Filter interviews by
I applied via Approached by Company
Steal extremely private data from someone in Scotland.
Top trending discussions
posted on 13 Dec 2024
I applied via Recruitment Consulltant
posted on 19 Dec 2024
I am a seasoned alliance manager with a proven track record of building successful partnerships and driving business growth.
Over 10 years of experience in alliance management
Strong negotiation and communication skills
Ability to develop and execute strategic partnership plans
Track record of exceeding partnership goals
Experience working with cross-functional teams
I applied via LinkedIn and was interviewed in Nov 2024. There was 1 interview round.
I am a recent graduate with a degree in Economics and a passion for data analysis. I have experience with statistical software and strong problem-solving skills.
Recent graduate with a degree in Economics
Passionate about data analysis
Experience with statistical software
Strong problem-solving skills
I conducted market research, analyzed data, and prepared reports for the sales team.
Conducted market research to identify trends and opportunities
Analyzed sales data to track performance and make recommendations
Prepared reports and presentations for the sales team
Collaborated with cross-functional teams to develop strategies for growth
The aptitude round consists of approx 20 q's, out of which half the q's were based on LR and aptitude and half based on computer fundamentals.
The coding test consisted of 4 q's. The selection criteria was to complete at least 3 q's.
I am a passionate software engineer with experience in developing web applications using various technologies.
Experienced in developing web applications using HTML, CSS, JavaScript, and frameworks like React and Angular
Proficient in backend development with Node.js and databases like MongoDB and MySQL
Familiar with version control systems like Git and project management tools like Jira
I applied via LinkedIn and was interviewed in Sep 2024. There were 2 interview rounds.
Assessment on Sql Expertise, 2 lengthy sql questions in 30 mins time
posted on 7 Aug 2024
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
Excel is a spreadsheet program used for data organization and analysis.
Basic features include formulas, functions, charts, and sorting/filtering.
Keywords include cells, rows, columns, and worksheets.
Examples: SUM function, PivotTables, VLOOKUP formula.
In a customer service job, I interact with customers to understand their queries and provide solutions to their problems.
Listen actively to customers to understand their concerns
Empathize with customers to show understanding and build rapport
Offer solutions or alternatives to address customer issues
Follow up with customers to ensure their concerns are resolved
Maintain a positive and professional attitude throughout int
Online KYC is the process of verifying the identity of customers remotely through digital means.
Collect customer information such as name, address, date of birth, and identification documents.
Use verification methods like biometric authentication, facial recognition, or document verification.
Verify the authenticity of the documents provided by the customer.
Comply with regulatory requirements and data protection laws.
No...
posted on 20 Mar 2024
I applied via Referral and was interviewed in Feb 2024. There was 1 interview round.
To recover a VM without its keypair file, you can create a new keypair and attach it to the VM.
Create a new keypair using the cloud provider's console or API.
Stop the VM and detach the old keypair.
Attach the new keypair to the VM.
Start the VM and test connectivity to ensure successful recovery.
You can know the IP Address of google.com by using command line tools like ping or nslookup.
Use the 'ping' command followed by the domain name (e.g. ping google.com)
Use the 'nslookup' command followed by the domain name (e.g. nslookup google.com)
Securities in Production architecture include network security, data encryption, access control, and monitoring.
Implementing network security measures such as firewalls, VPNs, and intrusion detection systems
Encrypting sensitive data at rest and in transit using protocols like SSL/TLS
Enforcing access control through role-based permissions and multi-factor authentication
Monitoring system activity and logs for suspicious ...
based on 19 reviews
Rating in categories
Data Scientist
25
salaries
| ₹4 L/yr - ₹10.5 L/yr |
Data Analyst
9
salaries
| ₹3 L/yr - ₹7 L/yr |
Data Science Intern
4
salaries
| ₹1.2 L/yr - ₹3 L/yr |
Software Developer
3
salaries
| ₹3.7 L/yr - ₹5.8 L/yr |
Product Manager
3
salaries
| ₹7 L/yr - ₹7 L/yr |
Fractal Analytics
Mu Sigma
Tiger Analytics
LatentView Analytics