Filter interviews by
Order management in ServiceNow involves managing the lifecycle of orders from creation to fulfillment.
Order creation through catalog items or service requests
Tracking order status and progress
Automating order fulfillment processes
Integrating with inventory management systems
Generating reports on order metrics
Background script runs before the data is loaded, while filter script runs after the data is loaded and filters the data based on specified criteria.
Background script is used to perform actions before the data is loaded, such as setting variables or defining functions.
Filter script is used to filter the data after it has been loaded, based on specified criteria.
Background script is typically used for data preparation a...
Different ways to populate CMDB include manual entry, discovery tools, integrations with other systems, and automated data collection.
Manual entry by IT staff
Discovery tools like SCCM, SolarWinds, or ServiceNow Discovery
Integrations with other systems such as monitoring tools, asset management systems, or ticketing systems
Automated data collection through scripts or APIs
Top trending discussions
Agile is a project management methodology focused on iterative development, SDLC is the software development life cycle, and user stories are short descriptions of a feature told from the perspective of the end user.
Agile is a project management approach that emphasizes flexibility, collaboration, and customer feedback.
SDLC is the process of planning, creating, testing, and deploying software applications.
User stories ...
To create a new market in Vietnam for LC/BG, we can start by conducting market research, building relationships with local businesses and government agencies, and offering tailored financial solutions.
Conduct market research to understand the needs and preferences of Vietnamese businesses
Build relationships with local banks, businesses, and government agencies to establish credibility and trust
Offer tailored financial ...
Acceptance criteria are conditions that a product must satisfy to be accepted by a user, customer, or stakeholder.
Acceptance criteria are typically defined during the planning phase of a project.
They are used to determine whether a product or feature is complete and functioning as expected.
Acceptance criteria are often written in a specific format, such as 'Given X, when Y, then Z.'
They help ensure that the product mee...
I applied via Referral and was interviewed in Aug 2024. There were 3 interview rounds.
posted on 20 Dec 2024
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There was 1 interview round.
You have list of Integers, say {1,43,54,35,35,54} With this I want to know the count of each digits in the List. Example 1->1,3->3,4->3,5->4
Use the OBS option in a SET statement to read the last observation of a SAS dataset.
Use the OBS option in a SET statement followed by the keyword 'END' to read the last observation of a SAS dataset.
For example, to read the last observation of a dataset named 'mydata', use the following code: data lastobs; set mydata(obs=last end=last); run;
I applied via Naukri.com and was interviewed in Jan 2024. There were 2 interview rounds.
The default value of a map in most programming languages is null or an empty map.
Default value of map in Java is null
Default value of map in Python is an empty map {}
Default value of map in C++ is an empty map std::map<>()
The virtual keyword in C++ is used to declare a member function that can be overridden in a derived class. Virtual functions are resolved at runtime.
Virtual keyword is used to achieve runtime polymorphism in C++
Virtual functions are resolved at runtime based on the actual object type
Virtual functions are implemented using virtual function tables (vtables)
Derived classes can override virtual functions to provide specifi
posted on 14 Feb 2024
JWT token is a secure way to transmit information between parties as a JSON object.
JWT stands for JSON Web Token
It is a compact, URL-safe means of representing claims to be transferred between two parties
It consists of three parts: header, payload, and signature
The header contains the type of token and the signing algorithm used
The payload contains the claims or statements about the user and additional data
The signatur...
A recently found vulnerability in a system
The vulnerability was discovered during a security audit
It allows unauthorized access to sensitive data
The vulnerability can be exploited remotely
A patch or fix should be implemented immediately
I applied via LinkedIn and was interviewed before Jun 2023. There were 2 interview rounds.
Online exam, half hour
I applied via Naukri.com and was interviewed in Aug 2024. There were 3 interview rounds.
Power BI Services features include data visualization, interactive reports, dashboards, and data connectivity.
Data visualization tools like charts, graphs, and maps
Interactive reports for exploring data and gaining insights
Dashboards for monitoring key metrics and KPIs
Data connectivity to various sources like Excel, SQL databases, and cloud services
Seeking new challenges and growth opportunities in a different environment.
Desire for career advancement
Looking for new challenges
Seeking a change in work environment
Opportunity to learn and grow in a different setting
Tata Motors
Mahindra & Mahindra
Maruti Suzuki
Ashok Leyland