Filter interviews by
Clear (1)
I was interviewed in Dec 2024.
I have over 5 years of experience as a Business Analyst in the finance industry.
Led cross-functional teams to analyze market trends and develop strategic plans
Performed data analysis to identify opportunities for cost reduction and revenue growth
Collaborated with stakeholders to gather requirements and create detailed business requirements documents
Business Analyst responsibilities include analyzing data, identifying trends, and making recommendations to improve business processes.
Gather and analyze data to identify trends and make recommendations
Work closely with stakeholders to understand business needs and requirements
Create reports and presentations to communicate findings and recommendations
Collaborate with cross-functional teams to implement solutions
Monito
Top trending discussions
The Aptitude test was tough!
A confusion matrix is a table that is often used to describe the performance of a classification model.
It is a matrix with rows representing the actual class and columns representing the predicted class.
It helps in evaluating the performance of a classification model by showing the number of correct and incorrect predictions.
It consists of four quadrants: True Positive, False Positive, True Negative, and False Negative...
Principal component analysis is a statistical technique used to reduce the dimensionality of data while preserving important information.
PCA is used to identify patterns in data and express it in a more easily understandable form.
It works by finding the directions (principal components) along which the variance of the data is maximized.
These principal components are orthogonal to each other, meaning they are uncorrelat...
Inventory policy is a set of guidelines for managing inventory levels, while inventory control method is the process of implementing those guidelines.
Inventory policy determines when to order new inventory and how much to order
Inventory control method involves tracking inventory levels, forecasting demand, and optimizing order quantities
Examples of inventory policies include Just-in-Time (JIT) and Economic Order Quanti...
Reverse logistics is the process of moving goods from their final destination back to the manufacturer or point of origin for resale, recycling, or disposal.
Involves returning products from customers to the manufacturer or retailer
Includes activities such as returns, refurbishment, recycling, or disposal
Helps in reducing waste and maximizing value from returned products
Examples: returning a defective product to the man
I applied via LinkedIn and was interviewed before Dec 2023. There was 1 interview round.
Case study about some machine learning project which i did in thr past.
I applied via Naukri.com and was interviewed in Feb 2021. There were 3 interview rounds.
Analysis using scrapping
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
UDP is preferred over TCP in this project due to its low latency and lightweight nature.
UDP is a connectionless protocol, which means it does not establish a direct connection between the sender and receiver.
UDP is faster than TCP as it does not have the overhead of establishing and maintaining a connection.
UDP is suitable for applications where real-time data transmission is crucial, such as video streaming or online ...
To clear the 7th bit in a 32-bit register, perform a bitwise AND operation with a mask that has all bits set to 1 except the 7th bit.
Create a mask with the 7th bit set to 0 and all other bits set to 1
Perform a bitwise AND operation between the register and the mask
Store the result back in the register
I was interviewed before Apr 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions on OOPS and OS mainly.
Little Endian and Big Endian refer to the order in which bytes are stored in computer memory.
Little Endian stores the least significant byte first, while Big Endian stores the most significant byte first.
Little Endian is commonly used in x86 architecture, while Big Endian is used in architectures like SPARC and PowerPC.
Endianness can affect data transmission between systems with different byte orders.
Program to determine system's endianness
Check the endianness by storing a multi-byte integer and checking the byte order
Use bitwise operations to extract the least significant byte
If the least significant byte is at the lowest memory address, it's little-endian
If the least significant byte is at the highest memory address, it's big-endian
The volatile keyword in programming is used to indicate that a variable's value can be changed unexpectedly.
Volatile keyword is used in multithreaded programming to prevent compiler optimizations on variables that can be changed by other threads.
It tells the compiler not to cache the variable's value in a register, ensuring that every access is made to the variable's memory location.
Commonly used in embedded systems pr...
Function pointers in C are used to store the address of functions, allowing for dynamic function calls and callbacks.
Function pointers can be used to implement callbacks in event-driven programming.
They can be used to switch between different functions at runtime.
Function pointers are commonly used in implementing data structures like function pointers in an array of function pointers.
Example: void (*funcPtr)(int) = &a
Design a data structure for multi-threading
Use a thread-safe queue to manage tasks for each thread
Implement a lock or semaphore to control access to shared resources
Consider using condition variables for synchronization
Use atomic operations for shared variables to prevent race conditions
The kernel is the core component of an operating system that manages system resources and provides a bridge between software and hardware.
Manages system resources such as CPU, memory, and I/O devices
Provides a bridge between software applications and hardware components
Handles tasks such as process scheduling, memory management, and device drivers
Controls communication between hardware and software layers
A storage class in programming defines the scope and lifetime of variables.
Storage classes include auto, register, static, and extern.
Auto variables are created when a function is called and destroyed when the function ends.
Register variables are stored in CPU registers for faster access.
Static variables retain their value between function calls.
Extern variables are declared outside of any function and can be accessed
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Senior Engineer
1.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
959
salaries
| ₹0 L/yr - ₹0 L/yr |
Engineer
888
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
611
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Leader Engineer
431
salaries
| ₹0 L/yr - ₹0 L/yr |
Nvidia
Intel
Mercedes-Benz Research and Development India
Broadcom