Data Analytics & AI | SQL Interviews | Power BI Resources
25.2K subscribers
305 photos
2 videos
151 files
317 links
๐Ÿ”“Explore the fascinating world of Data Analytics & Artificial Intelligence

๐Ÿ’ป Best AI tools, free resources, and expert advice to land your dream tech job.

Admin: @coderfun
Download Telegram
Here are 5 key Python libraries/ concepts that are particularly important for data analysts:

1. Pandas: Pandas is a powerful library for data manipulation and analysis in Python. It provides data structures like DataFrames and Series that make it easy to work with structured data. Pandas offers functions for reading and writing data, cleaning and transforming data, and performing data analysis tasks like filtering, grouping, and aggregating.

2. NumPy: NumPy is a fundamental package for scientific computing in Python. It provides support for large, multi-dimensional arrays and matrices, along with a collection of mathematical functions to operate on these arrays efficiently. NumPy is often used in conjunction with Pandas for numerical computations and data manipulation.

3. Matplotlib and Seaborn: Matplotlib is a popular plotting library in Python that allows you to create a wide variety of static, interactive, and animated visualizations. Seaborn is built on top of Matplotlib and provides a higher-level interface for creating attractive and informative statistical graphics. These libraries are essential for data visualization in data analysis projects.

4. Scikit-learn: Scikit-learn is a machine learning library in Python that provides simple and efficient tools for data mining and data analysis tasks. It includes a wide range of algorithms for classification, regression, clustering, dimensionality reduction, and more. Scikit-learn also offers tools for model evaluation, hyperparameter tuning, and model selection.

5. Data Cleaning and Preprocessing: Data cleaning and preprocessing are crucial steps in any data analysis project. Python offers libraries like Pandas and NumPy for handling missing values, removing duplicates, standardizing data types, scaling numerical features, encoding categorical variables, and more. Understanding how to clean and preprocess data effectively is essential for accurate analysis and modeling.

By mastering these Python concepts and libraries, data analysts can efficiently manipulate and analyze data, create insightful visualizations, apply machine learning techniques, and derive valuable insights from their datasets.

Credits: https://t.iss.one/free4unow_backup

ENJOY LEARNING ๐Ÿ‘๐Ÿ‘
๐Ÿ‘2
๐—œ๐—ป๐—ณ๐—ผ๐˜€๐˜†๐˜€ ๐Ÿญ๐Ÿฌ๐Ÿฌ% ๐—™๐—ฅ๐—˜๐—˜ ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—–๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐˜€๐Ÿ˜

Infosys Springboard is offering a wide range of 100% free courses with certificates to help you upskill and boost your resumeโ€”at no cost.

Whether youโ€™re a student, graduate, or working professional, this platform has something valuable for everyone.

๐‹๐ข๐ง๐ค ๐Ÿ‘‡:-

https://pdlink.in/4jsHZXf

Enroll For FREE & Get Certified ๐ŸŽ“
AI is playing a critical role in advancing cybersecurity by enhancing threat detection, response, and overall security posture. Here are some key AI trends in cybersecurity:

1. Advanced Threat Detection:
- Anomaly Detection: AI systems analyze network traffic and user behavior to detect anomalies that may indicate a security breach or insider threat.
- Real-Time Monitoring: AI-powered tools provide real-time monitoring and analysis of security events, identifying and mitigating threats as they occur.

2. Behavioral Analytics:
- User Behavior Analytics (UBA): AI models profile user behavior to detect deviations that could signify compromised accounts or malicious insiders.
- Entity Behavior Analytics (EBA): Similar to UBA but focuses on the behavior of devices and applications within the network to identify potential threats.

3. Automated Incident Response:
- Security Orchestration, Automation, and Response (SOAR): AI automates routine security tasks, such as threat hunting and incident response, to reduce response times and improve efficiency.
- Playbook Automation: AI-driven playbooks guide incident response actions based on predefined protocols, ensuring consistent and rapid responses to threats.

4. Predictive Threat Intelligence:
- Threat Prediction: AI predicts potential cyber threats by analyzing historical data, threat intelligence feeds, and emerging threat patterns.
- Proactive Defense: AI enables proactive defense strategies by identifying and mitigating potential vulnerabilities before they can be exploited.

5. Enhanced Malware Detection:
- Signatureless Detection: AI identifies malware based on behavior and characteristics rather than relying solely on known signatures, improving detection of zero-day threats.
- Dynamic Analysis: AI analyzes the behavior of files and applications in a sandbox environment to detect malicious activity.

