Filter interviews by
I applied via Company Website and was interviewed in May 2022. There was 1 interview round.
Top trending discussions
posted on 29 Nov 2022
I applied via Naukri.com and was interviewed before Nov 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2020. There were 3 interview rounds.
To check palindrome and anagram of a string with O(n), use a hash table to store character frequencies.
Create a hash table to store the frequency of each character in the string.
For palindrome, check that no more than one character has an odd frequency.
For anagram, compare the hash tables of the two strings.
If the hash tables are equal, the strings are anagrams.
If the hash tables differ by only one character, the strin...
Optimized solutions and core principles applied in OOPS
Encapsulation, Inheritance, Polymorphism, Abstraction are core principles of OOPS
Optimized solutions can be achieved through efficient algorithms and data structures
Design patterns like Singleton, Factory, Observer can also be used for optimized solutions
I applied via Company Website and was interviewed before Oct 2020. There was 1 interview round.
Different types of risk in finance include market risk, credit risk, liquidity risk, operational risk, and legal risk.
Market risk refers to the potential for losses due to changes in market conditions, such as fluctuations in interest rates, exchange rates, or stock prices.
Credit risk is the risk of default by borrowers or counterparties, leading to potential losses for lenders or investors.
Liquidity risk is the risk o...
I applied via Naukri.com and was interviewed before Nov 2020. There were 3 interview rounds.
Cognos deployment process involves planning, testing, and executing the deployment of Cognos software to production environment.
The deployment process should be planned carefully to avoid any issues during the deployment.
Testing should be done in a non-production environment to ensure that the deployment is successful.
The deployment should be executed in a phased manner to minimize downtime and ensure that the system i...
I applied via Naukri.com and was interviewed before Jun 2020. There were 4 interview rounds.
Other approaches to the same job could include automation, outsourcing, or reorganizing the team.
Automation: Implementing technology to streamline processes and reduce manual labor.
Outsourcing: Hiring a third-party company to handle certain tasks or responsibilities.
Reorganizing the team: Restructuring roles and responsibilities to optimize efficiency and productivity.
Example: Automating inventory management to reduce ...
I applied via Recruitment Consulltant and was interviewed before Mar 2021. There were 3 interview rounds.
Need to know about Process knowledge
I applied via Campus Placement
posted on 20 May 2017
I appeared for an interview in May 2017.
Yes, the string class can be extended in most programming languages.
Inheritance can be used to extend the functionality of the string class.
By creating a new class that inherits from the string class, additional methods and properties can be added.
Extending the string class allows for customization and adding specific functionality to strings.
Example: In Python, the string class can be extended by creating a new class
Implicit objects in JSP are predefined objects that are available for use without any declaration or initialization.
Implicit objects in JSP include request, response, session, application, out, config, pageContext, page, exception, and others.
These objects provide access to various aspects of the JSP environment and can be used to perform common tasks.
For example, the request object allows access to HTTP request parame...
A hash map is a data structure that uses a hash function to map keys to values.
Hash map stores key-value pairs
It uses a hash function to compute an index for each key
Collisions can occur when two keys hash to the same index
Hash maps provide fast access to values based on their keys
StringBuffer and StringBuilder are both used to manipulate strings, but StringBuffer is thread-safe while StringBuilder is not.
StringBuffer is synchronized, making it safe for use in multi-threaded environments.
StringBuilder is not synchronized, making it faster but not thread-safe.
StringBuffer is preferred when multiple threads are involved, while StringBuilder is preferred for single-threaded scenarios.
Both classes p...
MVC is a software architectural pattern that separates an application into three main components: Model, View, and Controller.
Model represents the data and business logic of the application.
View is responsible for displaying the user interface.
Controller handles user input, updates the model, and interacts with the view.
MVC promotes separation of concerns and modularity in software development.
Example: In a web applica...
Annotations used in RESTful web services
1. @Path - Specifies the URI path for the resource
2. @GET - Specifies that the method handles HTTP GET requests
3. @POST - Specifies that the method handles HTTP POST requests
4. @PUT - Specifies that the method handles HTTP PUT requests
5. @DELETE - Specifies that the method handles HTTP DELETE requests
6. @PathParam - Binds the value of a URI template parameter to a method paramete...
based on 14 reviews
Rating in categories
Research Fellow
14
salaries
| ₹19.2 L/yr - ₹50 L/yr |
Post Doctoral Research Fellow
7
salaries
| ₹30 L/yr - ₹41 L/yr |
Research Scientist
6
salaries
| ₹12 L/yr - ₹29.7 L/yr |
Post Doctoral Fellow
5
salaries
| ₹12 L/yr - ₹28.4 L/yr |
Research Intern
4
salaries
| ₹1 L/yr - ₹6 L/yr |
HSBC Group
Cholamandalam Investment & Finance
Citicorp
BNY