i
Hewlett Packard Enterprise
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Company Website and was interviewed in Apr 2023. There were 3 interview rounds.
Clustering algorithms can reduce cost by optimizing resource allocation and improving efficiency.
Identify patterns in data to optimize resource allocation
Reduce redundancy by grouping similar data points together
Improve efficiency by streamlining processes based on cluster analysis
Examples: Using k-means clustering to optimize server allocation in a data center, grouping similar customer profiles for targeted marketing
Top trending discussions
I applied via Approached by Company and was interviewed in Oct 2023. There were 3 interview rounds.
2 coding questions and should complete one after another
60 min test with multiple choice questions
posted on 23 Aug 2023
I applied via Approached by Company and was interviewed in Jul 2023. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Jul 2022. There were 16 interview rounds.
Sitting arrangement questions
Blood group relationship
Cloud computing Testing
HTML css java script
What is DATA base management system
A data structure is a way of organizing and storing data in a computer so that it can be accessed and manipulated efficiently.
Data structures provide a means to manage and organize data in a logical and efficient manner.
They define the relationship between the data, allowing for easy retrieval and modification.
Examples of data structures include arrays, linked lists, stacks, queues, trees, and graphs.
Java is a popular programming language known for its platform independence and extensive libraries.
Java is an object-oriented language that allows developers to write code once and run it on any platform.
It provides a robust and secure environment for developing and executing applications.
Java has a vast collection of libraries and frameworks that simplify development and enhance productivity.
It supports multithreading...
JavaScript characters include letters, numbers, symbols, and special characters.
JavaScript characters can be used to create strings, numbers, and perform operations.
Examples of JavaScript characters include 'a', '1', '$', and '&'.
A software engineer is a professional who designs, develops, and maintains software applications.
Software engineers use programming languages and tools to create software solutions.
They analyze user requirements and design software architecture.
Software engineers write code, test and debug software, and ensure its functionality.
They collaborate with other team members and follow software development best practices.
Exam...
The models of software engineering refer to different approaches or methodologies used in software development.
Waterfall model
Agile model
Iterative model
Spiral model
V-model
A risk management system is a software tool or platform that helps organizations identify, assess, and mitigate risks.
A risk management system helps organizations identify potential risks and their impact on business operations.
It assesses the likelihood of risks occurring and the severity of their impact.
The system provides tools for documenting and tracking risks, assigning responsibilities, and implementing mitigati...
An operating system is a software that manages computer hardware and software resources and provides common services for computer programs.
Manages computer hardware and software resources
Provides common services for computer programs
Controls and coordinates computer operations
Acts as an intermediary between users and computer hardware
Examples: Windows, macOS, Linux, Android, iOS
Software testing is the process of evaluating a software system to identify defects or errors.
Software testing is essential to ensure the quality and reliability of software.
It involves executing the software with the intention of finding bugs or issues.
Testing can be done manually or using automated tools.
Different types of testing include unit testing, integration testing, system testing, and acceptance testing.
Examp...
Cloud computing Testing
Blood group relationship
Sitting arrangement questions
Alphabet letter coding
Blood group relationship between parents and children
Blood group relationship between parents and children
I applied via Naukri.com and was interviewed in Jul 2022. There was 1 interview round.
Indexes are used to improve database performance. Clustered indexes determine the physical order of data, while non-clustered indexes do not.
Indexes are used to speed up data retrieval operations in a database.
Clustered indexes determine the physical order of data in a table, while non-clustered indexes do not.
A table can have only one clustered index, but multiple non-clustered indexes.
Clustered indexes are generally ...
Query to delete duplicate rows from a table
Use GROUP BY clause to group the rows by their unique values
Use HAVING clause to filter out the groups with count greater than 1
Use DELETE statement to delete the duplicate rows
Singleton pattern restricts the instantiation of a class to a single instance and provides a global point of access to it.
