Filter interviews by
I applied via Approached by Company and was interviewed in Mar 2023. There were 2 interview rounds.
Salesforce security model includes profiles, roles, sharing rules, and field-level security.
Profiles define what users can see and do in the system
Roles determine record access based on hierarchy
Sharing rules extend access to records beyond role hierarchy
Field-level security restricts access to specific fields on objects
Salesforce also offers encryption, two-factor authentication, and other security features
I applied via Job Fair and was interviewed in Aug 2022. There was 1 interview round.
A typical day in a customer service representative's life involves handling customer inquiries, resolving issues, and providing excellent service.
Interacting with customers through various channels such as phone, email, or chat
Listening to customer concerns and addressing them promptly and effectively
Providing product information, troubleshooting assistance, and technical support
Processing orders, returns, and refunds
M...
Both excellent product and friendly service are important for customer satisfaction.
Excellent product ensures that customers receive high-quality and reliable solutions.
Friendly service creates a positive and personalized experience for customers.
A combination of both can lead to customer loyalty and positive word-of-mouth.
Examples: A restaurant with delicious food but rude staff may lose customers. Similarly, a friend...
Global Infotech Corporation interview questions for popular designations
I applied via Newspaper Ad and was interviewed in Oct 2022. There were 2 interview rounds.
I applied via Naukri.com
Mis.... Excel... Key shortcuts....
I applied via Campus Placement and was interviewed before Jul 2021. There were 2 interview rounds.
I applied via Naukri.com and was interviewed before May 2021. There was 1 interview round.
I was interviewed in Jun 2017.
I applied via Campus Placement and was interviewed before Oct 2020. There was 1 interview round.
Encapsulation is the process of hiding implementation details and providing access to only necessary information.
Encapsulation helps in achieving data abstraction and information hiding.
It allows for better control over data and prevents unauthorized access.
In Java, encapsulation is achieved through the use of access modifiers such as private, public, and protected.
For example, a class may have private variables that c...
A string is a sequence of characters used to represent text in programming.
Strings are often used for storing and manipulating text data.
In Java, strings are represented by the String class.
Strings can be concatenated using the + operator.
Strings are immutable, meaning they cannot be changed once created.
Examples of string literals include "hello world" and "42".
based on 4 interviews
Interview experience
based on 15 reviews
Rating in categories
Software Engineer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Lead
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Telecaller
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Computer Teacher
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Infosys
TCS
Wipro
HCLTech