Filter interviews by
I applied via Approached by Company and was interviewed in Sep 2022. There were 4 interview rounds.
Developed a machine learning model to predict customer churn in a telecommunications company.
Collected and preprocessed customer data including demographics, usage patterns, and service history.
Performed exploratory data analysis to identify key features and patterns.
Built and trained a classification model using a combination of logistic regression and random forest algorithms.
Evaluated the model's performance using m...
Multivariate analysis is a statistical technique used to analyze data with multiple variables.
It involves examining the relationships between multiple variables to identify patterns and trends.
Common techniques include principal component analysis, factor analysis, and cluster analysis.
Multivariate analysis is used in various fields such as finance, marketing, and social sciences.
Example: A marketing team may use multi...
Multivariate time series is a collection of time series data where multiple variables are observed simultaneously over time.
Multivariate time series models are used to analyze and forecast complex systems with multiple interacting variables.
Common models include Vector Autoregression (VAR), Vector Error Correction Model (VECM), and Dynamic Factor Models (DFM).
Model selection and parameter estimation can be challenging ...
No, it is not always important to apply ML algorithms to solve any statistical problem.
ML algorithms may not be necessary for simple statistical problems
ML algorithms require large amounts of data and computing power
ML algorithms may not always provide the most interpretable results
Statistical models may be more appropriate for certain types of data
ML algorithms should be used when they provide a clear advantage over t
Anomaly detection is the process of identifying data points that deviate from the expected pattern.
Anomaly detection is used in various fields such as finance, cybersecurity, and manufacturing.
It can be done using statistical methods, machine learning algorithms, or a combination of both.
Some common techniques for anomaly detection include clustering, classification, and time series analysis.
Examples of anomalies inclu...
Event Detection is the process of identifying and extracting meaningful events from data streams.
It involves analyzing data in real-time to detect patterns and anomalies
It is commonly used in fields such as finance, social media, and security
Examples include detecting fraudulent transactions, identifying trending topics on Twitter, and detecting network intrusions
Gaussian Mixture Model is a probabilistic model used for clustering and density estimation.
GMM assumes that the data points are generated from a mixture of Gaussian distributions.
It estimates the parameters of these Gaussian distributions to cluster the data points.
An industrial example of GMM is in customer segmentation for targeted marketing.
GMM can also be used in anomaly detection and image segmentation.
GMM can be used to model normal behavior and identify anomalies based on low probability density.
GMM can be used to fit a model to the normal behavior of a system or process.
Anomalies can be identified as data points with low probability density under the GMM model.
The number of components in the GMM can be adjusted to balance between overfitting and underfitting.
GMM can be combined with other techniques such as PCA or...
GMM is more robust for Anomaly detection than Tukey's method of IQR or Z-Score method.
GMM can handle complex data distributions and can identify multiple anomalies.
Tukey's method and Z-Score method are limited to detecting anomalies in unimodal distributions.
GMM can also handle missing data points and outliers better than the other two methods.
GMM is robust to anomaly detection due to its ability to model complex data distributions.
GMM can model data distributions with multiple modes, making it more flexible than other methods.
It can also handle data with varying densities and shapes, making it suitable for detecting anomalies.
GMM uses a probabilistic approach to assign data points to different clusters, allowing it to identify outliers.
It can be used in uns...
Anomalies in Multivariate Time Series can be detected using statistical methods like PCA, clustering, and deep learning models.
Use Principal Component Analysis (PCA) to identify the most important features and detect anomalies in the residual errors.
Cluster the data points and identify the clusters with low density or high variance as anomalies.
Use deep learning models like LSTM or Autoencoder to learn the patterns in ...
Median is more robust to outliers than mean and mode.
Mean is sensitive to outliers as it takes into account all the values in the dataset.
Mode is not affected by outliers as it only considers the most frequent value.
Median is the middle value in a dataset and is less affected by outliers as it is not influenced by extreme values.
For example, if we have a dataset of salaries and one person earns a million dollars, the m...
Mahalanobis Distance is a measure of distance between a point and a distribution.
It takes into account the covariance between variables.
It is used in multivariate analysis and classification problems.
Assumes that the data is normally distributed and has equal covariance matrices.
It is sensitive to outliers and can be used to detect them.
Euclidean distance measures straight line distance between two points while Mahalanobis distance considers variance and covariance of the data.
Euclidean distance is the most common distance metric used in machine learning.
Mahalanobis distance is used when the data has different variances and covariances.
Mahalanobis distance is more robust to outliers than Euclidean distance.
Mahalanobis distance is used in clustering, c...
Yes, Local Outlier Factor (LOF) is a non-parametric anomaly detection method that does not require normality assumptions.