Create a private constructor to restrict instantiation of the class
Create a private static instance of the class
Create a public static method to access the instance
Ensure thread safety if necessary
Examples: Database connection, Logger, Configuration settings
Handle exceptions in stored procedures by using TRY-CATCH blocks.
Use TRY-CATCH blocks to catch and handle exceptions
Log the error message and severity level
Rollback the transaction if necessary
Rethrow the error if it cannot be handled
Use RAISERROR to raise custom error messages
SOLID principles are a set of five design principles that help in creating maintainable and scalable software.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open-Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.
I - Interface Segregation Principle: C...
throw is used to throw an exception while throw exception is used to throw a specific exception.
throw is used to throw any type of exception while throw exception is used to throw a specific type of exception.
throw exception is followed by the type of exception that needs to be thrown.
throw can be used to throw any object while throw exception can only be used to throw an exception object.
Example: throw new Exception("
The center limit theorem states that the sum or average of a large number of independent and identically distributed random variables will tend towards a normal distribution.
The theorem applies to a wide range of distributions, not just normal distributions.
It is often used in statistical analysis to estimate population parameters.
The theorem assumes that the random variables are independent and identically distributed...
Covariance measures how two variables vary together, while correlation measures the strength of their linear relationship.
Covariance can be positive, negative, or zero, indicating the direction of the relationship between the variables.
Correlation ranges from -1 to 1, with 0 indicating no linear relationship and -1 or 1 indicating a perfect negative or positive linear relationship, respectively.
Covariance is affected b...
Embeddings are a way to represent words or phrases as vectors in a high-dimensional space.
Embeddings are learned through neural networks that analyze large amounts of text data.
They capture semantic and syntactic relationships between words.
They are used in natural language processing tasks such as language translation and sentiment analysis.
Popular embedding models include Word2Vec and GloVe.
word2vec is a neural network model used to generate word embeddings.
word2vec uses a shallow neural network with one input layer, one hidden layer, and one output layer.
It learns to predict the context of a word by training on a large corpus of text.
The output of the hidden layer is used as the word embedding.
There are two approaches to word2vec: continuous bag of words (CBOW) and skip-gram.
CBOW predicts a word given it...
API stands for Application Programming Interface. It is a set of protocols and tools for building software applications.
API is a way for different software components to communicate with each other
It defines how software components should interact with each other
API can be deployed on a server or cloud platform
API can be accessed through HTTP requests
API documentation is important for developers to understand how to us
String
Merit and demerit of Machine learning ?
General Aptitude and reasoning
Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.
It involves dividing larger tables into smaller ones and defining relationships between them.
Normalization helps to eliminate data inconsistencies and anomalies.
There are different levels of normalization, such as first normal form (1NF), second normal form (2NF), and so on.
Normalization can improve database pe...
Polymorphism is the ability of an object to take on many forms.
It allows objects of different classes to be treated as if they were objects of the same class.
It is achieved through method overriding and method overloading.
Example: A shape class can have multiple subclasses like circle, square, etc. and all can be treated as shapes.
Example: A method can take an object of a parent class as a parameter and it can accept a
Stack is a data structure that follows LIFO. Pre and post tree formation are methods of traversing a tree.
Stack is used for backtracking, undoing, and recursion.
Pre-order traversal visits the root node first, then left subtree, then right subtree.
Post-order traversal visits the left subtree, then right subtree, then root node.
posted on 12 May 2022
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 3 interview rounds.
based on 1 interview
Interview experience
Technical Support Engineer
903
salaries
| ₹1.8 L/yr - ₹8 L/yr |
Process Associate
638
salaries
| ₹1.1 L/yr - ₹5.5 L/yr |
Technical Solutions Consultant
590
salaries
| ₹5 L/yr - ₹16.7 L/yr |
Software Engineer
560
salaries
| ₹10 L/yr - ₹18.8 L/yr |
Financial Analyst
422
salaries
| ₹3.5 L/yr - ₹13 L/yr |
Dell
IBM
Cisco
Oracle