6. Fraud Detection and Prevention:
- Transaction Monitoring: AI detects fraudulent transactions in real-time by analyzing transaction patterns and flagging anomalies.
- Identity Verification: AI enhances identity verification processes by analyzing biometric data and other authentication factors.

7. Phishing Detection:
- Email Filtering: AI analyzes email content and metadata to detect phishing attempts and prevent them from reaching users.
- URL Analysis: AI examines URLs and associated content to identify and block malicious websites used in phishing attacks.

8. Vulnerability Management:
- Automated Vulnerability Scanning: AI continuously scans systems and applications for vulnerabilities, prioritizing them based on risk and impact.
- Patch Management: AI recommends and automates the deployment of security patches to mitigate vulnerabilities.

9. Natural Language Processing (NLP) in Security:
- Threat Intelligence Analysis: AI-powered NLP tools analyze and extract relevant information from threat intelligence reports and security feeds.
- Chatbot Integration: AI chatbots assist with security-related queries and provide real-time support for incident response teams.

10. Deception Technology:
- AI-Driven Honeypots: AI enhances honeypot technologies by creating realistic decoys that attract and analyze attacker behavior.
- Deceptive Environments: AI generates deceptive network environments to mislead attackers and gather intelligence on their tactics.

11. Continuous Authentication:
- Behavioral Biometrics: AI continuously monitors user behavior, such as typing patterns and mouse movements, to authenticate users and detect anomalies.
- Adaptive Authentication: AI adjusts authentication requirements based on the risk profile of user activities and contextual factors.

Cybersecurity Resources: https://t.iss.one/EthicalHackingToday

Join for more: t.iss.one/AI_Best_Tools
๐Ÿ‘1
๐Ÿฑ ๐—™๐—ฅ๐—˜๐—˜ ๐—ง๐—ฒ๐—ฐ๐—ต ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—–๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐˜€ ๐—™๐—ฟ๐—ผ๐—บ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜, ๐—”๐—ช๐—ฆ, ๐—œ๐—•๐— , ๐—–๐—ถ๐˜€๐—ฐ๐—ผ, ๐—ฎ๐—ป๐—ฑ ๐—ฆ๐˜๐—ฎ๐—ป๐—ณ๐—ผ๐—ฟ๐—ฑ. ๐Ÿ˜

- Python
- Artificial Intelligence,
- Cybersecurity
- Cloud Computing, and
- Machine Learning

๐‹๐ข๐ง๐ค ๐Ÿ‘‡:-

https://pdlink.in/3E2wYNr

Enroll For FREE & Get Certified ๐ŸŽ“
Please go through this top 10 SQL projects with Datasets that you can practice and can add in your resume

๐Ÿ“Œ1. Social Media Analytics:
(https://www.kaggle.com/amanajmera1/framingham-heart-study-dataset)

๐Ÿš€2. Web Analytics:
(https://www.kaggle.com/zynicide/wine-reviews)

๐Ÿ“Œ3. HR Analytics:
(https://www.kaggle.com/pavansubhasht/ibm-hr-analytics-
attrition-dataset)

๐Ÿš€4. Healthcare Data Analysis:
(https://www.kaggle.com/cdc/mortality)

๐Ÿ“Œ5. E-commerce Analysis:
(https://www.kaggle.com/olistbr/brazilian-ecommerce)

๐Ÿš€6. Inventory Management:
(https://www.kaggle.com/datasets?
search=inventory+management)

๐Ÿ“Œ 7.Customer Relationship Management:
(https://www.kaggle.com/pankajjsh06/ibm-watson-
marketing-customer-value-data)

๐Ÿš€8. Financial Data Analysis:
(https://www.kaggle.com/awaiskalia/banking-database)

๐Ÿ“Œ9. Supply Chain Management:
(https://www.kaggle.com/shashwatwork/procurement-analytics)

๐Ÿš€10. Analysis of Sales Data:
(https://www.kaggle.com/kyanyoga/sample-sales-data)

Small suggestion from my side for non tech students: kindly pick those datasets which you like the subject in general, that way you will be more excited to practice it, instead of just doing it for the sake of resume, you will learn SQL more passionately, since itโ€™s a programming language try to make it more exciting for yourself.

