Filter interviews by
I applied via Referral and was interviewed before Jul 2021. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Oct 2024. There was 1 interview round.
Use JavaScript to change the color of a button
Select the button element using document.querySelector()
Use the style property to change the background color of the button
Create a div inside another div and add a table inside the inner div using pure JavaScript
Create a parent div element using document.createElement('div')
Create a child div element using document.createElement('div')
Create a table element using document.createElement('table')
Append the child div and table elements to the parent div using parentDiv.appendChild(childDiv) and parentDiv.appendChild(table)
I applied via Company Website and was interviewed in Jun 2024. There was 1 interview round.
Uniphore Software Systems interview questions for popular designations
I applied via Approached by Company and was interviewed before May 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Oct 2020. There was 1 interview round.
Top trending discussions
DSP stands for Demand-Side Platform and SSP stands for Supply-Side Platform in the context of programmatic advertising.
DSP is a platform used by advertisers to purchase ad inventory in real-time auctions.
SSP is a platform used by publishers to sell their ad inventory to advertisers.
DSPs and SSPs work together in programmatic advertising to automate the buying and selling of ad space.
DSPs use data and algorithms to targ...
Leetcode easy-medium
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access, data breaches, and other cyber threats.
It includes technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Examples of cyber security measures include firewalls, ant...
Types of encryption include symmetric encryption, asymmetric encryption, and hashing.
Symmetric encryption: Uses the same key for both encryption and decryption, examples include AES and DES.
Asymmetric encryption: Uses a pair of public and private keys for encryption and decryption, examples include RSA and ECC.
Hashing: Converts data into a fixed-size string of bytes, examples include MD5 and SHA.
based on 3 interviews
Interview experience
based on 92 reviews
Rating in categories
5-10 Yrs
Not Disclosed
Business Analyst
45
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
37
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
28
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Business Analyst
18
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Manager
9
salaries
| ₹0 L/yr - ₹0 L/yr |
Freshworks
Zoho
InMobi
LTIMindtree