Filter interviews by
Be the first one to contribute and help others!
I was interviewed in Aug 2024.
Explanation of useState, useEffect, useMemo, and useCallback hooks in React functional components.
useState is used to manage state in functional components
useEffect is used for handling side effects like data fetching, subscriptions, etc.
useMemo is used for performance optimization by memoizing expensive calculations
useCallback is used for memoizing functions to prevent unnecessary re-renders
These hooks enhance functio...
Setting up Redux store, connecting components, managing actions and reducers, and using middleware like Redux Thunk or Redux Saga for handling asynchronous actions.
Setting up a Redux store involves creating a store with createStore() function from Redux, combining reducers with combineReducers(), and applying middleware like Redux Thunk or Redux Saga.
Connecting components to the Redux store can be done using the connec...
To add and manipulate elements in arrays using JavaScript, you can use array methods like splice() and slice().
Use the splice() method to insert elements into an array at a specific index. For example, arr.splice(index, 0, 'watermelon') will insert 'watermelon' at the specified index without removing any elements.
To manipulate elements in an array, you can use methods like splice() to remove elements or slice() to extr...
Math.floor() is a method in JavaScript that rounds a number down to the nearest integer.
Math.floor() returns the largest integer less than or equal to a given number.
It is commonly used to convert a floating-point number to an integer.
Example: Math.floor(3.9) returns 3.
Mocking components in Jest for testing with props and named exports
Use jest.mock() to mock components and their exports
For handling props, use jest.fn() to create mock functions and pass them as props to the component being tested
For named exports, use jest.mock() with a second argument to specify the module's exports
I applied via Approached by Company and was interviewed in Oct 2024. There were 4 interview rounds.
2 DSA questions and some MCQ on Java and Spring
A palindromic substring is a string that reads the same forwards and backwards.
Use dynamic programming to find the longest palindromic substring.
Start by considering each character as the center of a potential palindrome.
Expand outwards from each center to check for palindromes of odd and even lengths.
Remove duplicates from a 1D array of strings in place
Iterate through the array and use a HashSet to keep track of unique elements
Replace duplicates with null or an empty string to remove them in place
Search for the minimum element in a rotated sorted array with duplicate elements.
Use binary search to find the minimum element in the rotated sorted array.
Handle the case where duplicate elements are present by adjusting the search conditions.
Consider cases where the array is not rotated or contains only one element.
A singleton class is a class that can only have one instance created throughout the application.
Declare a private static instance variable of the class
Create a private constructor to prevent external instantiation
Provide a public static method to access the instance
I applied via Referral and was interviewed in Jul 2024. There were 4 interview rounds.
Solution architecture and block diagram involves designing the overall structure of a system and visually representing it.
Identify key components and their interactions
Define data flow and communication protocols
Consider scalability, security, and performance
Use tools like UML diagrams or flowcharts
Example: AWS architecture with EC2 instances, S3 storage, and RDS database
Program values and benefits are essential for successful project management, ensuring alignment with organizational goals and delivering value to stakeholders.
Program values define the principles and beliefs that guide decision-making and behavior within the program.
Benefits are the positive outcomes or results that the program aims to achieve, such as cost savings, increased efficiency, or improved customer satisfacti...
Assessing program benefits involves identifying key metrics, collecting data, analyzing results, and comparing against goals.
Identify key metrics to measure success, such as cost savings, revenue growth, customer satisfaction, etc.
Collect relevant data to track progress and measure impact of the program.
Analyze the data to determine if the program is meeting its objectives and delivering expected benefits.
Compare the r...
2 case study rounds for 1.5 hours, 1st case study is a small use case with 2 questions and there will be 10 mins given for preparation. 2nd case study will have 5 questions and time given for preparation will be 25 mins.
I have experienced failures in past projects and have learned valuable lessons from them.
Recognizing the importance of clear communication and setting expectations early on
Implementing regular project status updates to stakeholders to avoid surprises
Documenting lessons learned to prevent repeating the same mistakes in future projects
Schedule and effort estimation is crucial for successful project management.
Understand the scope of the project and break it down into smaller tasks
Estimate the time and resources required for each task
Consider dependencies between tasks and potential risks
Use historical data or expert judgment to improve accuracy
Regularly review and update the schedule as needed
Project phases are distinct stages in a project's lifecycle, each with specific goals and deliverables.
Initiation: Define project scope, objectives, and stakeholders.
Planning: Create a detailed project plan, including timelines and resources.
Execution: Implement the project plan and deliver the project's objectives.
Monitoring and Controlling: Track project progress, identify issues, and make necessary adjustments.
Closi...
Opex refers to operational expenses, while Capex refers to capital expenses.
Opex includes day-to-day expenses like salaries, rent, utilities, and maintenance.
Capex involves investments in assets that provide long-term value, such as equipment, property, and infrastructure.
Opex is typically incurred regularly and is fully tax-deductible in the year it is incurred.
Capex is usually depreciated over time as the asset is us...
Quality is crucial in delivering successful projects. Various tools like Jira, Confluence, and Jenkins are commonly used to ensure high quality.
Quality assurance processes are essential to maintain high standards in project deliverables
Tools like Jira are used for issue tracking and project management
Confluence is used for documentation and collaboration among team members
Jenkins is used for continuous integration and ...
Led a project to implement a cloud-based data analytics platform using AWS services and Python tech stack.
Designed architecture for data analytics platform using AWS services like S3, Glue, and Athena.
Implemented ETL processes using Python and Apache Spark for data transformation and analysis.
