Filter interviews by
I applied via Company Website and was interviewed in Sep 2023. There were 3 interview rounds.
Basic aptitude and c,c++ and basic electronics related mcq test
I applied via campus placement at Kongu Engineering College, Erode and was interviewed before Sep 2023. There were 4 interview rounds.
It was very easy , in on campus
Given an assignment to create an application
The second largest prime number is 97.
The largest prime number is 97, so the second largest prime number is 89.
Prime numbers are numbers that are only divisible by 1 and themselves.
Prime numbers are important in cryptography and number theory.
I applied via Walk-in and was interviewed before Mar 2022. There were 4 interview rounds.
Granite River Labs interview questions for popular designations
Top trending discussions
I was interviewed in Jan 2025.
2 MCQs sections based on SQL and Power BI.
posted on 21 Feb 2025
Types of denials in client partnerships include authorization, eligibility, medical necessity, and timely filing denials.
Authorization denials occur when services are provided without proper approval from insurance.
Eligibility denials happen when the patient's insurance coverage is not active or does not cover the service.
Medical necessity denials occur when the service provided is not deemed medically necessary by the...
Authentication (Auth) is the process of verifying the identity of a user or system. There are various types of authentication methods.
Authentication is crucial for ensuring security in systems and applications.
Types of authentication include password-based, biometric, two-factor authentication, and OAuth.
Examples: Password-based authentication requires users to enter a password to access their accounts. Biometric authe...
Non-covered refers to services not included in an insurance policy. Types include cosmetic procedures, experimental treatments, and certain elective surgeries.
Non-covered services are typically outlined in the insurance policy's exclusions section.
Examples of non-covered services may include cosmetic procedures like teeth whitening, experimental treatments not approved by the FDA, and elective surgeries like plastic su
I was interviewed in Jan 2025.
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There were 4 interview rounds.
S/4 HANA implementation involves migrating business processes to SAP's latest ERP system for improved efficiency and real-time analytics.
Data migration from legacy systems to S/4 HANA
Business process reengineering to align with S/4 HANA functionalities
Customization and configuration of S/4 HANA modules
Training employees on using the new system effectively
Testing and validation of the implemented solution
Setting up a master data set involves identifying data sources, cleansing data, defining data attributes, and establishing data governance.
Identify all relevant data sources that will be included in the master data set
Cleanse the data to ensure accuracy and consistency
Define data attributes such as data types, formats, and relationships
Establish data governance policies and procedures to maintain data quality and integ
I was interviewed in Dec 2024.
Our team follows a CI/CD workflow that includes automated testing, code reviews, and continuous integration.
Automated testing is run on every code change to catch bugs early.
Code reviews are conducted before merging changes to ensure code quality.
Continuous integration is used to automatically build and test code changes in a shared repository.
Deployment pipelines are set up to automate the release process.
Version cont...
Yes, there have been security incidents and I have handled them effectively.
Implemented security protocols to prevent future incidents
Conducted thorough investigation to identify the root cause
Collaborated with IT team to strengthen security measures
Communicated with stakeholders to ensure transparency and trust
Provided training to employees on cybersecurity best practices
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization determines the level of access or permissions a user has once their identity is confirmed.
Authentication is the process of logging in, while authorization is the process of granting or denyin...
LLD for an authentication and authorization system
Separate modules for authentication and authorization
Use of secure hashing algorithms for storing passwords
Role-based access control implementation
Audit logging for tracking user actions
Integration with external identity providers
Design a document managed storage like Google Drive as an E2E solution.
Implement user authentication and authorization for secure access.
Create a user-friendly interface for uploading, organizing, and sharing documents.
Include features like version control, file syncing, and search functionality.
Utilize cloud storage for scalability and accessibility.
Implement encryption for data security.
Integrate with third-party app
based on 4 interviews
Interview experience
based on 15 reviews
Rating in categories
Software Engineer
31
salaries
| â‚ą3 L/yr - â‚ą10 L/yr |
Senior Software Engineer
10
salaries
| â‚ą6 L/yr - â‚ą15 L/yr |
Fpga Design Engineer
7
salaries
| â‚ą4.3 L/yr - â‚ą13.1 L/yr |
Firmware Engineer
7
salaries
| â‚ą4 L/yr - â‚ą7.7 L/yr |
Hardware Engineer
5
salaries
| â‚ą4.3 L/yr - â‚ą5.2 L/yr |
Sasken
TCS
Wipro
HCLTech