i
GlobalData
Filter interviews by
Clear (1)
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
Net Present Value is the difference between the present value of cash inflows and the present value of cash outflows.
NPV is used to determine the profitability of an investment or project.
It takes into account the time value of money and adjusts future cash flows to their present value.
A positive NPV indicates that the investment is profitable, while a negative NPV indicates that it is not.
For example, if an investment...
IPO stands for Initial Public Offering, which is the first time a company offers its shares to the public for purchase.
IPO is a way for companies to raise capital by selling shares to the public.
It allows the public to invest in the company and become shareholders.
The process involves underwriters who help the company determine the price of the shares and sell them to investors.
Companies typically go public when they w...
Top trending discussions
I applied via Referral and was interviewed before Dec 2020. There was 1 interview round.
I applied via Naukri.com and was interviewed before Mar 2021. There were 4 interview rounds.
I applied via Referral and was interviewed before May 2021. There were 4 interview rounds.
I applied via Company Website and was interviewed before May 2021. There were 3 interview rounds.
Intermediate
I was interviewed in Aug 2016.
Deloitte is a leading global professional services firm with a strong reputation for excellence and innovation.
Deloitte has a diverse range of clients across industries and sectors
The firm offers a wide range of services including audit, consulting, tax, and advisory
Deloitte has a strong focus on innovation and technology, with a dedicated research and development team
The firm has a strong commitment to corporate socia...
In 5 years, I see myself as a senior analyst with a team of my own, contributing to the growth of the company.
Leading a team of analysts
Contributing to the growth of the company
Continuing to learn and develop my skills
Building strong relationships with clients and colleagues
C is a procedural language while Java is an object-oriented language.
C is compiled while Java is interpreted
C has pointers while Java does not
Java has automatic garbage collection while C does not
Java has platform independence while C does not
Java has built-in exception handling while C does not
Networking is the process of connecting devices and systems to share information and resources.
Networking involves the use of hardware and software to connect devices and systems.
It allows for the sharing of information and resources such as files, printers, and internet access.
Networking can be done through wired or wireless connections.
Examples of networking technologies include Ethernet, Wi-Fi, and Bluetooth.
I believe my skills, experience, and passion make me the best fit for this job.
My experience in the field has prepared me well for this role.
I have a proven track record of success in similar positions.
My passion for the industry and dedication to my work set me apart from other candidates.
I am a quick learner and adaptable to new situations.
I am confident that I can make a positive contribution to the team and the com
It was a busy day filled with meetings and deadlines.
Had multiple meetings with clients and colleagues
Worked on completing a project before the deadline
Managed to finish all tasks on time
I am a highly motivated individual with a passion for learning and a strong work ethic.
I have a degree in computer science and have worked in the tech industry for 5 years.
I am proficient in programming languages such as Java, Python, and C++.
I am a team player and enjoy collaborating with others to solve complex problems.
In my free time, I enjoy hiking and playing basketball.
Use a loop to iterate through the array and keep track of the largest element.
Initialize a variable to store the largest element as the first element of the array
Loop through the array and compare each element to the current largest element
If the current element is larger, update the largest element variable
Return the largest element variable
3rd normal form is a database normalization technique where every non-key attribute is dependent on the primary key.
In 3NF, there should be no transitive dependencies between non-key attributes.
It reduces data redundancy and improves data integrity.
Example: A table with columns for customer ID, order ID, and product ID. The product name should not be stored in this table as it is dependent on the product ID, not the cu...
I enjoy studying psychology.
Fascinated by the workings of the human mind
Enjoy learning about different theories and approaches
Find it applicable to everyday life and relationships
Yes, I am comfortable with networking.
I have experience in setting up and maintaining networks.
I am familiar with different network protocols and technologies.
I have troubleshooted network issues and resolved them.
I have worked with both wired and wireless networks.
I am comfortable with configuring routers, switches, and firewalls.
HTML5 introduced new features like canvas, video, audio, and semantic elements compared to its previous version.
HTML5 introduced new semantic elements like <header>, <footer>, <nav>, <article>, <section> for better structure and accessibility.
HTML5 added support for audio and video elements without the need for plugins, making multimedia integration easier.
HTML5 introduced the <canvas&g...
I cannot think of any reason why you should not hire me.
I have the necessary skills and experience for the job.
