Filter interviews by
I will establish clear policies, procedures, and controls to ensure data integrity and minimize risks.
Implementing data governance frameworks to define roles, responsibilities, and processes for managing data
Leveraging technology solutions such as data encryption, access controls, and monitoring tools
Regularly conducting risk assessments to identify potential vulnerabilities and mitigate them
Ensuring compliance with re...
Risk for projects can be estimated by considering factors such as project complexity, team experience, stakeholder involvement, and external dependencies.
Assess project complexity and potential challenges
Evaluate team experience and expertise in handling similar projects
Consider stakeholder involvement and communication
Identify external dependencies and potential risks
Use risk management techniques such as risk registe
Onboarding stakeholders for cloud migration involves communication, training, and collaboration.
Communicate the benefits of cloud migration to stakeholders, addressing any concerns or questions they may have.
Provide training sessions to educate stakeholders on the new cloud technology and how it will impact their work.
Collaborate with stakeholders to gather feedback, address any issues, and ensure a smooth transition t...
posted on 3 Oct 2024
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
I am a seasoned technology professional with a strong background in leading teams and implementing innovative solutions.
Over 10 years of experience in technology management roles
Led successful projects in implementing new software systems
Strong background in team leadership and collaboration
Experience in driving digital transformation initiatives
Certified in various technology platforms such as AWS and Microsoft Azure
Leet code DSA hard level questions
posted on 29 Nov 2022
I applied via Naukri.com and was interviewed before Nov 2021. There were 3 interview rounds.
I applied via Company Website and was interviewed before Oct 2020. There was 1 interview round.
Different types of risk in finance include market risk, credit risk, liquidity risk, operational risk, and legal risk.
Market risk refers to the potential for losses due to changes in market conditions, such as fluctuations in interest rates, exchange rates, or stock prices.
Credit risk is the risk of default by borrowers or counterparties, leading to potential losses for lenders or investors.
Liquidity risk is the risk o...
I applied via Company Website and was interviewed in Oct 2019. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Mar 2020. There were 3 interview rounds.
posted on 20 May 2017
I appeared for an interview in May 2017.
Yes, the string class can be extended in most programming languages.
Inheritance can be used to extend the functionality of the string class.
By creating a new class that inherits from the string class, additional methods and properties can be added.
Extending the string class allows for customization and adding specific functionality to strings.
Example: In Python, the string class can be extended by creating a new class
Implicit objects in JSP are predefined objects that are available for use without any declaration or initialization.
Implicit objects in JSP include request, response, session, application, out, config, pageContext, page, exception, and others.
These objects provide access to various aspects of the JSP environment and can be used to perform common tasks.
For example, the request object allows access to HTTP request parame...
A hash map is a data structure that uses a hash function to map keys to values.
Hash map stores key-value pairs
It uses a hash function to compute an index for each key
Collisions can occur when two keys hash to the same index
Hash maps provide fast access to values based on their keys
StringBuffer and StringBuilder are both used to manipulate strings, but StringBuffer is thread-safe while StringBuilder is not.
StringBuffer is synchronized, making it safe for use in multi-threaded environments.
StringBuilder is not synchronized, making it faster but not thread-safe.
StringBuffer is preferred when multiple threads are involved, while StringBuilder is preferred for single-threaded scenarios.
Both classes p...
MVC is a software architectural pattern that separates an application into three main components: Model, View, and Controller.
Model represents the data and business logic of the application.
View is responsible for displaying the user interface.
Controller handles user input, updates the model, and interacts with the view.
MVC promotes separation of concerns and modularity in software development.
Example: In a web applica...
Annotations used in RESTful web services
1. @Path - Specifies the URI path for the resource
2. @GET - Specifies that the method handles HTTP GET requests
3. @POST - Specifies that the method handles HTTP POST requests
4. @PUT - Specifies that the method handles HTTP PUT requests
5. @DELETE - Specifies that the method handles HTTP DELETE requests
6. @PathParam - Binds the value of a URI template parameter to a method paramete...
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Associate
3.3k
salaries
| ₹5.2 L/yr - ₹21 L/yr |
Senior Manager
2.5k
salaries
| ₹16 L/yr - ₹54 L/yr |
Manager
1.9k
salaries
| ₹10.6 L/yr - ₹42 L/yr |
Senior Associate
1.6k
salaries
| ₹7.1 L/yr - ₹27 L/yr |
Vice President
1.4k
salaries
| ₹21 L/yr - ₹80 L/yr |
JPMorgan Chase & Co.
Goldman Sachs
TCS
Deloitte