Join for more: https://t.iss.one/DataPortfolio

Hope this piece of information helps you
๐Ÿ‘1
๐Ÿฏ ๐—™๐—ฅ๐—˜๐—˜ ๐—š๐—ฒ๐—ป๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐˜ƒ๐—ฒ ๐—”๐—œ ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—–๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐˜€ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ๐Ÿ˜

Taught by industry leaders (like Microsoft - 100% online and beginner-friendly

* Generative AI for Data Analysts
* Generative AI: Enhance Your Data Analytics Career
* Microsoft Generative AI for Data Analysis 

๐‹๐ข๐ง๐ค ๐Ÿ‘‡:-

https://pdlink.in/3R7asWB

Enroll Now & Get Certified ๐ŸŽ“
๐Ÿ‘1
AI Myths vs. Reality

1๏ธโƒฃ AI Can Think Like Humans โ€“ โŒ Myth
๐Ÿค– AI doesnโ€™t "think" or "understand" like humans. It predicts based on patterns in data but lacks reasoning or emotions.

2๏ธโƒฃ AI Will Replace All Jobs โ€“ โŒ Myth
๐Ÿ‘จโ€๐Ÿ’ป AI automates repetitive tasks but creates new job opportunities in AI development, ethics, and oversight.

3๏ธโƒฃ AI is 100% Accurate โ€“ โŒ Myth
โš  AI can generate incorrect or biased outputs because it learns from imperfect human data.

4๏ธโƒฃ AI is the Same as AGI โ€“ โŒ Myth
๐Ÿง  Generative AI is task-specific, while AGI (which doesnโ€™t exist yet) would have human-like intelligence.

5๏ธโƒฃ AI is Only for Big Tech โ€“ โŒ Myth
๐Ÿ’ก Startups, small businesses, and individuals use AI for marketing, automation, and content creation.

6๏ธโƒฃ AI Models Donโ€™t Need Human Supervision โ€“ โŒ Myth
๐Ÿ” AI requires human oversight to ensure ethical use and prevent misinformation.

7๏ธโƒฃ AI Will Keep Getting Smarter Forever โ€“ โŒ Myth
๐Ÿ“‰ AI is limited by its training data and doesnโ€™t improve on its own without new data and updates.

AI is powerful but not magic. Knowing its limits helps us use it wisely. ๐Ÿš€
๐Ÿ‘2
Q. Explain the data preprocessing steps in data analysis.

Ans. Data preprocessing transforms the data into a format that is more easily and effectively processed in data mining, machine learning and other data science tasks.
1. Data profiling.
2. Data cleansing.
3. Data reduction.
4. Data transformation.
5. Data enrichment.
6. Data validation.

Q. What Are the Three Stages of Building a Model in Machine Learning?

Ans. The three stages of building a machine learning model are:

Model Building: Choosing a suitable algorithm for the model and train it according to the requirement

Model Testing: Checking the accuracy of the model through the test data

Applying the Model: Making the required changes after testing and use the final model for real-time projects


Q. What are the subsets of SQL?

Ans. The following are the four significant subsets of the SQL:

Data definition language (DDL): It defines the data structure that consists of commands like CREATE, ALTER, DROP, etc.

Data manipulation language (DML): It is used to manipulate existing data in the database. The commands in this category are SELECT, UPDATE, INSERT, etc.

Data control language (DCL): It controls access to the data stored in the database. The commands in this category include GRANT and REVOKE.

Transaction Control Language (TCL): It is used to deal with the transaction operations in the database. The commands in this category are COMMIT, ROLLBACK, SET TRANSACTION, SAVEPOINT, etc.


Q. What is a Parameter in Tableau? Give an Example.

Ans. A parameter is a dynamic value that a customer could select, and you can use it to replace constant values in calculations, filters, and reference lines.
For example, when creating a filter to show the top 10 products based on total profit instead of the fixed value, you can update the filter to show the top 10, 20, or 30 products using a parameter.
๐Ÿ‘1
Machine Learning (17.4%)
Models: Linear Regression, Logistic Regression, Decision Trees, Random Forests, Support Vector Machines (SVMs), K-Nearest Neighbors (KNN), Naive Bayes, Neural Networks (including Deep Learning)

Techniques: Training/testing data splitting, cross-validation, feature scaling, model evaluation metrics (accuracy, precision, recall, F1-score)

Data Manipulation (13.9%)
Techniques: Data cleaning (handling missing values, outliers), data wrangling (sorting, filtering, aggregating), data transformation (scaling, normalization), merging datasets

Programming Skills (11.7%)
Languages: Python (widely used in data science for its libraries like pandas, NumPy, scikit-learn), R (another popular choice for statistical computing), SQL (for querying relational databases)

Statistics and Probability (11.7%)
Concepts: Descriptive statistics (mean, median, standard deviation), hypothesis testing, probability distributions (normal, binomial, Poisson), statistical inference

