Filter interviews by
I applied via Campus Placement and was interviewed in Aug 2023. There were 2 interview rounds.
It is a combined test aptitude and technical
HashMap internally uses an array of linked lists to store key-value pairs.
HashMap uses an array to store elements.
Each element in the array is a linked list of key-value pairs.
The index of the array is calculated using the hash code of the key.
If multiple keys have the same hash code, they are stored in the same linked list.
This allows for efficient retrieval and insertion of key-value pairs.
I applied via Naukri.com and was interviewed in Nov 2021. There were 3 interview rounds.
I applied via Referral and was interviewed before Sep 2021. There was 1 interview round.
I applied via LinkedIn and was interviewed in Jan 2021. There was 1 interview round.
Textile Sourcing Services interview questions for popular designations
Top trending discussions
posted on 21 Dec 2024
posted on 30 Dec 2024
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There were 2 interview rounds.
ETL stands for Extract, Transform, Load. It is a process used to extract data from various sources, transform it into a consistent format, and load it into a target database or data warehouse.
Extract: Involves extracting data from different sources such as databases, files, APIs, etc.
Transform: Data is cleaned, validated, and transformed into a consistent format suitable for analysis.
Load: The transformed data is loade...
The correct structure of a DBMS diagram includes entities, attributes, relationships, and keys.
Entities represent the main objects in the database (e.g. Customer, Product).
Attributes are characteristics of entities (e.g. CustomerID, ProductName).
Relationships show how entities are related to each other (e.g. one-to-many, many-to-many).
Keys uniquely identify each record in a table (e.g. Primary Key, Foreign Key).
ChatGpt will replace the employment
posted on 29 Oct 2024
I applied via Company Website and was interviewed in Sep 2024. There were 3 interview rounds.
I have 11 years of security experience and a strong understanding of security protocols and procedures.
I have worked as a security guard for 5 years, ensuring the safety and security of various premises.
I am well-versed in security protocols and
procedures, including access control, surveillance, and emergency response. During my time as a security guard, I have successfully handled various security incidents, such as trespassing, theft, and disturbances.
I have received training in first aid and CPR, enabling me to provide immediate assistance in case of medical emergencies.
I am skilled in using security equipment and technology, such as CCTV cameras, alarm systems, and metal detectors.
The roles of a security guard include protecting people and property, monitoring surveillance equipment, enforcing laws and regulations, and responding to emergencies.
Protecting people and property from theft, vandalism, and other illegal activities
Monitoring surveillance equipment to detect suspicious behavior or activities
Enforcing laws and regulations on the premises
Responding to emergencies such as fires, medical incidents, or security breaches
Communication skills, Computer knowledge, common sense, and how to handle emergency situation
I had a very positive experience and was able to learn many things outside the conventional approaches. Overall, the quality was good.
based on 5 interviews
Interview experience
based on 33 reviews
Rating in categories
Data Scientist
7
salaries
| ₹10 L/yr - ₹10 L/yr |
Business Analyst
6
salaries
| ₹1 L/yr - ₹6.2 L/yr |
Softwaretest Engineer
6
salaries
| ₹1.6 L/yr - ₹5 L/yr |
Software Developer
5
salaries
| ₹2 L/yr - ₹4.5 L/yr |
Senior HR Executive
4
salaries
| ₹3.2 L/yr - ₹4.8 L/yr |
Infosys
Wipro
HCLTech
Tech Mahindra