Filter interviews by
I applied via campus placement at University of Hyderabad, Hyderabad and was interviewed before Jul 2022. There were 5 interview rounds.
The test was for 1hr around. Topics: Quantitative Analysis, Verbal, Reasoning, and Basic Programming.
The group discussion was held on the topic of "Is online business a Boon or a Bane? Support or oppose the motion with reasons."
Use SQL query with ORDER BY and LIMIT to find 2nd max number from a column in a table.
Use SELECT MAX(column_name) to find the max number in the column.
Use SELECT column_name FROM table_name ORDER BY column_name DESC LIMIT 1,1 to find the 2nd max number.
Example: SELECT column_name FROM table_name ORDER BY column_name DESC LIMIT 1,1;
Use SQL query to select employees with odd employee IDs.
Use the modulo operator (%) to check if employee ID is odd (e.g. id % 2 = 1)
Write SQL query like 'SELECT * FROM employees WHERE employee_id % 2 = 1;'
Group employees by department with salary > 50,000 in SQL.
Use GROUP BY clause to group employees by department.
Use WHERE clause to filter employees with salary > 50,000.
Example: SELECT department, COUNT(employee_id) FROM employees WHERE salary > 50000 GROUP BY department;
Top trending discussions
I applied via LinkedIn and was interviewed in Sep 2024. There were 2 interview rounds.
Too many jumps in a system can lead to inefficiency and complexity.
Excessive jumps can make the system harder to understand and maintain.
Each jump introduces a potential point of failure or error.
Reducing jumps can improve system performance and user experience.
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
posted on 10 Apr 2024
I applied via Naukri.com and was interviewed in Mar 2024. There was 1 interview round.
I applied via Company Website and was interviewed in Mar 2024. There was 1 interview round.
Online aptitude test have been coundected
I was interviewed before Sep 2022.
The most used application on my phone is Instagram because I enjoy sharing photos and keeping up with friends and influencers.
I use Instagram to share photos and videos with my friends and followers
I enjoy keeping up with the latest trends and updates from influencers and celebrities
I use Instagram to discover new products and brands through sponsored posts and ads
I applied via Referral and was interviewed before Dec 2023. There was 1 interview round.
I am a data analyst with a background in statistics and programming, passionate about turning data into actionable insights.
Background in statistics and programming
Experience in data analysis and visualization tools like Python, R, and Tableau
Strong problem-solving skills and attention to detail
Ability to communicate complex data findings to non-technical stakeholders
I rate myself as proficient in SQL with experience in writing complex queries and optimizing database performance.
Proficient in writing complex SQL queries
Experience in optimizing database performance
Familiar with database management systems like MySQL, PostgreSQL, etc.
Senior Analyst
332
salaries
| ₹8 L/yr - ₹18 L/yr |
Data Analyst
291
salaries
| ₹4 L/yr - ₹9.9 L/yr |
Assistant Manager
241
salaries
| ₹14 L/yr - ₹23.2 L/yr |
Analyst
235
salaries
| ₹4.8 L/yr - ₹10 L/yr |
Data Engineer
118
salaries
| ₹5 L/yr - ₹13.8 L/yr |
Fractal Analytics
Mu Sigma
Tiger Analytics
Bridgei2i Analytics Solutions