Big Data Technologies (9.3%)
Tools: Apache Spark, Hadoop, Kafka (for handling large and complex datasets)

Data Visualization (9.3%)
Techniques: Creating charts and graphs (scatter plots, bar charts, heatmaps), storytelling with data, choosing the right visualizations for the data

Model Deployment (9.3%)
Techniques: Cloud platforms (AWS SageMaker, Google Cloud AI Platform, Microsoft Azure Machine Learning), containerization (Docker), model monitoring
๐Ÿ‘1
Choose the Visualization tool that fits your business needs

๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† & ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—–๐—ผ๐—ป๐˜๐—ฟ๐—ผ๐—น (๐—ง๐—ผ๐—ฝ ๐—ฃ๐—ฟ๐—ถ๐—ผ๐—ฟ๐—ถ๐˜๐˜†)
โœ“ Row-Level Security (RLS)
โœ“ Column-Level Security (CLS)
โœ“ Plot-Level Security
โœ“ Dashboard-Level Security
โœ“ Data Masking & Anonymization
โœ“ Audit Logging & User Activity Tracking

๐—™๐—ถ๐—น๐˜๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด ๐—–๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€
โœ“ Global Filters
โœ“ Local Filters
โœ“ Cross-Filtering
โœ“ Cascading Filters โ€“ One filter should dynamically adjust available options in other filters.
โœ“ Consistent Coloring After Filtering โ€“ Colors inside plots should remain the same after applying filters.

๐—”๐—น๐—ฒ๐—ฟ๐˜๐—ถ๐—ป๐—ด & ๐—ก๐—ผ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฆ๐˜†๐˜€๐˜๐—ฒ๐—บ
โœ“ Threshold-Based Alerts
โœ“ Anomaly Detection Alerts
โœ“ Scheduled Reports & Notifications
โœ“ Real-Time Alerts โ€“ Instant notifications for critical data updates.

๐—˜๐—บ๐—ฏ๐—ฒ๐—ฑ๐—ฑ๐—ถ๐—ป๐—ด & ๐—œ๐—ป๐˜๐—ฒ๐—ด๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—–๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€
โœ“ Embedding in Web Apps โ€“ Ability to integrate dashboards in external applications.
โœ“ APIs for Custom Queries โ€“ Fetch & manipulate visualization data programmatically.
โœ“ SSO & Authentication Integration โ€“ Support for OAuth, SAML, LDAP for secure embedding.
โœ“ SDK or iFrame Support โ€“ Ease of embedding with minimal coding.

๐—ฉ๐—ถ๐˜€๐˜‚๐—ฎ๐—น๐—ถ๐˜‡๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—–๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€
โœ“ Wide Range of Chart Types
โœ“ Custom Chart Creation โ€“ Ability to extend with JavaScript/Python based visualizations.
โœ“ Interactive & Drill-Down Support โ€“ Clicking on elements should allow further exploration.
โœ“ Time-Series & Forecasting Support โ€“ Built-in trend analysis and forecasting models.

๐—™๐˜‚๐˜๐˜‚๐—ฟ๐—ฒ-๐—ฃ๐—ฟ๐—ผ๐—ผ๐—ณ๐—ถ๐—ป๐—ด & ๐—ฆ๐—ฐ๐—ฎ๐—น๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜†
โœ“ Cloud vs. On-Premise Support โ€“ Flexibility to deploy on different infrastructures.
โœ“ Multi-Tenant Support โ€“ Ability to manage multiple client environments separately.
โœ“ Performance on Large Datasets โ€“ Efficient handling of millions/billions of rows.
โœ“ AI & ML Capabilities โ€“ Support for AI-driven insights and predictive analytics.

Benefits of Metabase
1. Affordable Pricing
โ†ณ On-Prem: Free | Starter: $85 | Pro: $500
2. Easy to Get Started
โ†ณ Only SQL knowledge required
3. Built-in Alerts
โ†ณ Supports Email and Slack notifications
4. Conditional Formatting
โ†ณ Customize table row/cell colors based on conditions
5. Drill-Through Charts
โ†ณ Click data points to explore deeper insights
6. User-Friendly Interface


Limitations
1. Filters Placement
โ†ณ Only available at the top of dashboards
2. Limited Selection for Filtering
โ†ณ Can select only a single cell; global/local filters update based on that value
๐Ÿ‘2
๐—๐—ฃ ๐— ๐—ผ๐—ฟ๐—ด๐—ฎ๐—ป ๐—™๐—ฅ๐—˜๐—˜ ๐—ฉ๐—ถ๐—ฟ๐˜๐˜‚๐—ฎ๐—น ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ป๐˜€๐—ต๐—ถ๐—ฝ ๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ๐˜€๐Ÿ˜

JPMorgan offers free virtual internships to help you develop industry-specific tech, finance, and research skills. 

