: Packaging the tablets for distribution and sale.

Add your answer

Q45. What is elixir and its advantages

Ans.

Elixir is a functional, concurrent, general-purpose programming language built on the Erlang VM.

  • Elixir is known for its scalability and fault-tolerance, making it ideal for building distributed systems.

  • It has a syntax inspired by Ruby and a powerful metaprogramming system.

  • Elixir is highly extensible and has a strong focus on developer productivity.

Add your answer

Q46. What is ellipse?

Ans.

An ellipse is a closed curve that is shaped like a stretched circle.

  • It has two focal points, which are equidistant from the center.

  • The sum of the distances from any point on the ellipse to the two focal points is constant.

  • Ellipses are commonly used in mathematics, physics, and engineering.

  • Examples of ellipses include the orbits of planets around the sun and the shape of some lenses and mirrors.

Add your answer

Q47. what is circular reference cycle

Ans.

Circular reference cycle occurs when two or more objects reference each other, creating an infinite loop.

  • Circular reference cycle can lead to memory leaks as the objects involved will never be deallocated.

  • To prevent circular reference cycles, weak references can be used in one of the objects.

  • Example: Object A has a strong reference to Object B, and Object B has a strong reference to Object A, creating a circular reference cycle.

Add your answer

Q48. Explain defect life cycle

Ans.

Defect life cycle is the process of identifying, reporting, fixing, retesting, and closing defects in software development.

  • Defect identification: Defects are identified through testing, code reviews, or user feedback.

  • Defect reporting: Defects are reported in a defect tracking system with details like steps to reproduce, severity, and priority.

  • Defect fixing: Developers fix the reported defects by making necessary code changes.

  • Defect retesting: Testers verify that the fixed def...read more

Add your answer

Q49. Willing to reallocate

Ans.

Yes, willing to relocate for the right opportunity

  • I am open to relocating for a position that aligns with my career goals

  • I have relocated in the past for job opportunities and have found it to be a positive experience

  • I understand that relocation may be necessary for career advancement and am willing to make that commitment

Add your answer

Q50. Build a product for the Indian Army

Ans.

A rugged and versatile communication device for the Indian Army to enhance coordination and efficiency in the field.

  • Incorporate encrypted communication capabilities for secure information exchange

  • Include GPS tracking and mapping features for navigation in remote areas

  • Design the product to be durable and water-resistant to withstand harsh conditions

  • Integrate a long-lasting battery for extended use during missions

Add your answer

Q51. Describe STLC in testing

Ans.

STLC stands for Software Testing Life Cycle, which is a systematic process for testing software applications.

  • STLC involves planning, designing, executing, and reporting on tests throughout the software development life cycle.

  • It includes phases such as requirement analysis, test planning, test design, test execution, and test closure.

  • Each phase has specific objectives and deliverables to ensure the quality of the software product.

  • STLC helps in identifying defects early in the ...read more

Add your answer

Q52. Explain STLC process?

Ans.

STLC process is a systematic approach to software testing that includes planning, designing, executing, and reporting.

  • STLC stands for Software Testing Life Cycle

  • It includes phases like requirement analysis, test planning, test design, test execution, and test closure

  • Each phase has specific goals and deliverables

  • STLC ensures thorough testing of software to ensure quality and reliability

  • Example: In requirement analysis phase, testers review the requirements to identify test sce...read more

Add your answer

Q53. Define SDLC process

Ans.

SDLC process is a structured approach to software development that defines phases and activities from planning to deployment.

  • SDLC stands for Software Development Life Cycle

  • It includes phases like planning, analysis, design, implementation, testing, deployment, and maintenance

  • Each phase has specific goals, deliverables, and activities

  • Examples of SDLC models include Waterfall, Agile, and DevOps

Add your answer

Q54. Pls explain Plugins execution pipeline

Ans.

Plugins execution pipeline is the sequence of steps followed when a plugin is executed in a software system.

  • Plugins are first loaded into the system.

  • The system then determines the order in which the plugins will be executed.

  • Each plugin is executed according to its defined functionality.

  • Output from one plugin may serve as input to another plugin.

  • Finally, the system processes the results of all plugins and completes the execution.

Add your answer

Q55. Design a API rate limitter

Ans.

Implementing an API rate limiter to control the number of requests a user can make within a certain time frame.

  • Use a token bucket algorithm to track and limit the number of requests per user.

  • Set a limit on the number of requests allowed per user within a specific time window.

  • Implement a sliding window approach to track request timestamps and enforce rate limits.

  • Consider using Redis or a similar caching mechanism to store and manage request data efficiently.

Add your answer

Q56. Rails API best practices

Ans.

Rails API best practices

  • Use versioning in API endpoints for future changes

  • Implement proper error handling and response codes

  • Follow RESTful principles for resource naming and routing

  • Use serializers to format JSON responses efficiently

  • Implement authentication and authorization for secure access

Add your answer

Q57. What are plugs in elixir

Ans.

Plugs in Elixir are modules that can be used to transform or reject requests in a Phoenix application.

  • Plugs are functions that receive a connection struct and return a modified connection struct.

  • Plugs can be used for tasks such as authentication, logging, and request parsing.

  • Plugs are executed in the order they are defined in the pipeline.

  • Example: Plug.Logger logs requests and responses in a Phoenix application.

Add your answer

Q58. Steps in tablet production?

Ans.

Tablet production involves several steps including formulation, mixing, granulation, drying, compression, coating, and packaging.

  • Formulation of active ingredients and excipients

  • Mixing of ingredients to ensure uniform distribution

  • Granulation to form granules for compression

  • Drying to remove moisture content

  • Compression of granules into tablet form

  • Coating for taste masking or controlled release

  • Packaging for distribution and consumption

Add your answer

Q59. Create an application.

Ans.

An application for managing personal finances.

  • Allow users to input income and expenses

  • Provide visual representation of financial data

  • Include budgeting tools and goal setting features

Add your answer

Q60. Tds for consultant vendor

Ans.

TDS (Tax Deducted at Source) for consultant vendors is a tax deduction made by the payer while making payments to the consultant vendor.

  • TDS is applicable when the payment made to the consultant vendor exceeds a specified threshold.

  • The rate of TDS for consultant vendors is determined by the nature of the payment and the applicable tax laws.

  • The payer is responsible for deducting the TDS amount and depositing it with the government.

  • The consultant vendor can claim credit for the ...read more

Add your answer

Q61. Binary search on rotated array

Ans.

Binary search on rotated array involves finding a target value in a sorted array that has been rotated at an unknown pivot point.

  • Identify the pivot point by finding the minimum element in the array.

  • Divide the array into two subarrays based on the pivot point.

  • Perform binary search on the appropriate subarray to find the target value.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Catvision

based on 46 interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 428 Interview Questions
3.8
 • 359 Interview Questions
3.7
 • 263 Interview Questions
3.9
 • 261 Interview Questions
4.1
 • 203 Interview Questions
4.1
 • 153 Interview Questions
View all
Top Encora Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter