Filter interviews by
I applied via Campus Placement and was interviewed in Dec 2016.Β There were 6 interview rounds.
Sales prediction can be made using machine learning algorithms and statistical models.
Collect and clean relevant data
Choose appropriate algorithm or model
Train the model using historical data
Validate the model using test data
Use the model to predict future sales
Continuously monitor and update the model
Examples: linear regression, decision trees, neural networks
Choosing best five variables involves identifying key factors and using statistical methods to narrow down options.
Identify key factors that impact the outcome
Use statistical methods such as regression analysis or decision trees to narrow down options
Consider the relevance and significance of each variable
Present the solution with clear explanations and visual aids
Example: In a marketing campaign, variables such as age...
Analytics is the process of collecting, analyzing, and interpreting data to make informed decisions.
Analytics involves using statistical and mathematical methods to analyze data
It helps in identifying patterns, trends, and insights from data
Analytics can be used in various fields such as business, finance, healthcare, and sports
Examples of analytics tools include Excel, Tableau, and Python
Analytics can help in making d...
I prefer a job in analytics because I enjoy uncovering insights from data and using them to drive decision-making.
I have a strong passion for working with data and extracting valuable insights.
I enjoy the challenge of analyzing complex datasets and finding patterns or trends.
I believe that analytics can provide valuable information to help businesses make informed decisions.
I am skilled in using various analytical tool...
I applied via Referral and was interviewed in Apr 2024.Β There were 2 interview rounds.
A case study to analyze a campaign for a credit card. And come up a prompt model, identifying the metrics and factors to assess and target the right set of customers
I applied via Walk-in and was interviewed in Mar 2024.Β There were 2 interview rounds.
MCQS online test on general mathematics and logical reasoning
Cross questioning on a given topic
Quantium interview questions for popular designations
I appeared for an interview in Dec 2016.
I appeared for an interview in Dec 2016.
Algorithm for swapping variables
Use a temporary variable to store the value of one variable
Assign the value of the second variable to the first variable
Assign the value of the temporary variable to the second variable
I am interested in analytics because it allows me to uncover insights, make data-driven decisions, and solve complex problems.
I enjoy working with data and finding patterns and trends.
Analytics helps me understand the underlying factors and drivers behind business performance.
It allows me to make informed decisions and recommendations based on data analysis.
Analytics can provide valuable insights that lead to improved ...
My weakness is overthinking, but I overcome it by setting deadlines and seeking feedback.
I tend to overthink situations and decisions, which can lead to indecisiveness.
To overcome this, I set deadlines for myself to make decisions and take action.
I also seek feedback from colleagues or mentors to gain different perspectives and avoid getting stuck in my own thoughts.
Sarah performed the best in the group activity.
Sarah demonstrated strong leadership skills by organizing and delegating tasks effectively.
She actively listened to others' ideas and incorporated them into the group's plan.
Sarah's attention to detail ensured that the group completed the activity accurately and efficiently.
Top trending discussions
posted on 26 Jan 2017
I appeared for an interview before Jan 2016.
I applied via Referral and was interviewed before Oct 2021.Β There were 2 interview rounds.
A linked list is a data structure that consists of a sequence of nodes, where each node contains a reference to the next node.
Advantages of linked list:
- Dynamic size: Linked lists can grow or shrink as needed.
- Efficient insertion and deletion: Adding or removing elements from a linked list is faster than an array.
- Flexibility: Linked lists can be easily modified and reorganized.
Representation of a linked list:
- Each...
Code for Fibonacci number using recursion
Define a function that takes an integer as input
If the input is 0 or 1, return the input
Else, return the sum of the function called with input-1 and input-2
Call the function with the desired input
Check if a sorted array from 1 to n has a repeated number.
Iterate through the array and check if the current element is equal to the next element.
If yes, return true. If no, continue iterating.
If the loop completes without finding a repeated element, return false.
Print a string with all occurrences of the first character first.
Loop through the string and count the occurrences of the first character.
Print the first character that many times, then print the rest of the string.
Print Fibonacci series using iterative or recursive approach.
Iterative approach: Use a loop to generate the series.
Recursive approach: Use a function to call itself to generate the series.
Start with 0 and 1, then add the previous two numbers to get the next number.
The series goes like this: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, ...
The series can be generated up to a certain limit or until a certain number is re
OOPS concepts are the principles of Object-Oriented Programming that focus on encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: bundling of data and methods that operate on that data within a single unit
Inheritance: ability of a class to inherit properties and methods from a parent class
Polymorphism: ability of objects to take on many forms or have multiple behaviors
Abstraction: hiding of complex...
Pillars of OOPS are the fundamental principles of Object-Oriented Programming.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together to protect data from outside interference.
Inheritance: Acquiring properties and behavior of a parent class by a child class.
Polymorphism: Ability of objects to take multiple forms or have multiple behaviors.
OOPS is important for code reusability, maintainability, and extensibility.
Encapsulation ensures data security and prevents unwanted access.
Inheritance allows for code reuse and reduces redundancy.
