i
TTEC India
Filter interviews by
React hooks are a new addition in React 16.8 that allow you to use state and other React features without writing a class.
Hooks are functions that let you use state and other React features in functional components.
There are different types of hooks like useState, useEffect, useContext, etc.
useState is used to add state to functional components.
useEffect is used to perform side effects in functional components.
useConte...
What people are saying about TTEC India
I applied via Referral and was interviewed before Jul 2021. There was 1 interview round.
I applied via Referral and was interviewed in Dec 2019. There was 1 interview round.
I have handled various training programs in my previous roles.
Designed and delivered onboarding training for new employees
Conducted workshops on leadership development
Managed training schedules and resources
Evaluated training effectiveness through feedback and assessments
Our conversion target is to increase website sign-ups by 20% within the next quarter.
Our focus is on increasing the number of website sign-ups
We aim to achieve a 20% increase in sign-ups within the next quarter
We will be implementing various strategies such as A/B testing and optimizing landing pages
We will also be analyzing user behavior and making necessary changes to improve conversion rates
I give training by first assessing the needs of the learners and then designing a customized program that is interactive and engaging.
Assess the needs of the learners
Design a customized program
Make the training interactive and engaging
Provide practical examples and case studies
Encourage participation and feedback
Use a variety of teaching methods
Provide follow-up support and resources
I applied via Referral and was interviewed before Sep 2022. There were 2 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jun 2023. There were 2 interview rounds.
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access to information.
It includes technologies, processes, and practices designed to protect networks, devices, and data from cyber threats.
Examples of cyber security measures include firewalls, antivirus software, encryption, and multi-factor authentication
I applied via Recruitment Consultant and was interviewed in Dec 2020. There were 4 interview rounds.
I applied via Walk-in and was interviewed in Jan 2024. There were 2 interview rounds.
Throughput refers to the rate at which a system or process can complete a task or deliver a product.
Throughput is a measure of efficiency and productivity.
It is often used in manufacturing, logistics, and computer networks.
Throughput can be measured in units per hour, items per minute, or data transfer rate.
For example, in a factory, throughput can refer to the number of products produced in a given time period.
In comp...
Throughput is the rate at which a system or process can complete a task or produce a product.
Throughput can be calculated by dividing the total number of completed tasks or produced products by the time taken.
Throughput is often measured in units per hour, units per day, or units per minute.
For example, if a manufacturing plant produces 100 units in 2 hours, the throughput would be 50 units per hour.
based on 1 interview
Interview experience
based on 8 reviews
Rating in categories
Fraud Analyst
289
salaries
| ₹2.3 L/yr - ₹5 L/yr |
Chat Support Executive
235
salaries
| ₹2.2 L/yr - ₹4.8 L/yr |
Fraud Prevention Representative
204
salaries
| ₹2.4 L/yr - ₹4.5 L/yr |
Customer Service Representative
180
salaries
| ₹1.5 L/yr - ₹5 L/yr |
Chat Associate
155
salaries
| ₹2 L/yr - ₹4.2 L/yr |
Teleperformance
Concentrix Corporation
iEnergizer
WNS