Integrated machine learning models into the platform for predictive analytics.
Ensured scalability and performance optimization o...
Managing conflicting priorities involves prioritizing tasks, communicating effectively, and being flexible.
Prioritize tasks based on importance and deadlines
Communicate with stakeholders to understand their needs and expectations
Be flexible and willing to adjust plans as needed
Use tools like project management software to track progress and manage tasks
Managing stakeholders expectations and demands is crucial for successful project delivery.
Establish clear communication channels with stakeholders
Set realistic expectations from the beginning
Regularly update stakeholders on project progress
Address any concerns or issues promptly
Seek feedback from stakeholders to ensure alignment
I applied via Referral and was interviewed in Dec 2024. There were 2 interview rounds.
I have been working at essae for 3 years.
Note interview round
I applied via AmbitionBox and was interviewed in Nov 2024. There were 2 interview rounds.
We are discussing the daily sales targets and store achievements.
I applied via Naukri.com and was interviewed in Jul 2024. There were 3 interview rounds.
KPIs for marketing include metrics like ROI, lead generation, brand awareness. Marcom plays a key role in achieving these KPIs.
Key performance indicators for marketing include ROI, lead generation, customer acquisition cost, customer lifetime value, brand awareness, and conversion rates.
Marketing communications (Marcom) plays a crucial role in achieving these KPIs by creating and delivering targeted messaging to the ri...
I applied via Indeed and was interviewed in Oct 2024. There were 2 interview rounds.
A test that rated your ability to work retail and handel customers.
I have a flexible availability and can adjust my schedule as needed.
I am available to work weekdays, weekends, and evenings.
I can easily switch shifts with advance notice.
I am open to working overtime if required.
I am willing to accommodate any scheduling needs of the company.
I have 5 years of experience in marketing and sales roles at a tech company.
Worked on developing marketing strategies to increase brand awareness
Managed social media accounts and created engaging content
Collaborated with sales team to generate leads and close deals
I have experience in de-escalating situations with unhappy customers by actively listening, empathizing, and finding solutions.
Active listening to understand the customer's concerns
Empathizing with the customer's emotions
Finding solutions to address the customer's issues
Remaining calm and professional throughout the interaction
Offering alternatives or compensation when appropriate
I applied via Referral and was interviewed in Dec 2024. There were 2 interview rounds.
I applied via Referral and was interviewed in Jun 2024. There were 3 interview rounds.
I am currently working as a Senior Information Security Engineer at XYZ Company.
Leading the implementation of security measures to protect the organization's computer systems and networks
Conducting regular security assessments and audits to identify vulnerabilities and risks
Developing and implementing security policies and procedures
Responding to security incidents and conducting forensic investigations
Providing securi
I would like to know about the specific responsibilities, team structure, technology stack, and opportunities for growth in this role at Tesco.
Responsibilities of the Information Security Engineer at Tesco
Team structure and collaboration within the Information Security team
Technology stack used for security measures at Tesco
Opportunities for career growth and professional development at Tesco
I am a dedicated Information Security Engineer with a strong background in cybersecurity and a passion for protecting data.
Experienced in implementing and maintaining security measures to protect networks and systems
Skilled in conducting security assessments and identifying vulnerabilities
Proficient in incident response and forensic analysis
Certified in relevant security certifications such as CISSP or CEH
Performing a security architecture review on the provided model.
Identify potential security vulnerabilities in the architecture
Evaluate the effectiveness of security controls in place
Assess the overall security posture of the system
Recommend improvements to enhance security measures
Identifying loopholes in a security model and proposing security controls to improve it.
Identify potential vulnerabilities such as weak authentication methods, lack of encryption, or inadequate access controls
Implement strong authentication measures like multi-factor authentication to prevent unauthorized access
Encrypt sensitive data both in transit and at rest to protect it from unauthorized access
Implement strict acc...
I am currently working in the domain of network security.
Designing and implementing network security measures to protect the organization's systems and data
Monitoring network traffic for potential security breaches
Conducting regular security assessments and audits to identify vulnerabilities
Responding to security incidents and implementing incident response procedures
Implementing and managing firewalls, intrusion detec
Some challenges faced everyday include keeping up with evolving threats, managing security incidents, and balancing security with usability.
Keeping up with evolving threats and vulnerabilities
Managing security incidents and responding to breaches
Balancing security measures with usability for end users
It depends on the specific security requirements and resources of the organization.
Consider the sensitivity of the data being stored and processed.
Evaluate the organization's budget and resources for maintaining security measures.
Assess the expertise of the IT team in managing security for both SaaS and on-prem solutions.
SaaS may offer better scalability and accessibility, but on-prem may provide more control over secu...
I expect my next job to provide challenging projects, opportunities for growth, a supportive team environment, and a competitive salary.
Challenging projects that allow me to utilize my skills and knowledge
Opportunities for professional growth and development
A supportive team environment where collaboration is encouraged
Competitive salary and benefits package
Work-life balance and flexibility in scheduling
based on 33 reviews
Rating in categories
Accountant
4
salaries
| ₹1 L/yr - ₹12 L/yr |
Cash Officer
4
salaries
| ₹4.8 L/yr - ₹8.5 L/yr |
Executive Accountant
4
salaries
| ₹1.8 L/yr - ₹2.5 L/yr |
Data Analyst
3
salaries
| ₹4 L/yr - ₹10 L/yr |
Sales Manager
3
salaries
| ₹9.5 L/yr - ₹9.6 L/yr |
Samsung
LG Electronics
Sony
Panasonic