Polymorphism enables flexibility and extensibility of code.
Abstraction simplifies complex systems and hides implementation details.
OOPS promotes modular design and improves code maintainability.
OOPS facilitates team collabora...
Classes are templates for creating objects. Objects are instances of classes that have their own properties and methods.
Classes define the properties and methods that objects of that class will have
Objects are instances of classes that can be created and manipulated in code
Classes and objects are fundamental concepts in object-oriented programming
Example: A class 'Car' can have properties like 'make', 'model', 'year',
A constructor is a special method that is used to initialize objects in a class.
Constructors have the same name as the class they are in
They are called automatically when an object is created
They can take parameters to set initial values for object properties
Abstraction and interface are both used to achieve abstraction in programming.
Abstraction is the process of hiding implementation details while showing only the necessary information to the user.
Interface is a blueprint for a class that defines a set of methods and properties that the class must implement.
Abstraction can be achieved through abstract classes and interfaces.
Abstraction is a concept while interface is a l...
Abstraction is a way of hiding implementation details and showing only necessary information to the user.
Abstract class is a class that cannot be instantiated and can have both abstract and non-abstract methods.
Interface is a collection of abstract methods and constants that can be implemented by any class.
Abstract classes can have constructors, while interfaces cannot.
A class can implement multiple interfaces, but can...
Types of inheritance in software engineering
Single inheritance: a class inherits from only one parent class
Multiple inheritance: a class inherits from multiple parent classes
Multilevel inheritance: a class inherits from a derived class, which in turn inherits from another class
Hierarchical inheritance: multiple classes inherit from a single parent class
Hybrid inheritance: a combination of multiple and multilevel inheri
Structures are value types while classes are reference types.
Structures are allocated on stack while classes are allocated on heap.
Structures do not support inheritance while classes do.
Structures cannot have destructors while classes can.
Structures are used for small data structures while classes are used for larger, more complex objects.
Structures are passed by value while classes are passed by reference.
Constructor and destructor are special member functions in a class that are used to initialize and destroy objects respectively.
Constructor is called when an object is created and is used to initialize the object's data members.
Destructor is called when an object is destroyed and is used to free up any resources allocated by the object.
Constructor has the same name as the class and no return type, while destructor has ...
Encapsulation is the process of hiding implementation details and exposing only necessary information.
Encapsulation is achieved through access modifiers like public, private, and protected.
It helps in achieving data abstraction and information hiding.
It prevents unauthorized access to the internal state of an object.
Example: A class with private variables and public methods to access them.
To add a new column to an existing table, use the ALTER TABLE command.
Use the ALTER TABLE command followed by the table name.
Use the ADD keyword followed by the new column name and its data type.
Example: ALTER TABLE table_name ADD column_name data_type;
Make sure to specify any additional constraints or default values for the new column.
Query to return customers who joined the company in March.
Use the WHERE clause to filter the join date by month
Assuming the join date is stored in a 'join_date' column
Example: SELECT * FROM customers WHERE MONTH(join_date) = 3
The OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
The Physical layer deals with the physical transmission of data.
The Data Link layer provid...
The application layer uses various protocols such as HTTP, FTP, SMTP, etc.
HTTP (Hypertext Transfer Protocol) is used for web browsing
FTP (File Transfer Protocol) is used for file transfer
SMTP (Simple Mail Transfer Protocol) is used for email communication
POP3 (Post Office Protocol version 3) is used for retrieving emails
IMAP (Internet Message Access Protocol) is used for accessing emails on a server
DNS (Domain Name Sys...
TCP is a connection-oriented protocol while UDP is connectionless.
TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these.
TCP is slower but more reliable while UDP is faster but less reliable.
TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.
Examples of TCP-based applications i...
To measure 4 minutes using two hourglasses of 11 and 7 minutes, start both hourglasses simultaneously and flip the 7-minute hourglass when it runs out. When the 11-minute hourglass runs out, 4 minutes will have passed.
Start both hourglasses simultaneously
When the 7-minute hourglass runs out, flip it
When the 11-minute hourglass runs out, 4 minutes will have passed
Program an ATM machine to dispense only 500 and 100 notes and count their number.
Create a function to dispense money
Use a loop to count the number of notes
Use if statements to check if the amount is divisible by 500 or 100
Display the total number of notes dispensed
Program to find binary format of 4 and 7.
Convert decimal numbers to binary using bitwise operator.
Print the binary format of the numbers.
Use printf or cout to display the output.
Print Fibonacci Series between two given numbers iteratively and recursively.
Iteratively, use a loop to generate Fibonacci numbers until the upper limit is reached.
Recursively, use a function to generate Fibonacci numbers until the upper limit is reached.
Store the generated Fibonacci numbers in an array and print them between the given numbers.
All possible ways to traverse a tree.
Pre-order traversal: root, left, right
In-order traversal: left, root, right
Post-order traversal: left, right, root
Level-order traversal: breadth-first search
Reverse level-order traversal: depth-first search
To find a loop in a linked list, use Floyd's cycle-finding algorithm.
