Filter interviews by
I applied via Company Website and was interviewed before Oct 2021. There were 2 interview rounds.
Fundamental rights are protected by the Supreme Court and are necessary for ensuring individual freedom and equality.
Supreme Court has the power to strike down laws that violate fundamental rights
Fundamental rights protect individual freedom and ensure equality
Examples of fundamental rights include the right to life, liberty, and equality before the law
Without fundamental rights, individuals may be subject to discrimin
I applied via Job Fair and was interviewed before Feb 2021. There were 5 interview rounds.
What is aptitude test?
Online study and off-line which one is better?
Someone not interested in assignments.
I applied via Job lever and was interviewed before Sep 2021. There were 2 interview rounds.
Easy leetcode code 2 questions , HTML5 css javascript simple screen design
I applied via Approached by Company and was interviewed before Sep 2021. There were 2 interview rounds.
I applied via Company Website and was interviewed before Mar 2020. There was 1 interview round.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Start from the first element and compare it with the next element
If the first element is greater than the next element, swap them
Repeat this process for all elements in the list
Continue this process until no more swaps are needed
A Turing Machine is a theoretical device that can simulate any algorithmic computation.
It was proposed by Alan Turing in 1936 as a model for computation.
It consists of a tape, a head that can read and write symbols on the tape, and a set of rules for transitioning between states.
It can simulate any algorithmic computation, making it a powerful tool for theoretical computer science.
It is often used as a theoretical basi...
A hash function is a mathematical function that converts input data of arbitrary size into a fixed-size output.
Hash functions are used to index data in hash tables.
They are also used in cryptography to securely store passwords.
Examples of hash functions include MD5, SHA-1, and SHA-256.
I applied via Referral and was interviewed before May 2021. There were 2 interview rounds.
I applied via Indeed and was interviewed in Jan 2021. There was 1 interview round.
posted on 8 Nov 2021
I applied via Naukri.com and was interviewed before Nov 2020. There was 1 interview round.
posted on 24 Jan 2021
I applied via Walk-in and was interviewed in Dec 2020. There was 1 interview round.
based on 16 reviews
Rating in categories
Aptitude Trainer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Quality Analyst
4
salaries
| ₹0 L/yr - ₹0 L/yr |
System Administrator
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Academic Counsellor
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Lead
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Triumphant Institute of Management Education
Career Launcher
IMS Learning Resources
BYJU'S