I am a quick learner and can adapt to new situations easily.
I am a team player and can work well with others.
I am passionate about the work and will give my best effort.
I am reliable and can be counted on to meet deadlines.
I am open to feedback and willing to improve.
I have a positive attitude and can bring en
Yes, I am comfortable with relocation.
I have relocated for work in the past and have found it to be a positive experience.
I am open to exploring new places and cultures.
I understand that relocation may be necessary for career growth and development.
JavaScript is both clientside and serverside.
JavaScript is primarily used for clientside scripting in web browsers.
However, it can also be used for serverside scripting with Node.js.
Clientside JavaScript is executed by the user's browser.
Serverside JavaScript is executed by the server.
JavaScript can be used for both front-end and back-end development.
C is a low-level programming language while Java is a high-level programming language.
C is compiled while Java is interpreted
C has pointers while Java does not
C is closer to the hardware while Java is platform-independent
C is used for system programming while Java is used for web and mobile app development
My weakness is time management, but I improved by setting clear deadlines and prioritizing tasks.
Identified time management as a weakness
Started setting clear deadlines for tasks
Learned to prioritize tasks based on importance and urgency
Utilized tools like calendars and task lists to stay organized
Sought feedback from team members on time management improvements
DNS stands for Domain Name System, which is a system that translates domain names into IP addresses.
DNS is used to locate websites and other resources on the internet.
It works by translating human-readable domain names into machine-readable IP addresses.
DNS servers store information about domain names and their corresponding IP addresses.
Examples of DNS servers include Google DNS, OpenDNS, and Cloudflare DNS.
The OSI model has 7 layers that define how data is transmitted over a network.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
For example, the Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and applications.
The OSI mod...
Yes, it is possible to decompile bytecode in Java back to the original code.
Decompilation is the process of converting bytecode back to its original source code.
There are several tools available for decompiling Java bytecode, such as JD-GUI, FernFlower, and Procyon.
Decompiling bytecode can be useful for understanding how a program works, reverse engineering, or debugging.
However, the decompiled code may not be an exact...
JVM is the virtual machine that executes Java bytecode. It provides platform independence and memory management.
JVM stands for Java Virtual Machine
It interprets compiled Java code into machine language
JVM provides platform independence by executing bytecode on any platform
It manages memory allocation and garbage collection
Examples of JVM-based languages include Kotlin and Scala
Pointers are used in programming to manage memory and can be a potential security vulnerability if not handled properly.
Pointers allow direct access to memory locations, making it possible to manipulate data or execute arbitrary code.
Improper use of pointers can lead to buffer overflows, memory leaks, and other security vulnerabilities.
Pointers can be exploited by attackers to gain unauthorized access, execute maliciou...
Inheritance in Java allows a class to inherit properties and methods from another class, promoting code reuse.
Inheritance is achieved using the 'extends' keyword in Java.
The class that is being inherited from is called the superclass or parent class.
The class that inherits from the superclass is called the subclass or child class.
The subclass can access the public and protected members of the superclass.
Inheritance pro...
Abstraction is the process of simplifying complex systems by focusing on the essential details.
Abstraction involves hiding unnecessary details and exposing only the relevant information.
It allows us to create models or representations that capture the important aspects of a system.
Abstraction helps in managing complexity and improving understanding and communication.
For example, in programming, object-oriented abstract...
I would prefer using SQL for designing a database for a library.
SQL is a widely used language for managing relational databases.
It provides a structured and efficient way to store, retrieve, and manipulate data.
SQL allows for easy querying and joining of tables, which is essential for library operations.
It supports transactions and ensures data integrity.
SQL also offers various security features to protect sensitive li
A firewall is a network security system that monitors and controls incoming and outgoing network traffic.
Firewalls can be hardware or software-based
They can be configured to block or allow specific types of traffic
Firewalls can also be used to create virtual private networks (VPNs)
Examples of popular firewall software include Norton, McAfee, and Windows Firewall
based on 3 interviews
Interview experience
based on 12 reviews
Rating in categories
Associate Analyst
689
salaries
| ₹0 L/yr - ₹0 L/yr |
Analyst
593
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Analyst
273
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Researcher
225
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Project Manager
122
salaries
| ₹0 L/yr - ₹0 L/yr |
S&P Global
Thomson Reuters
Nielsen Holdings
Gartner