Filter interviews by
To find the second highest value in a table, we can use the ORDER BY and LIMIT clauses in SQL.
Write a SQL query to select all values from the table in descending order
Use the LIMIT clause to select the second row
Retrieve the value from the column containing the values
A cursor is a database object used to manipulate data in a result set.
A cursor allows you to iterate through a result set one row at a time.
It can be used to update or delete specific rows in a result set.
There are two types of cursors: static and dynamic.
Example: DECLARE cursor_name CURSOR FOR SELECT * FROM table_name;
Example: OPEN cursor_name; FETCH NEXT FROM cursor_name INTO variable_name;
Joins are used to combine data from two or more tables based on a related column between them.
Types of joins include inner join, left join, right join, and full outer join.
Inner join returns only the matching rows from both tables.
Left join returns all rows from the left table and matching rows from the right table.
Right join returns all rows from the right table and matching rows from the left table.
Full outer jo...
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language.
It is used to communicate with and manipulate databases.
SQL can be used to create, modify, and retrieve data from databases.
Common SQL commands include SELECT, INSERT, UPDATE, and DELETE.
SQL is widely used in web development and data analysis.
SQL is a programming language used to manage and manipulate relational databases.
DDL stands for Data Definition Language and is used to define the structure of a database.
DML stands for Data Manipulation Language and is used to manipulate data within a database.
Examples of DDL commands include CREATE, ALTER, and DROP.
Examples of DML commands include SELECT, INSERT, UPDATE, and DELETE.
SQL is a programming language used to manage and manipulate relational databases.
SQL stands for Structured Query Language.
It is used to create, modify, and query databases.
DDL (Data Definition Language) is a subset of SQL used to define the structure of a database.
DDL commands include CREATE, ALTER, and DROP.
I should be hired because of my experience and skills in SQL programming and database management.
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 2 interview rounds.
SQL is a programming language used to manage and manipulate relational databases.
DDL stands for Data Definition Language and is used to define the structure of a database.
DML stands for Data Manipulation Language and is used to manipulate data within a database.
Examples of DDL commands include CREATE, ALTER, and DROP.
Examples of DML commands include SELECT, INSERT, UPDATE, and DELETE.
SQL is a programming language used to manage and manipulate relational databases.
SQL stands for Structured Query Language.
It is used to create, modify, and query databases.
DDL (Data Definition Language) is a subset of SQL used to define the structure of a database.
DDL commands include CREATE, ALTER, and DROP.
I should be hired because of my experience and skills in SQL programming and database management.
I applied via Referral and was interviewed before Jun 2020. There were 5 interview rounds.
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language.
It is used to communicate with and manipulate databases.
SQL can be used to create, modify, and retrieve data from databases.
Common SQL commands include SELECT, INSERT, UPDATE, and DELETE.
SQL is widely used in web development and data analysis.
Joins are used to combine data from two or more tables based on a related column between them.
Types of joins include inner join, left join, right join, and full outer join.
Inner join returns only the matching rows from both tables.
Left join returns all rows from the left table and matching rows from the right table.
Right join returns all rows from the right table and matching rows from the left table.
Full outer join re...
A cursor is a database object used to manipulate data in a result set.
A cursor allows you to iterate through a result set one row at a time.
It can be used to update or delete specific rows in a result set.
There are two types of cursors: static and dynamic.
Example: DECLARE cursor_name CURSOR FOR SELECT * FROM table_name;
Example: OPEN cursor_name; FETCH NEXT FROM cursor_name INTO variable_name;
To find the second highest value in a table, we can use the ORDER BY and LIMIT clauses in SQL.
Write a SQL query to select all values from the table in descending order
Use the LIMIT clause to select the second row
Retrieve the value from the column containing the values
Top trending discussions
Write a string and count only the number of characters without spaces.
The process of boot involves loading the operating system into memory and initializing the hardware components of a computer.
BIOS or UEFI firmware is executed first
Bootloader is loaded into memory
Operating system kernel is loaded and initialized
Hardware components are initialized
Control is passed to the operating system
I applied via Job Fair and was interviewed in Oct 2024. There was 1 interview round.
I appeared for an interview before Aug 2020.
It depends on the specifics of the policy.
What is the coverage amount?
What is the deductible?
Are pre-existing conditions covered?
What is the cost to employees?
What is the network of providers?
What is the policy on maternity leave?
Is there a wellness program?
I applied via Naukri.com and was interviewed in Dec 2021. There were 3 interview rounds.
Python or C Coding slove the problem
Life based questions, like a feature planing
It's a tricky round with lots of questions to understand the aptitude
I applied via Walk-in and was interviewed before Dec 2023. There were 4 interview rounds.
I have a diverse background in marketing, sales, and project management.
Started my career in marketing at XYZ Company
Managed a team of sales representatives at ABC Company
Led a successful project to launch a new product at DEF Company
Amcat English assessment
Fraud involves intentional deception for financial or personal gain.
Fraud is a deliberate act of deception to secure unfair or unlawful gain.
Common types of fraud include identity theft, credit card fraud, and insurance fraud.
Fraud can occur in various industries such as finance, healthcare, and e-commerce.
Preventative measures against fraud include implementing security protocols, conducting regular audits, and educat...
Risk management is the process of identifying, assessing, and prioritizing risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and impact of unfortunate events.
Identifying potential risks that could impact an organization's objectives
Assessing the likelihood and impact of each risk
Prioritizing risks based on their potential impact and likelihood
Develop...
Trust and safety involve creating secure environments where users feel protected from harm and can engage freely.
Trust is built through transparency and consistent communication, such as clear privacy policies.
Safety measures include content moderation to prevent harmful or abusive behavior, like banning hate speech.
User verification processes, like two-factor authentication, enhance trust by ensuring genuine user iden...
based on 29 reviews
Rating in categories
Data Entry Operator
435
salaries
| ₹0.8 L/yr - ₹3.2 L/yr |
Processor
427
salaries
| ₹0.8 L/yr - ₹3.3 L/yr |
Software Engineer
425
salaries
| ₹2.4 L/yr - ₹9.1 L/yr |
Test Analyst
210
salaries
| ₹2.8 L/yr - ₹9 L/yr |
Senior Software Engineer
181
salaries
| ₹4 L/yr - ₹15 L/yr |
ITC Infotech
HTC Global Services
HERE Technologies
Collabera Technologies