Faster and better experience!
i
Lavender Technology
Filter interviews by
I applied via Naukri.com and was interviewed before Dec 2023. There were 2 interview rounds.
The AMCAT test was conducted.
Information Technology development in India.
I applied via Referral and was interviewed in Aug 2024. There were 3 interview rounds.
Experienced team lead with strong communication and problem-solving skills.
Over 5 years of experience leading teams in various industries
Skilled in conflict resolution and team motivation
Excellent communication and interpersonal skills
Proven track record of meeting and exceeding team goals
Strong problem-solving abilities, able to think quickly on my feet
I was interviewed in Jul 2024.
Different constraints and join methods in database queries
Constraints in database queries ensure data integrity and enforce rules on data
Join methods in database queries are used to combine rows from two or more tables based on a related column between them
Examples of constraints include primary key, foreign key, unique key, and check constraints
Examples of join methods include inner join, outer join (left, right, full
It was mostly on sub queries.
It depends on individual circumstances and career goals.
Going to Mphasis may not be a waste of time if it aligns with your career goals and offers valuable experience.
Consider factors such as job role, growth opportunities, work culture, and learning potential before making a decision.
Some people may find Mphasis to be a valuable stepping stone in their career, while others may not see it as beneficial.
Ultimately, the ...
A SQL join is used to combine rows from two or more tables based on a related column between them.
Use the JOIN keyword to specify the tables to be joined
Use the ON keyword to specify the column to join on
Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
Two common SQL joins are INNER JOIN and LEFT JOIN.
INNER JOIN: Returns rows when there is at least one match in both tables.
LEFT JOIN: Returns all rows from the left table and the matched rows from the right table.
JVM is a virtual machine that executes Java bytecode. It manages memory, provides security, and facilitates garbage collection.
JVM loads the bytecode generated by the Java compiler and interprets it.
It uses Just-In-Time (JIT) compilation to improve performance by compiling frequently used code into native machine code.
JVM manages memory through garbage collection, freeing up memory occupied by objects that are no longe...
Hash Map is a data structure that stores key-value pairs and uses a hash function to map keys to their corresponding values.
Hash Map uses a hash function to determine the index of the key-value pair in the underlying array.
Collisions can occur when multiple keys hash to the same index, which can be resolved using techniques like chaining or open addressing.
Hash Map provides constant time complexity O(1) for insertion,
Stereo annotation is the process of labeling or tagging images or videos with depth information to create a 3D effect.
Stereo annotation involves identifying corresponding points in a pair of images or frames to determine depth perception.
It is commonly used in computer vision tasks such as object detection, tracking, and scene understanding.
Examples of stereo annotation include creating depth maps for autonomous drivin
I applied via Approached by Company and was interviewed in Mar 2024. There were 3 interview rounds.
posted on 4 Sep 2024
On risk assessment and as well as case study
Freshworks
Zoho
TCS
Infosys