Filter interviews by
CRM stands for Customer Relationship Management. It is used to manage interactions with customers and potential customers.
CRM helps businesses build and maintain relationships with customers
It stores customer information, interactions, and transactions in a centralized database
CRM software can automate sales, marketing, and customer service processes
Examples of CRM software include Salesforce, HubSpot, and Microsoft Dy
I applied via LinkedIn and was interviewed in Aug 2021. There were 4 interview rounds.
Second round was more of discussion and again a round of questions more similar to first round and again it was very much limited to the profile and requirement and no unnecessary questions asked
I applied via Naukri.com and was interviewed before Jan 2021. There was 1 interview round.
Top trending discussions
I applied via Referral and was interviewed in Apr 2021. There were 4 interview rounds.
Weak reference is a reference that does not prevent the object from being garbage collected.
Weak references are used to refer to objects that can be garbage collected if there are no strong references to them.
They are typically used in scenarios where you want to hold a reference to an object, but don't want to prevent it from being collected.
Weak references are implemented using weak reference queues, which allow you ...
Singleton pattern ensures a class has only one instance, while allowing global access to it.
Implement a private constructor to prevent direct instantiation.
Create a static method to provide a single point of access to the instance.
Use lazy initialization to create the instance only when needed.
Ensure thread safety in a multithreaded environment using synchronization or double-checked locking.
Breaking the singleton patt...
Annotations used in Spring Framework for defining components and services.
Annotations like @Component, @Service, and @Controller are used for defining components in Spring Framework.
@RestController is used for defining RESTful web services.
@Configuration is used for defining configuration classes.
@Transactional is used for defining transactional methods.
All these annotations help in defining and managing dependencies i
HashSet is implemented using a HashMap internally. Same hashcode is generated when two objects have the same value for hashCode() and equals() methods.
HashSet internally uses a HashMap to store its elements.
The hashcode of an object is generated using the hashCode() method.
If two objects have the same value for hashCode() and equals() methods, they will generate the same hashcode.
For example, if two String objects have...
SQL Cursor is a database object used to manipulate data row by row.
Cursor is used to fetch and process data row by row
Index is a database object used to speed up data retrieval
Aggregate functions are used to perform calculations on a set of values
Examples of aggregate functions are SUM, AVG, COUNT, MAX, MIN
Generate palindrome string with given length and distinct characters.
Create a char array of length n and fill it with distinct characters.
Loop through the array and add the characters in reverse order to create a palindrome.
Repeat the process until the required number of palindromes are generated.
If k is less than the length of the palindrome, use the first k distinct characters.
Find the highest value that occurs the same number of times within an array.
Iterate through the array and count the occurrences of each value.
Store the counts in a dictionary or hash map.
Find the maximum count and check which value(s) have that count.
Return the highest value among those with the maximum count.
Count occurrences of a character in a string and output in a specific format.
Use a hash table to store the count of each character.
Loop through the string and update the count in the hash table.
Create the output string using the hash table.
Converts a string from Camel case to Snake case.
Loop through the string and check for uppercase letters
Insert an underscore before each uppercase letter
Convert the string to lowercase
Logic to get Map using Stream API to show balance of each person
Use Stream API to group accounts by name
Use map() to get the sum of balances for each group
Collect the results into a Map
posted on 26 Mar 2020
I applied via Naukri.com and was interviewed before Mar 2019. There were 5 interview rounds.
posted on 2 Jul 2021
I applied via Recruitment Consultant and was interviewed in Jun 2021. There were 6 interview rounds.
I applied via Naukri.com and was interviewed in Apr 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2020. There were 7 interview rounds.
Improving the quality and service industries involves focusing on customer satisfaction, continuous improvement, and employee training.
Implementing customer feedback systems to identify areas for improvement
Investing in employee training and development programs to enhance skills and knowledge
Establishing quality control measures to ensure consistent service delivery
Adopting technology solutions to streamline processes...
I applied via Naukri.com
Private equity invests in established companies while venture capital invests in startups.
Private equity firms invest in mature companies with a proven track record.
Venture capital firms invest in startups with high growth potential.
Private equity firms typically acquire a controlling stake in the company they invest in.
Venture capital firms usually take a minority stake in the company.
Private equity firms focus on gen...
The strategy to come out of private equity involves identifying potential buyers, preparing the company for sale, and negotiating the terms of the sale.
Identify potential buyers through market research and networking
Prepare the company for sale by improving financials, streamlining operations, and addressing any legal or regulatory issues
Negotiate the terms of the sale, including price, payment structure, and any conti...
Fundamental analysis is a method of evaluating a security by examining its intrinsic value.
It involves analyzing financial and economic data to determine the underlying value of a security
The objective is to identify undervalued or overvalued securities
Factors considered include financial statements, industry trends, management quality, and macroeconomic conditions
Example: analyzing a company's revenue growth, profit m...
EPS is earnings per share, while P/E ratio is the price-to-earnings ratio.
EPS is a company's net profit divided by the number of outstanding shares.
P/E ratio is the current market price of a share divided by its EPS.
P/E ratio is used to determine if a stock is overvalued or undervalued.
A high P/E ratio may indicate that investors have high expectations for future growth.
A low P/E ratio may indicate that investors have
Enterprise Value is the total value of a company's equity and debt.
Enterprise Value = Market Capitalization + Total Debt - Cash and Cash Equivalents
It is used to determine the total value of a company, including its debt
EV is often used in financial analysis to compare companies with different capital structures
Example: If a company has a market cap of $100 million, total debt of $50 million, and cash and cash equivale
Annual reports contain more than just financials, such as management discussion and analysis, corporate governance, and sustainability reports.
Management discussion and analysis provides insights into the company's strategy, operations, and future plans.
Corporate governance section highlights the company's policies and practices related to ethical conduct, board composition, and executive compensation.
Sustainability re...
I applied via Naukri.com and was interviewed in Sep 2020. There were 3 interview rounds.
Log files are used to record events and actions in a system or application.
Log files can be used for debugging and troubleshooting.
They can also be used for auditing and compliance purposes.
Log files can help identify security breaches or unauthorized access.
They can be used to monitor system performance and identify bottlenecks.
Log files can be analyzed to gain insights into user behavior and usage patterns.
Debugging is the process of identifying and fixing errors in a program or project.
Debugging involves analyzing code and identifying errors
Tools like debuggers and logging can aid in the process
Common errors include syntax errors, logic errors, and runtime errors
Debugging should be done systematically and thoroughly
Testing and retesting is important to ensure all errors are fixed
Accessibility of variable or function
Variables and functions should be accessible to the parts of the code that need them
Accessibility can be controlled using access modifiers like public, private, and protected
Accessibility can also be affected by the scope of the variable or function
Some of the top questions asked at the Vistra ITCL interview for experienced candidates -
based on 26 reviews
Rating in categories
Assistant Manager
43
salaries
| ₹5 L/yr - ₹13.4 L/yr |
Senior Officer
17
salaries
| ₹4.8 L/yr - ₹10 L/yr |
Manager
15
salaries
| ₹8.1 L/yr - ₹21 L/yr |
Senior Associate
14
salaries
| ₹3.5 L/yr - ₹6.5 L/yr |
Associate
12
salaries
| ₹2.8 L/yr - ₹4.2 L/yr |
Catalyst Trusteeship
SBICAP Trustee Company
Idbi Trusteeship Services
Axis Trustee Services