LOF is based on the idea that anomalies are located in less dense areas than their neighbors
LOF calculates the local density of each data point and compares it to the densities of its neighbors
LOF assigns an anomaly score to each data point based on how much its local density differs from the densiti
Analytical, innovative, detail-oriented
Analytical: I have a strong ability to analyze complex data and extract meaningful insights.
Innovative: I constantly seek new and creative approaches to problem-solving and developing data-driven solutions.
Detail-oriented: I pay close attention to details to ensure accuracy and precision in my work.
My hobby is photography because it allows me to capture and express the beauty of the world.
Photography allows me to explore and appreciate the details in my surroundings.
It helps me to see things from different perspectives and enhances my creativity.
I enjoy experimenting with different techniques and capturing unique moments.
Photography also serves as a form of relaxation and mindfulness for me.
I score myself highly in interpersonal skills because I have a proven track record of effectively communicating and collaborating with diverse teams.
I have excellent communication skills, both verbal and written.
I am able to listen actively and empathetically to others.
I can effectively convey complex technical concepts to non-technical stakeholders.
I have experience working in cross-functional teams and fostering posi...
I have a strong background in data science and leadership skills necessary for the role of Principal Data Scientist.
Extensive experience in data analysis and modeling
Proven track record of leading successful data science projects
Strong knowledge of machine learning algorithms and statistical techniques
Ability to communicate complex findings to both technical and non-technical stakeholders
Experience in managing and ment...
I applied via Naukri.com and was interviewed before Dec 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed in Nov 2020. There were 5 interview rounds.
Group discussion is a type of discussion that involves people sharing ideas or activities.
Online aptitude test for competitive examinations , entrance examination and recruitment.
posted on 13 Sep 2024
I applied via Company Website and was interviewed in Mar 2024. There were 3 interview rounds.
Basic aptitude and technical mcq
Technical round (Virtual)
I am a recent graduate with a degree in Computer Science, passionate about coding and eager to learn and grow in the software development field.
Recent graduate with a degree in Computer Science
Passionate about coding and software development
Eager to learn and grow in the field
Developed a web-based project management tool for tracking tasks and deadlines.
Used HTML, CSS, and JavaScript for front-end development
Implemented backend functionality using Node.js and MongoDB
Incorporated user authentication and authorization features
Utilized Agile methodology for project management
I applied via Campus Placement and was interviewed in Jan 2024. There was 1 interview round.
Medium level aptitude questions
I applied via Campus Placement and was interviewed in Nov 2022. There were 3 interview rounds.
Answers to common technical questions related to software development.
HTTPS is a secure version of HTTP protocol used for secure communication over the internet.
SMTP is a protocol used for sending and receiving email messages.
MCA stands for Master of Computer Applications, a postgraduate degree in computer science.
A web designer is a professional who designs and creates websites.
Coding is the process of writing instruc...
Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.
Inheritance allows for code reuse and promotes code organization.
The existing class is called the parent or superclass, and the new class is called the child or subclass.
The child class inherits all the properties and methods of the parent class, and can also add its own unique properties...
Topology refers to the arrangement of nodes and connections in a network.
Topology determines how data flows through a network.
Common topologies include bus, star, ring, and mesh.
Topology can affect network performance, scalability, and fault tolerance.
Communication network refers to the infrastructure and technologies used to transmit information between devices and systems.
Communication network enables devices and systems to exchange information and data.
It includes technologies such as wired and wireless networks, routers, switches, and protocols.
Examples of communication networks include the internet, LAN, WAN, Bluetooth, and cellular networks.
What is a CSS and what is a HTML
I applied via LinkedIn and was interviewed in Dec 2021. There were 3 interview rounds.
A prime number is a positive integer greater than 1 that has no positive integer divisors other than 1 and itself.
Prime numbers are only divisible by 1 and themselves.
Examples of prime numbers include 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, and 97.
The number 1 is not considered a prime number.
Program to determine if a number is even or odd.
Use the modulo operator (%) to check if the number is divisible by 2.
If the remainder is 0, the number is even. Otherwise, it is odd.
Example: int num = 5; if(num % 2 == 0) { printf("Even"); } else { printf("Odd"); }
I applied via AmbitionBox and was interviewed in May 2022. There were 2 interview rounds.
HTML and CSS or javascript
About professional aptitude
Some of the top questions asked at the Itobuz Technologies interview for experienced candidates -
based on 2 interviews
Interview experience
based on 31 reviews
Rating in categories
Front end Developer
12
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Front end Developer
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Web Developer
6
salaries
| ₹0 L/yr - ₹0 L/yr |
Backend Developer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech