Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Concentrix Interview Questions
Questions Answers Views Company eMail

why should i hire u?

21 77115

when i went to a call center she asked me. where u want to see after few years?

22 68167

What is HRM?

29 45175

why should i hire you?

5 11561

how did you spend ur last day?

28 175877

how did you celebrated ur last birthday?

37 595828

how did spent your yesterday?

49 491034

What is your future plans

24 144181

Define this room?

7 49132

Speak on your unforgettable or memorable day for two minutes?

82 676899

tell me something about your happiest moment

29 220629

What is your daily routine?

84 585659

1.should women work in night shifts?if yes,why?if no why? 2.if u r given power for one day,what would u eradicate from india?

7 33097

why do u like to make your career in BPO industry?

13 42716

How did you spent your last day,sunday,?

66 431174

Post New Concentrix Interview Questions




Un-Answered Questions

What do you mean by patch in drupal?

73


What is the difference between jquery's ready and holdready?

3656


What is css wikipedia?

342


Explain how to convert a jk flip flop into sr flip flop and vice versa, a sr flip flop into d or t flip flop and vice versa?

540


how to checking process status by running the itnm_status command in itnm?

488






Explain cotyledons?

547


What are string functions in sql?

669


Explain what do you know about blackberry 7?

516


Does spring mvc provide validation support?

148


What is Fractional PRI?

1059


Accounting transactions are recorded in accordance with thier legal form or substance. Briefly explain the legal form and substance of the accounting transactions and give one relevant example.

1646


How to replace the Query Result 'Null Value' with a text ?

558


Compare & contrast rich client (smart clients or windows-based) & browser-based web application

536


Which textcomponent method is used to set a textcomponent to the read-only state?

625


What tools do real hackers use?

451