i
Trianz
Filter interviews by
General questions about risk management, change management, linux commands
Top trending discussions
posted on 22 Jul 2024
posted on 2 May 2024
I applied via Naukri.com and was interviewed in Apr 2024. There were 4 interview rounds.
Case study of projects that you been into previously and how will you counter the cases and proactive cases to the prioritise Incidents.
posted on 10 Jul 2023
I applied via Recruitment Consulltant and was interviewed in Jan 2023. There were 5 interview rounds.
I applied via Campus Placement and was interviewed before Jul 2022. There were 4 interview rounds.
MCQ questions related to data structures and algorithms and some easy-medium leetcode coding questions
I applied via Recruitment Consulltant and was interviewed in Feb 2022. There were 3 interview rounds.
posted on 15 Mar 2022
I applied via Naukri.com and was interviewed before Mar 2021. There was 1 interview round.
A cursor is a database object used to retrieve data from a result set one row at a time.
A cursor is used to iterate through a result set.
It can be used to update or delete rows in a table.
Example query: DECLARE cursor_name CURSOR FOR SELECT column1, column2 FROM table_name;
Example usage: OPEN cursor_name; FETCH NEXT FROM cursor_name INTO @variable1, @variable2;
Example usage: CLOSE cursor_name; DEALLOCATE cursor_name;
posted on 31 Oct 2023
I was interviewed before Oct 2022.
The user is unable to access their workspace due to an error.
Check if the user's credentials are correct
Verify if the workspace server is up and running
Ensure there are no network connectivity issues
Check for any recent updates or changes that may have caused the error
I will prioritize critical requests based on impact and urgency, communicate with stakeholders, and escalate as needed.
Prioritize critical requests based on impact and urgency
Communicate with stakeholders to gather necessary information and set expectations
Escalate to appropriate teams or management if needed
Monitor progress and provide updates to stakeholders
posted on 20 Jan 2023
Oops concepts were judged along with problem solving
Permutations of a string can be generated using recursion and swapping characters.
Use recursion to generate all possible permutations
Swap characters to create new permutations
Store permutations in an array of strings
Handle duplicate characters to avoid repetition
A database for managing songs on Spotify playlists.
Create a table for playlists with columns for name, description, and user ID
Create a table for songs with columns for title, artist, album, and duration
Create a table for playlist-songs with columns for playlist ID and song ID
Use foreign keys to link tables together
Allow for CRUD operations on playlists and songs
To find the middle element of a linked list in a single traversal.
Use two pointers, one moving at twice the speed of the other.
When the faster pointer reaches the end, the slower pointer will be at the middle.
If the linked list has even number of elements, the middle will be the second of the two middle elements.
Create an array of song titles sorted by year of publication.
Create an array of song objects with properties for title and year of publication.
Sort the array by year of publication.
Extract the titles of the songs into a separate array.
Return the array of song titles.
based on 1 interview
Interview experience
Technical Lead
675
salaries
| ₹9 L/yr - ₹30.3 L/yr |
Senior Software Engineer
408
salaries
| ₹5.2 L/yr - ₹17.5 L/yr |
Senior Technical Lead
369
salaries
| ₹11.2 L/yr - ₹37 L/yr |
Software Engineer
306
salaries
| ₹3 L/yr - ₹9 L/yr |
Senior Systems Engineer
87
salaries
| ₹3.8 L/yr - ₹13 L/yr |
Wipro
Infosys
Tech Mahindra
HCLTech