Filter interviews by
I applied via Naukri.com and was interviewed in Mar 2024. There were 3 interview rounds.
I have developed a strong client base and contacts in the Valves industry through networking events, trade shows, and referrals.
Attended industry-specific networking events
Participated in trade shows related to Valves industry
Received referrals from satisfied clients
I can contribute to the company by leveraging my technical skills, creativity, and strategic thinking to drive successful marketing campaigns.
I have a strong background in engineering which allows me to understand complex technical concepts and products
I am creative and can come up with innovative marketing strategies to reach target audiences
I have experience in data analysis and can use insights to optimize marketing...
I applied via LinkedIn and was interviewed in Mar 2022. There were 2 interview rounds.
I applied via LinkedIn and was interviewed before Jan 2021. There were 2 interview rounds.
Top trending discussions
Experienced compliance professional with a track record of implementing effective strategies to ensure regulatory adherence and mitigate risks.
Over 10 years of experience in compliance roles
Strong understanding of regulatory requirements and industry standards
Proven ability to develop and implement compliance programs
Skilled in conducting risk assessments and audits
Excellent communication and leadership skills
Led a tea...
Experience, expected CTC, current CTC, and notice period are key factors in evaluating a candidate for Senior Executive Compliance role.
Experience in compliance roles is crucial for this position
Expected CTC should be competitive with industry standards
Current CTC can provide insight into candidate's salary expectations
Notice period indicates candidate's availability to join the new role
posted on 20 Mar 2024
I applied via Referral and was interviewed in Feb 2024. There was 1 interview round.
To recover a VM without its keypair file, you can create a new keypair and attach it to the VM.
Create a new keypair using the cloud provider's console or API.
Stop the VM and detach the old keypair.
Attach the new keypair to the VM.
Start the VM and test connectivity to ensure successful recovery.
You can know the IP Address of google.com by using command line tools like ping or nslookup.
Use the 'ping' command followed by the domain name (e.g. ping google.com)
Use the 'nslookup' command followed by the domain name (e.g. nslookup google.com)
Securities in Production architecture include network security, data encryption, access control, and monitoring.
Implementing network security measures such as firewalls, VPNs, and intrusion detection systems
Encrypting sensitive data at rest and in transit using protocols like SSL/TLS
Enforcing access control through role-based permissions and multi-factor authentication
Monitoring system activity and logs for suspicious ...
I applied via Referral and was interviewed in Dec 2023. There was 1 interview round.
To make a successful withdrawal and recover lost funds, one must follow proper procedures and utilize available resources.
Verify the account details and ensure all necessary information is correct before initiating the withdrawal.
Contact the financial institution or platform where the funds were lost to report the issue and request assistance in recovering the funds.
Utilize any available security features such as two-f...
Investing wisely involves researching different investment options, setting financial goals, diversifying your portfolio, and seeking professional advice.
Research different investment options to understand the risks and potential returns
Set clear financial goals to determine your investment strategy
Diversify your portfolio to spread risk across different asset classes
Consider seeking advice from a financial advisor or ...
Recovering lost funds involves thorough investigation, legal action, and negotiation with debtors.
Conduct a thorough investigation to determine the cause of the loss
Take legal action against debtors who refuse to repay the funds
Negotiate with debtors to come up with a repayment plan
Utilize debt collection agencies or legal services if necessary
let is mutable and can be reassigned, const is immutable and cannot be reassigned
let allows reassignment, const does not
const must be initialized with a value, let can be declared without a value
const is block-scoped, let is function-scoped
Promises are objects representing the eventual completion or failure of an asynchronous operation.
Promises are used to handle asynchronous operations in JavaScript.
They can be in one of three states: pending, fulfilled, or rejected.
Promises can be chained together using .then() method.
They help avoid callback hell and make code more readable and maintainable.
posted on 4 Jan 2024
I applied via Recruitment Consulltant and was interviewed in Dec 2023. There was 1 interview round.
MS Office is a suite of productivity applications developed by Microsoft. Telecalling is a process of making phone calls to potential customers or clients.
MS Office is a collection of software applications including Word, Excel, PowerPoint, and Outlook.
It is widely used for creating documents, spreadsheets, presentations, and managing emails.
Telecalling involves making outbound calls to promote products or services, ge...
posted on 29 Oct 2023
I was interviewed in Apr 2023.
I applied via Recruitment Consulltant and was interviewed in Mar 2023. There were 2 interview rounds.
Visa status is dependent on individual circumstances and qualifications.
Visa status varies based on factors such as nationality, job offer, and education level.
Some common visa types for Quant Devs include H-1B, L-1, and O-1 visas.
Employers may sponsor visas for qualified candidates.
It is important to consult with an immigration lawyer to determine the best visa option.
Stack memory is allocated automatically, while heap memory is allocated manually.
Stack memory is limited and has a fixed size, while heap memory is larger and can grow dynamically.
Stack memory is faster to access than heap memory.
Variables on the stack are automatically deallocated when the function they are in returns, while heap memory must be manually deallocated to avoid memory leaks.
Examples of stack memory includ...
based on 94 reviews
Rating in categories
Production Engineer
10
salaries
| ₹3.2 L/yr - ₹4.9 L/yr |
Quality Engineer
8
salaries
| ₹2.9 L/yr - ₹3.8 L/yr |
Design Engineer
7
salaries
| ₹2.4 L/yr - ₹3.6 L/yr |
Senior Engineer
7
salaries
| ₹5 L/yr - ₹10 L/yr |
Senior HR Executive
6
salaries
| ₹4 L/yr - ₹4.3 L/yr |
Vardhman Fabrics
Welspun
Arvind Group
Raymond Lifestyle Limited