Floyd's algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop, the faster pointer will eventually catch up to the slower one.
To determine the start of the loop, reset one pointer to the beginning and move both at the same speed.
Height of a tree refers to the maximum number of edges from the root node to any leaf node in the tree.
Height of a tree can be calculated recursively by finding the height of left and right subtrees and adding 1 to the maximum of the two heights.
Height of a tree can also be calculated iteratively using level order traversal.
Height of a tree with only one node is 0.
Height of an empty tree is -1.
I would use a Linked List data structure for frequent insertion and deletion operations.
Linked Lists have constant time complexity for insertion and deletion operations.
Arrays have a linear time complexity for these operations.
Doubly Linked Lists allow for efficient deletion of nodes.
Examples of use cases include implementing a queue or stack.
Find the element that occurs only once in an array of numbers from 1 to n with all other numbers occurring twice.
Use XOR operation to find the unique element.
Iterate through the array and XOR each element with the result.
The final result will be the unique element.
Abstraction: hiding implementation details. Inheritance: creating new classes from existing ones. Polymorphism: same method, different behavior.
Abstraction: Focuses on what an object does instead of how it does it.
Inheritance: Allows a new class to be based on an existing class.
Runtime Polymorphism: Same method can be used for different objects, with different behavior.
Example: A car is an abstraction of a vehicle. Sed...
DBMS stands for Database Management System. It is a software system that manages and organizes data in a database.
DBMS is used to create, modify, and delete databases and their objects.
It provides a way to store, retrieve, and manipulate data efficiently.
Examples of DBMS include MySQL, Oracle, SQL Server, and MongoDB.
Primary key uniquely identifies a record in a table, while unique key ensures uniqueness of a column.
Primary key can't have null values, while unique key can have one null value.
A table can have only one primary key, but multiple unique keys.
Primary key is used as a foreign key in other tables, while unique key is not.
Example: Primary key - employee_id in employee table. Unique key - email in employee table.
Constraints are limitations or restrictions that are put on a system or process.
Constraints can be related to time, resources, budget, or technology.
They can be imposed by external factors such as regulations or internal factors such as company policies.
Examples of constraints in software development include limited memory or processing power, compatibility with existing systems, and security requirements.
OS stands for Operating System. It is responsible for managing computer hardware and software resources.
OS is the interface between the user and the computer hardware.
It manages memory, processes, and input/output devices.
Examples of OS include Windows, macOS, and Linux.
OS is responsible for providing security and managing user accounts.
It also provides a platform for running applications and software.
Multithreading is the ability of a CPU to execute multiple threads concurrently.
Multithreading allows for better utilization of CPU resources.
It can improve application performance by allowing multiple tasks to run simultaneously.
Multithreading can also lead to synchronization issues and race conditions.
Examples of multithreaded applications include web servers, video games, and media players.
Multithreading is the ability of a CPU to run multiple threads concurrently, while multitasking is the ability of an OS to run multiple processes concurrently.
Multithreading is at the CPU level, while multitasking is at the OS level.
Multithreading allows multiple threads to share the same memory space, while multitasking requires separate memory spaces for each process.
Multithreading is used for improving performance a...
I am a software engineer with 5 years of experience in developing web applications using Java and JavaScript.
I have a strong background in object-oriented programming and software development principles.
I am proficient in Java, JavaScript, and related frameworks such as Spring and React.
I have experience in designing and implementing RESTful APIs.
I am familiar with Agile methodologies and have worked in Scrum teams.
I h...
My strength is problem-solving and my weakness is perfectionism.
Strength: Strong problem-solving skills
Strength: Ability to work well in a team
Weakness: Perfectionism
Weakness: Difficulty in delegating tasks
Mystify is likely a function or method that performs a complex or obscure operation.
Mystify could be encrypting or obfuscating data.
It might be performing a transformation or manipulation on data.
Mystify could be generating random or unpredictable outputs.
I want to join your company because of its reputation for innovation and the opportunity to work on cutting-edge projects.
Reputation for innovation
Opportunity to work on cutting-edge projects
You should hire me because I have a strong technical background, excellent problem-solving skills, and a passion for software development.
I have a Bachelor's degree in Computer Science and extensive experience in software development.
I have a deep understanding of various programming languages and frameworks, including Java, Python, and JavaScript.
I have a proven track record of delivering high-quality software solutio...
based on 3 interviews
Interview experience
Senior Data Scientist
8
salaries
| βΉ26 L/yr - βΉ35 L/yr |
Analyst
5
salaries
| βΉ12 L/yr - βΉ14 L/yr |
Data Scientist
5
salaries
| βΉ12 L/yr - βΉ15.2 L/yr |
IT Support Analyst
4
salaries
| βΉ5.5 L/yr - βΉ9.9 L/yr |
Senior Data Engineer
4
salaries
| βΉ20.3 L/yr - βΉ34 L/yr |
Shah Technical Consultants
Gi Group
Ven Consulting
VHS Consulting