i
RMSI
Filter interviews by
I applied via Campus Placement and was interviewed before Dec 2023. There were 3 interview rounds.
A good level of performance on a general aptitude test.
I have a strong background in data annotation and a proven track record of delivering high-quality results efficiently.
Extensive experience in data annotation tasks
Ability to work efficiently and accurately under tight deadlines
Strong attention to detail and quality control
Proven track record of delivering high-quality results
Excellent communication and teamwork skills
I tend to be overly critical of my own work, which can sometimes lead to perfectionism.
I have a tendency to spend too much time on a task to ensure it is perfect
I can be self-critical and have high standards for myself
I am working on finding a balance between striving for excellence and accepting imperfection
I am a detail-oriented Annotation Engineer with a passion for organizing and categorizing information.
Experienced in creating and managing annotations for various datasets
Proficient in using annotation tools such as Labelbox and CVAT
Strong attention to detail and accuracy in labeling data
Ability to work efficiently in a fast-paced environment
Excellent communication skills for collaborating with team members
My salary expectations are in line with industry standards and based on my experience and qualifications.
Research industry standards for the position
Consider my experience and qualifications
Be open to negotiation based on benefits package
Top trending discussions
I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Oct 2024. There were 2 interview rounds.
posted on 10 Nov 2024
I applied via Approached by Company and was interviewed in Oct 2024. There were 3 interview rounds.
One coding test happen
Using stream API for Data Structures and Algorithms
Stream API in Java can be used to perform operations on collections like filtering, mapping, reducing, etc.
It can be used for implementing various data structures and algorithms efficiently.
For example, you can use stream API to find the sum of all elements in an array or filter out even numbers from a list.
Using stream API to filter a list of numbers and find the sum of even numbers
Use Stream.filter() to filter out even numbers
Use Stream.mapToInt() to convert stream to IntStream
Use IntStream.sum() to find the sum of even numbers
posted on 11 Nov 2024
Closures are functions that have access to variables from their containing scope even after the scope has closed.
Closures allow functions to access variables from their outer function even after the outer function has finished executing.
They are commonly used in event handlers, callbacks, and asynchronous programming.
Closures help in maintaining state in functional programming.
Virtual DOM is a lightweight copy of the actual DOM used for efficient updates in web development.
Virtual DOM is a concept used in frameworks like React to improve performance by minimizing actual DOM manipulations.
When changes are made to the virtual DOM, a comparison is done with the actual DOM to determine the minimal updates needed.
This approach reduces the number of costly DOM operations, resulting in faster rende
Data types in JavaScript include number, string, boolean, object, function, undefined, and null.
Number - represents numeric data, e.g. 10, 3.14
String - represents textual data, e.g. 'hello', '123'
Boolean - represents true or false values, e.g. true, false
Object - represents complex data structures, e.g. { key: 'value' }
Function - represents executable code, e.g. function() { }
Undefined - represents a variable that has ...
React code for a simple counter
Create a functional component for the counter
Use useState hook to manage the count state
Render the count value and buttons to increment and decrement the count
posted on 3 Mar 2025
I was interviewed before Mar 2024.
Use XOR operation to swap two variables without using a temporary variable
Use XOR operation to swap two variables without using a temporary variable
Example: a = 5, b = 10. a = a XOR b, b = a XOR b, a = a XOR b. Now a = 10, b = 5
Matrix multiplication in CUDA involves parallelizing the computation across multiple threads on the GPU.
Use CUDA kernels to launch parallel threads for matrix multiplication.
Divide the matrices into blocks and load them into shared memory for faster access.
Implement the matrix multiplication algorithm in CUDA C/C++.
Ensure proper memory management and synchronization between threads.
Merge two sorted arrays into a single sorted array
Create a new array to store the merged result
Iterate through both arrays simultaneously and compare elements
Add the smaller element to the new array and move to the next element in that array
Continue until all elements from both arrays are merged
Design patterns are reusable solutions to common problems in software design.
Design patterns help in creating flexible, maintainable, and scalable software.
Some common design patterns include Singleton, Factory, Observer, Strategy, and Decorator.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object...
Delegates are type-safe function pointers in C# used for implementing callbacks. async/await is used for asynchronous programming in C#.
Delegates in C# are similar to function pointers in C or C++. They allow methods to be passed as parameters to other methods.
Async/await in C# is used for asynchronous programming, allowing methods to run asynchronously without blocking the main thread.
Delegates can be used with async/
An interceptor is a design pattern commonly used in software development to capture and manipulate requests and responses.
Interceptors can be used for logging, authentication, authorization, caching, error handling, etc.
In Angular, interceptors can be used to modify HTTP requests before they are sent and responses before they are received.
In Spring framework, interceptors can be used to intercept client requests and se
Authentication is the process of verifying the identity of a user or system.
Authentication involves confirming the identity of a user through credentials such as passwords, biometrics, or security tokens.
Common methods of authentication include single-factor authentication (e.g. password) and multi-factor authentication (e.g. password + SMS code).
Authentication can be achieved through protocols like OAuth, OpenID, SAML...
based on 3 interviews
Interview experience
based on 7 reviews
Rating in categories
GIS Engineer
3.2k
salaries
| ₹1.5 L/yr - ₹5 L/yr |
Senior GIS Engineer
768
salaries
| ₹1.1 L/yr - ₹6.1 L/yr |
Senior Engineer
200
salaries
| ₹2.7 L/yr - ₹8.8 L/yr |
Assistant GIS Engineer
153
salaries
| ₹1.5 L/yr - ₹4 L/yr |
Assistant Engineer
137
salaries
| ₹1.8 L/yr - ₹4 L/yr |
Cyient
Genpact
TCS
Wipro