i
MiQ Digital
Filter interviews by
I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.
I am a seasoned HR professional with 10+ years of experience in recruitment, employee relations, and performance management.
Bachelor's degree in Human Resources Management
SHRM-CP certification
Led successful recruitment campaigns resulting in 20% increase in staff retention
Implemented employee wellness program resulting in 15% decrease in absenteeism
In the next 5 years, I aim to advance to a leadership role within the HR department, further develop my skills through training and certifications, and contribute to the company's growth and success.
Advance to a leadership role within the HR department
Further develop skills through training and certifications
Contribute to the company's growth and success
Top trending discussions
I applied via Internshala and was interviewed in Dec 2020. There were 5 interview rounds.
I am an experienced HR professional with a strong background in talent acquisition and employee relations.
Over 10 years of experience in HR roles
Expertise in recruitment and onboarding processes
Proven track record in developing and implementing HR policies
Strong interpersonal and communication skills
Ability to handle employee relations issues effectively
Implemented a successful employee engagement program in my previou
HR provides an opportunity to utilize my skills in communication, problem-solving, and understanding human behavior.
I have a strong interest in working with people and helping them achieve their potential.
I enjoy building relationships and creating a positive work environment.
HR allows me to contribute to the success of an organization by attracting, developing, and retaining talented individuals.
I believe HR plays a c...
HR in MBA offers a broader skill set and a focus on people management, while finance is more specialized.
HR in MBA provides a comprehensive understanding of human resources management, organizational behavior, and talent acquisition.
It equips individuals with skills in employee relations, performance management, and strategic workforce planning.
HR professionals play a crucial role in fostering a positive work culture, ...
I have advanced Excel skills and can perform complex data analysis and create automated reports.
Proficient in using formulas, functions, and pivot tables
Experienced in data manipulation and analysis
Skilled in creating charts and graphs for data visualization
Familiar with VLOOKUP, INDEX-MATCH, and conditional formatting
Able to create macros and automate repetitive tasks
My project in the final semester was about implementing a performance management system in a multinational company.
Researched and analyzed existing performance management systems
Designed and developed a customized performance management system
Conducted employee surveys and interviews to gather feedback
Implemented the system and trained HR staff and managers
Monitored and evaluated the effectiveness of the system
Made rec...
I would take initiative and seek out resources and information to learn and handle the situations independently.
Research and gather information on the specific situations
Seek guidance from relevant books, articles, or online resources
Observe and learn from others who have dealt with similar situations
Take initiative to experiment and learn through trial and error
Seek feedback and advice from colleagues or mentors
Develo...
Probability of a horse going out of a chessboard in 'n' steps.
The total number of possible moves for a horse is 8.
The probability of going out of the board depends on the position of the horse.
For example, if the horse is at a corner, the probability of going out of the board is higher.
The probability can be calculated using combinatorics and geometry.
Algorithms for manipulating arrays and strings in coding
Use sorting algorithms like quicksort and mergesort for arrays
Use string manipulation functions like substring and replace for strings
Use dynamic programming for optimizing solutions to array and string problems
Designing a large scale Ad Server
Use distributed systems for scalability
Implement caching for faster ad delivery
Ensure high availability and fault tolerance
Use real-time bidding for efficient ad placement
Implement fraud detection mechanisms
Ensure compliance with privacy regulations
I applied via Campus Placement
I am an avid traveler and have visited over 20 countries
I love experiencing new cultures and trying new foods
I have backpacked through Europe and Asia
I have volunteered in orphanages in Cambodia and Nepal
Mobile advertising platform
Adtech
Mobile marketing
App monetization
Maximum sub sequence sum in an array
Use Kadane's algorithm
Initialize max_so_far and max_ending_here to 0
Iterate through the array and update max_ending_here and max_so_far
Return max_so_far
Endianness refers to the byte order of a system. It determines how multi-byte data types are stored in memory.
Little-endian systems store the least significant byte first, while big-endian systems store the most significant byte first.
Endianness can affect the way data is transmitted between systems.
To determine the endianness of a system, you can use the byte order mark (BOM) or write a test program that checks the by...
Sort an array of 0's and 1's only.
Use two pointers, one at the beginning and one at the end of the array.
Swap 0's from the beginning with 1's from the end until the pointers meet.
Alternatively, use a counting sort algorithm to count the number of 0's and 1's and then reconstruct the array.
Heaps are data structures used to efficiently find the maximum or minimum element in a collection.
Max heap: parent nodes are always greater than or equal to child nodes
Min heap: parent nodes are always smaller than or equal to child nodes
Heaps are commonly used in priority queues and sorting algorithms
Heap operations include insert, delete, and extract max/min
Example: An array [3, 8, 2, 5, 1, 4, 6] can be represented a
Find 3 numbers in an array where a+b=c.
Loop through the array and check for all possible combinations of a and b.
Use a hash table to store the values of a and b, and check if c is present in the hash table.
Sort the array and use two pointers to find a and b, and then check if their sum equals c.
Leetcode easy-medium
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access, data breaches, and other cyber threats.
It includes technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Examples of cyber security measures include firewalls, ant...
Types of encryption include symmetric encryption, asymmetric encryption, and hashing.
Symmetric encryption: Uses the same key for both encryption and decryption, examples include AES and DES.
Asymmetric encryption: Uses a pair of public and private keys for encryption and decryption, examples include RSA and ECC.
Hashing: Converts data into a fixed-size string of bytes, examples include MD5 and SHA.
based on 1 interview
Interview experience
Software Engineer
29
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Analyst
24
salaries
| ₹0 L/yr - ₹0 L/yr |
Business Analyst
21
salaries
| ₹0 L/yr - ₹0 L/yr |
Analyst
20
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Scientist
20
salaries
| ₹0 L/yr - ₹0 L/yr |
Affle
InMobi
Komli Media
Deloitte Digital