Filter interviews by
I applied via Referral and was interviewed in Mar 2023. There were 3 interview rounds.
Knowledge test like Grammar, math, general knowledge, computer knowledge, ai basic knowledge, spoken English skills etc.
I applied via Recruitment Consulltant and was interviewed in Aug 2022. There were 4 interview rounds.
Assessment test with all subject
Data solutions involve managing and analyzing data to improve business operations, while data security involves protecting data from unauthorized access or theft.
Data solutions involve collecting, storing, analyzing, and interpreting data to help businesses make informed decisions and improve operations.
Data security involves implementing measures to protect data from unauthorized access, theft, or damage, such as encr...
Data labelling is the process of adding tags or annotations to data to make it understandable for machines.
Data labelling is essential for machine learning algorithms to recognize patterns and make predictions.
It involves adding labels or annotations to data such as images, text, or audio.
For example, labelling images of cats and dogs to train a machine learning model to recognize these animals.
Data labelling can be do...
Annotations tools are used to highlight, mark, or add notes to a document or image.
Annotations can be made using software tools such as Adobe Acrobat, Microsoft Word, or Google Docs.
They can be used to add comments, highlight text, draw shapes, or add sticky notes.
Annotations are commonly used in academic research, legal documents, and graphic design.
They can also be used in medical imaging to mark areas of interest or...
We secure data through various measures like encryption, access control, and regular backups.
We use encryption to protect sensitive data from unauthorized access.
Access control ensures that only authorized personnel can access the data.
Regular backups ensure that data can be restored in case of any data loss or corruption.
We also conduct regular security audits to identify and address any vulnerabilities.
We follow indu...
Delivery dept refers to the department responsible for delivering products or services to customers.
It is responsible for ensuring timely and efficient delivery of products or services.
It may involve managing logistics, transportation, and distribution.
Delivery department may also handle customer service and support related to delivery.
Examples include courier services, e-commerce companies, and food delivery services.
Data is protected to ensure confidentiality, integrity, and availability.
Protects sensitive information from unauthorized access or disclosure
Prevents data from being altered or destroyed without authorization
Ensures that data is accessible to authorized users when needed
Compliance with legal and regulatory requirements
Maintains trust and confidence in the organization
Prevents financial loss or reputational damage
Annotation tools are software or applications used to add notes, comments, or highlights to digital documents or images.
Annotation tools are commonly used in fields such as education, research, and design.
They allow users to mark up documents or images with text, shapes, arrows, and other symbols.
Some popular annotation tools include Adobe Acrobat, Skitch, and Evernote.
Annotation tools can be used to collaborate on doc...
Data manufacturing involves collecting, processing, and analyzing raw data to create meaningful insights and information.
Collecting raw data from various sources
Processing the data to remove errors and inconsistencies
Analyzing the data to identify patterns and trends
Creating meaningful insights and information from the analyzed data
Using data visualization tools to present the information in a clear and concise manner
Data can flow in both directions depending on the system and its configuration.
Data can flow from a source to a destination, or vice versa.
In a client-server model, data flows from the client to the server and back.
In a peer-to-peer network, data can flow in any direction between connected devices.
Data flow can be unidirectional or bidirectional, depending on the system's design.
Data flow can be controlled through fire
I applied via Walk-in and was interviewed before Jul 2022. There were 3 interview rounds.
Just a small one . nothing much to worry about as there parvi works
iMerit interview questions for designations
Get interview-ready with Top iMerit Interview Questions
I applied via Campus Placement and was interviewed before Nov 2021. There were 3 interview rounds.
Its all about aptitude question, and genral knowledge , its easy but some what twist in the questions be mind full and read questions properly
I applied via Naukri.com and was interviewed in Oct 2020. There was 1 interview round.
HTTPS stands for Hypertext Transfer Protocol Secure. WWW stands for World Wide Web.
HTTPS is a secure version of HTTP, used for secure communication over a computer network.
WWW is a prefix used to identify a website on the internet.
HTTPS ensures that the data transmitted between a web browser and a web server is encrypted and secure.
WWW is often used as a subdomain in URLs to indicate a website.
Example: https://www.exam
I applied via Naukri.com and was interviewed in Jul 2020. There were 3 interview rounds.
Top trending discussions
I applied via Recruitment Consultant and was interviewed in Nov 2020. There were 3 interview rounds.
The duration of iMerit Ites Executive interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 2 interviews
2 Interview rounds
based on 340 reviews
Rating in categories
Ites Executive
1.7k
salaries
| ₹0 L/yr - ₹0 L/yr |
Sr. Ites Executive
790
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Lead
146
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Executive
127
salaries
| ₹0 L/yr - ₹0 L/yr |
Junior Team Leader
72
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
Infosys
HCLTech