Filter interviews by
I applied via campus placement at University of Hyderabad, Hyderabad and was interviewed before Jul 2022. There were 5 interview rounds.
The test was for 1hr around. Topics: Quantitative Analysis, Verbal, Reasoning, and Basic Programming.
The group discussion was held on the topic of "Is online business a Boon or a Bane? Support or oppose the motion with reasons."
Use SQL query with ORDER BY and LIMIT to find 2nd max number from a column in a table.
Use SELECT MAX(column_name) to find the max number in the column.
Use SELECT column_name FROM table_name ORDER BY column_name DESC LIMIT 1,1 to find the 2nd max number.
Example: SELECT column_name FROM table_name ORDER BY column_name DESC LIMIT 1,1;
Use SQL query to select employees with odd employee IDs.
Use the modulo operator (%) to check if employee ID is odd (e.g. id % 2 = 1)
Write SQL query like 'SELECT * FROM employees WHERE employee_id % 2 = 1;'
Group employees by department with salary > 50,000 in SQL.
Use GROUP BY clause to group employees by department.
Use WHERE clause to filter employees with salary > 50,000.
Example: SELECT department, COUNT(employee_id) FROM employees WHERE salary > 50000 GROUP BY department;
Experienced Business Analyst with a background in data analysis and process improvement.
Over 5 years of experience in analyzing business processes and identifying areas for improvement
Skilled in data analysis tools such as Excel, SQL, and Tableau
Strong communication and presentation skills, able to effectively communicate findings to stakeholders
Certified in Business Analysis Professional (CBAP)
Previous projects includ...
I have 3 years of experience as a Business Analyst in my previous company.
Led requirements gathering sessions with stakeholders
Created and maintained documentation such as BRD and FRD
Worked closely with development team to ensure requirements were met
Performed data analysis to identify trends and make recommendations
Strengths: Analytical thinker, attention to detail. Weaknesses: Impatient, perfectionist.
Strengths: Analytical thinker - able to break down complex problems into manageable parts
Strengths: Attention to detail - thorough in reviewing and analyzing data
Weaknesses: Impatient - may rush through tasks to get quick results
Weaknesses: Perfectionist - may spend too much time on minor details
I was interviewed in Jan 2025.
I applied via LinkedIn and was interviewed in Sep 2024. There were 2 interview rounds.
Too many jumps in a system can lead to inefficiency and complexity.
Excessive jumps can make the system harder to understand and maintain.
Each jump introduces a potential point of failure or error.
Reducing jumps can improve system performance and user experience.
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
posted on 10 Apr 2024
I applied via Naukri.com and was interviewed in Mar 2024. There was 1 interview round.
Online aptitude test have been coundected
based on 1 interview
Interview experience
Senior Analyst
333
salaries
| ₹8 L/yr - ₹19 L/yr |
Data Analyst
299
salaries
| ₹5 L/yr - ₹11 L/yr |
Analyst
240
salaries
| ₹4 L/yr - ₹12.8 L/yr |
Assistant Manager
238
salaries
| ₹14 L/yr - ₹23 L/yr |
Data Engineer
121
salaries
| ₹5 L/yr - ₹13.8 L/yr |
Fractal Analytics
Mu Sigma
Tiger Analytics
Bridgei2i Analytics Solutions