i
Icertis
Filter interviews by
Clear (1)
I was interviewed in Jan 2024.
The query selects the first name and last name of users from a database.
Use SELECT statement to retrieve specific columns from a table
Specify the columns to be selected after the SELECT keyword
Table name should be specified before the FROM keyword
I applied via Referral and was interviewed in Feb 2024. There was 1 interview round.
Contract lifecycle management involves managing contracts from creation to execution to renewal or termination.
Involves managing contracts from creation to execution to renewal or termination
Includes drafting, negotiation, approval, and monitoring of contracts
Ensures compliance with terms and conditions, tracking key dates and milestones
Utilizes software solutions for efficient contract management
Improves visibility, r...
Icertis is a leading provider of contract lifecycle management (CLM) software solutions.
Icertis offers a cloud-based platform for managing contracts and related processes.
Their software helps organizations streamline contract management, improve compliance, and reduce risk.
Icertis has a global customer base across various industries, including healthcare, manufacturing, and technology.
The company was founded in 2009 an
I applied via Referral and was interviewed in Jan 2024. There was 1 interview round.
Contracting and esignature involve legally binding agreements and electronic signatures.
Contracting refers to the process of creating and agreeing upon a legally binding agreement between two or more parties.
Esignature, or electronic signature, is a digital form of signature that can be used to sign documents electronically.
Esignature technology allows for the signing of contracts and other documents online, making the...
UAT stands for User Acceptance Testing, where end users validate the system meets their requirements. Change request is a formal proposal to alter a system.
UAT is the final phase of testing before the system is released to end users
End users are responsible for executing test cases and providing feedback during UAT
Change request is a formal document submitted to request changes to a system
Change requests can include mo...
I applied via Referral
Icertis interview questions for designations
I applied via Naukri.com and was interviewed in Jan 2023. There were 3 interview rounds.
Mutating triggers and cursors are database concepts used in procedures to perform specific actions.
Mutating triggers are triggers in Oracle databases that are fired when a row is updated, causing the trigger to see the data as both the original and updated values.
Cursors are database objects used to retrieve and manipulate data in a set row by row.
Procedures are stored blocks of code that can be executed on demand in a
Get interview-ready with Top Icertis Interview Questions
I applied via Referral and was interviewed before Nov 2023. There was 1 interview round.
Currently working as a Functional Consultant in XYZ company in New York. Looking for new challenges and growth opportunities.
Currently working as a Functional Consultant in XYZ company
Located in New York
Seeking new challenges and growth opportunities
I applied via Naukri.com and was interviewed in Nov 2021. There was 1 interview round.
Top trending discussions
I applied via Company Website and was interviewed before Apr 2022. There were 4 interview rounds.
CLM related scenarios. Both implementation and post implementation hyper care solutions. Project Management scenarios.
Find median of 2 sorted arrays in O(log N) time complexity and O(1) space complexity
Use binary search to find the partition point in both arrays
Calculate the median based on the partition point and array sizes
Adjust the partition points based on the median value
Repeat until the partition points are at the median
Handle edge cases such as empty arrays and uneven array sizes
Anagram of strings in O(1) space complexity
Use a fixed size array of integers to store the frequency of characters in the first string
Iterate through the second string and decrement the frequency of each character in the array
If all the frequencies are zero, then the strings are anagrams
Return true or false accordingly
Level order traversal of a tree using Queue
Create a queue and add the root node to it
While the queue is not empty, remove the front node and print its value
Add the left and right child nodes of the removed node to the queue
Repeat until the queue is empty
Reverse level order traversal of a tree using Queue
Create a queue and push the root node into it
While the queue is not empty, pop the front node and push its children into the queue
Add the popped node to a stack
Once the queue is empty, pop elements from the stack and print them
BFS and DFS are graph traversal algorithms. BFS explores nodes level by level while DFS explores nodes depth by depth.
BFS uses a queue while DFS uses a stack or recursion.
BFS is optimal for finding shortest path while DFS is optimal for finding a path between two nodes.
BFS requires more memory as it stores all the nodes at each level while DFS requires less memory.
BFS can be used to find connected components while DFS
Find product of each element of an array except that element in O(N) time complexity without using / operation
Use prefix and suffix products
Multiply prefix and suffix products for each element to get the final product
Handle edge cases where array has 0 or 1 element separately
Recursively delete a linked list
Create a recursive function that takes the head of the linked list as input
Base case: if the head is null, return
Recursively call the function with the next node as input
Delete the current node
Recursively delete a linked list from the end.
Start from the head and recursively traverse to the end of the list.
Delete the last node and set the second last node's next pointer to null.
Repeat until the entire list is deleted.
Use a recursive function to implement the deletion process.
Recursively delete a tree by deleting all its child nodes and then the parent node.
Start from the leaf nodes and delete them first.
Then move up to the parent nodes and delete them.
Repeat until the root node is deleted.
Use post-order traversal to ensure child nodes are deleted before parent nodes.
Recursively delete elements from the end of an array.
Create a recursive function that removes the last element of the array.
Call the function recursively until the desired number of elements are removed.
Handle edge cases such as empty arrays and removing more elements than the array contains.
Floyd Warshall finds shortest path between all pairs of vertices while Djikstra finds shortest path from a single source.
Floyd Warshall is used for dense graphs while Djikstra is used for sparse graphs.
Floyd Warshall has a time complexity of O(n^3) while Djikstra has a time complexity of O((n+m)logn).
Floyd Warshall can handle negative edge weights while Djikstra cannot.
Floyd Warshall can detect negative cycles while Dj
There is no known algorithm to find shortest path in 2-D space in O(log N) time.
The best known algorithm for finding shortest path in 2-D space is Dijkstra's algorithm which has a time complexity of O(N^2).
Other algorithms like A* and Bellman-Ford have better time complexity but still not O(log N).
If the points are on a grid, Lee algorithm can be used which has a time complexity of O(N).
Design a system for putting newspapers using classes and functions
Create a Newspaper class with attributes like title, date, and content
Create a Publisher class with methods to publish and distribute newspapers
Create a Subscriber class with methods to subscribe and receive newspapers
Use inheritance to create different types of newspapers like daily, weekly, etc.
Implement a database to store newspaper information and ha
I believe practical experience is more valuable than higher studies.
I have gained valuable experience through internships and projects.
I prefer hands-on learning and problem-solving over theoretical knowledge.
I am constantly learning and improving my skills through online courses and workshops.
posted on 16 May 2022
I applied via LinkedIn and was interviewed before May 2021. There were 2 interview rounds.
It was a hacker rank technical + aptitude test
based on 7 interviews
1 Interview rounds
based on 28 reviews
Rating in categories
Functional Consultant
292
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Functional Consultant
237
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
234
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
213
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Software Engineer
162
salaries
| ₹0 L/yr - ₹0 L/yr |
Apttus
Zycus Infotech
SirionLabs
SAP Ariba