i
PurpleTalk
Work with us
Filter interviews by
Transformer-based LLMs use self-attention and feedforward networks for processing sequential data efficiently.
Architecture consists of an encoder-decoder structure, though many LLMs use only the decoder.
Self-attention mechanism allows the model to weigh the importance of different words in a sentence.
Positional encoding is used to retain the order of words since transformers do not have a built-in sense of sequenc...
I am familiar with several AI frameworks including TensorFlow, PyTorch, and Scikit-learn, each serving different purposes.
TensorFlow: A powerful library for deep learning, widely used for building neural networks.
PyTorch: Known for its dynamic computation graph, making it popular for research and prototyping.
Scikit-learn: A versatile library for traditional machine learning algorithms and data preprocessing.
Keras:...
Flow pipelines are structured sequences of data processing steps that automate workflows in AI and data engineering.
They consist of stages where data is ingested, processed, and outputted.
Example: A data pipeline might extract data from a database, transform it, and load it into a data warehouse (ETL process).
Flow pipelines can be used for machine learning model training, where data flows from preprocessing to mod...
Computer vision architecture involves processing images through layers to extract features and make predictions.
Input Layer: Receives raw image data, e.g., RGB values from a photo.
Convolutional Layers: Apply filters to detect features like edges or textures, e.g., using 3x3 kernels.
Pooling Layers: Reduce dimensionality while retaining important features, e.g., max pooling.
Fully Connected Layers: Combine features t...
Security provisions can be provided through encryption, authentication, authorization, and secure coding practices.
Implement end-to-end encryption to protect data in transit and at rest.
Use secure authentication methods like OAuth, JWT, or biometrics.
Implement role-based access control for authorization.
Regularly update and patch the application to fix security vulnerabilities.
Follow secure coding practices to pre...
display none removes element from layout, visibility hidden hides element but still takes up space
display none removes element from layout flow
visibility hidden hides element but still takes up space
display none will not take up any space on the page
visibility hidden will still take up space on the page
Some disadvantages of JavaScript include lack of type safety, potential for bugs due to dynamic typing, and limited support for multithreading.
Lack of type safety can lead to errors that are only caught at runtime
Dynamic typing can make it harder to catch bugs during development
Limited support for multithreading can make it difficult to write efficient concurrent code
Closures are functions that have access to their own scope, as well as the scope in which they were defined.
Closures allow functions to access variables from their outer scope even after the outer function has finished executing.
They are commonly used in event handlers, callbacks, and for data privacy.
Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(out...
Lexical this in JavaScript refers to the value of 'this' inside a function, which is determined by where the function is declared.
Lexical this allows functions to access the 'this' value of their enclosing scope.
It is not affected by how or where the function is called, unlike regular functions.
Arrow functions in JavaScript use lexical this, making it easier to maintain the context of 'this'.
Html5 tags are used to structure content on web pages.
header
footer
nav
section
article
aside
main
figure
figcaption
I appeared for an interview in Jan 2025.
Swapping of 2 number without using 3rd number
The DEFER method is used in Swift to delay the execution of a block of code until the current scope is exited.
DEFER is used to ensure cleanup or finalization code is executed, regardless of how the current scope is exited.
It is commonly used to release resources, close files, or perform other cleanup tasks.
DEFER blocks are executed in reverse order of their declaration.
To efficiently fetch and display 1000 images in a grid with error handling, consider batching API calls, implementing pagination, and using placeholders for missing images.
Batch API calls in smaller groups to prevent overwhelming the server and network.
Implement pagination to fetch images in chunks, reducing the load on the server and improving performance.
Use placeholders for missing images to maintain the grid layout...
Security provisions can be provided through encryption, authentication, authorization, and secure coding practices.
Implement end-to-end encryption to protect data in transit and at rest.
Use secure authentication methods like OAuth, JWT, or biometrics.
Implement role-based access control for authorization.
Regularly update and patch the application to fix security vulnerabilities.
Follow secure coding practices to prevent ...
I appeared for an interview in Sep 2024.
Transformer-based LLMs use self-attention and feedforward networks for processing sequential data efficiently.
Architecture consists of an encoder-decoder structure, though many LLMs use only the decoder.
Self-attention mechanism allows the model to weigh the importance of different words in a sentence.
Positional encoding is used to retain the order of words since transformers do not have a built-in sense of sequence.
Exa...
Computer vision architecture involves processing images through layers to extract features and make predictions.
Input Layer: Receives raw image data, e.g., RGB values from a photo.
Convolutional Layers: Apply filters to detect features like edges or textures, e.g., using 3x3 kernels.
Pooling Layers: Reduce dimensionality while retaining important features, e.g., max pooling.
Fully Connected Layers: Combine features to mak...
Explain the various approaches to the Rag system.
Experience with Torch parallelism.
I have completed various AI projects, including predictive modeling, natural language processing, and computer vision applications.
Developed a predictive model for customer churn using machine learning algorithms, achieving 85% accuracy.
Created a chatbot using NLP techniques to enhance customer support, reducing response time by 40%.
Implemented a computer vision system for automated quality inspection in manufacturing,...
Flow pipelines are structured sequences of data processing steps that automate workflows in AI and data engineering.
They consist of stages where data is ingested, processed, and outputted.
Example: A data pipeline might extract data from a database, transform it, and load it into a data warehouse (ETL process).
Flow pipelines can be used for machine learning model training, where data flows from preprocessing to model ev...
I am familiar with several AI frameworks including TensorFlow, PyTorch, and Scikit-learn, each serving different purposes.
TensorFlow: A powerful library for deep learning, widely used for building neural networks.
PyTorch: Known for its dynamic computation graph, making it popular for research and prototyping.
Scikit-learn: A versatile library for traditional machine learning algorithms and data preprocessing.
Keras: A hi...
I applied via Campus Placement
Basic Aptitude and Computer Questions
Sudoku puzzle in Python
I appeared for an interview in Jul 2024.
A UI/UX case study was provided, and I am expected to explain it.
Difficult and had covered all topics
Coding test on C which was on linked list
Normal aptitude test
Random coding online assessment
I applied via LinkedIn and was interviewed in Aug 2023. There were 2 interview rounds.
posted on 22 Aug 2023
I appeared for an interview in Jul 2023.
To restrict data leakage in Android, implement secure coding practices, use encryption, restrict permissions, and regularly update the app.
Implement secure coding practices to prevent vulnerabilities that could lead to data leakage.
Use encryption to protect sensitive data stored on the device or transmitted over the network.
Restrict permissions to only what is necessary for the app to function properly.
Regularly update...
Top trending discussions
Some of the top questions asked at the PurpleTalk interview -
The duration of PurpleTalk interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 28 interview experiences
Difficulty level
Duration
based on 261 reviews
Rating in categories
Associate Analyst
176
salaries
| ₹5 L/yr - ₹10.5 L/yr |
Software Analyst
67
salaries
| ₹8.1 L/yr - ₹14.5 L/yr |
Associate Software Analyst
55
salaries
| ₹4.2 L/yr - ₹9.9 L/yr |
Software Engineer
46
salaries
| ₹3 L/yr - ₹12.5 L/yr |
Analyst
45
salaries
| ₹8.1 L/yr - ₹14.4 L/yr |
Tekwissen
Damco Solutions
smartData Enterprises
In Time Tec Visionsoft