how you are convince the customer to open a account in sbi, is customer want to open the account in private bank.
5 26073How to solve these problems 1. How many such pairs of letters are there in the word EXPERIMENT each of which have as many letters between them in the word as they have in the English alphabet? (1) None (2) One (3) Two (4) Three (5) More than three 2. How many such pairs of letters are there in the word EXPERIMENT each of which have as many letters between them in the word as they have in the English alphabet? (1) None (2) One (3) Two (4) Three (5) More than three 3. How many such digits are there in the number 7346285, which are as far away from the beginning of the number, as they will be when arranged in ascending order within the number? (1) None (2) One (3) Two (4) Three (5) More than three
3 25368what are all the items comes under balancesheet(liability side & asset side) step by step.& also trading and p&l account. somany companies asking this type of question . please tell me...
7 108609Send me sbi HR questions to me. If u will get other job than sbi clerical,then what will you do?Asked in Sbi.
1 3244recently i am selected for manager in public sector bank at scale two level, kindly inform me the current and revised salary structure with gross pay and other benefits
3288Post New IBPS Interview Questions
What does a commit object contain?
What is difference between sql and mysql?
Why is c# used?
What are the features of encapsulation ?
what considerations might dictate an organization's differing staffing needs at different times?
How can you leverage new channels, tactics, and media to drive customer engagement and intimacy?
What are the differences between reflection and dynamic?
What are triggers and its type in wpf?
What is auto-response?
Who is the founder of database?
What is the appSettings Section in the web.config file?
If A Class Is Declared Without Any Access Modifiers, Where May The Class Be Accessed?
What is ole in excel?
Do you know what is mineral fibers?
How can we provide user level/user group level security - By using security keys?