- Software Engineering Internship
- Investment Banking Program
- Quantitative Research Internship
 
๐‹๐ข๐ง๐ค ๐Ÿ‘‡:- 

https://pdlink.in/4gHGofl

Enroll For FREE & Get Certified ๐ŸŽ“
๐Ÿ‘1
Jupyter Notebooks are essential for data analysts working with Python.

Hereโ€™s how to make the most of this great tool:

1. ๐—ข๐—ฟ๐—ด๐—ฎ๐—ป๐—ถ๐˜‡๐—ฒ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—–๐—ผ๐—ฑ๐—ฒ ๐˜„๐—ถ๐˜๐—ต ๐—–๐—น๐—ฒ๐—ฎ๐—ฟ ๐—ฆ๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ:

Break your notebook into logical sections using markdown headers. This helps you and your colleagues navigate the notebook easily and understand the flow of analysis. You could use headings (#, ##, ###) and bullet points to create a table of contents.


2. ๐——๐—ผ๐—ฐ๐˜‚๐—บ๐—ฒ๐—ป๐˜ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—ฃ๐—ฟ๐—ผ๐—ฐ๐—ฒ๐˜€๐˜€:

Add markdown cells to explain your methodology, code, and guidelines for the user. This Enhances the readability and makes your notebook a great reference for future projects. You might want to include links to relevant resources and detailed docs where necessary.


3. ๐—จ๐˜€๐—ฒ ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐—ช๐—ถ๐—ฑ๐—ด๐—ฒ๐˜๐˜€:

Leverage ipywidgets to create interactive elements like sliders, dropdowns, and buttons. With those, you can make your analysis more dynamic and allow users to explore different scenarios without changing the code. Create widgets for parameter tuning and real-time data visualization.


๐Ÿฐ. ๐—ž๐—ฒ๐—ฒ๐—ฝ ๐—œ๐˜ ๐—–๐—น๐—ฒ๐—ฎ๐—ป ๐—ฎ๐—ป๐—ฑ ๐— ๐—ผ๐—ฑ๐˜‚๐—น๐—ฎ๐—ฟ:

Write reusable functions and classes instead of long, monolithic code blocks. This will improve the code maintainability and efficiency of your notebook. You should store frequently used functions in separate Python scripts and import them when needed.


5. ๐—ฉ๐—ถ๐˜€๐˜‚๐—ฎ๐—น๐—ถ๐˜‡๐—ฒ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐——๐—ฎ๐˜๐—ฎ ๐—˜๐—ณ๐—ณ๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ๐—น๐˜†:

Utilize libraries like Matplotlib, Seaborn, and Plotly for your data visualizations. These clear and insightful visuals will help you to communicate your findings. Make sure to customize your plots with labels, titles, and legends to make them more informative.


6. ๐—ฉ๐—ฒ๐—ฟ๐˜€๐—ถ๐—ผ๐—ป ๐—–๐—ผ๐—ป๐˜๐—ฟ๐—ผ๐—น ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—ก๐—ผ๐˜๐—ฒ๐—ฏ๐—ผ๐—ผ๐—ธ๐˜€:

Jupyter Notebooks are great for exploration, but they often lack systematic version control. Use tools like Git and nbdime to track changes, collaborate effectively, and ensure that your work is reproducible.

7. ๐—ฃ๐—ฟ๐—ผ๐˜๐—ฒ๐—ฐ๐˜ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—ก๐—ผ๐˜๐—ฒ๐—ฏ๐—ผ๐—ผ๐—ธ๐˜€:

Clean and secure your notebooks by removing sensitive information before sharing. This helps to prevent the leakage of private data. You should consider using environment variables for credentials.


Keeping these techniques in mind will help to transform your Jupyter Notebooks into great tools for analysis and communication.

I have curated the best interview resources to crack Python Interviews ๐Ÿ‘‡๐Ÿ‘‡
https://whatsapp.com/channel/0029VaiM08SDuMRaGKd9Wv0L

Hope you'll like it

Like this post if you need more resources like this ๐Ÿ‘โค๏ธ
๐Ÿ‘1
๐—ง๐—ผ๐—ฝ ๐— ๐—ก๐—–๐˜€ ๐—›๐—ถ๐—ฟ๐—ถ๐—ป๐—ด ๐——๐—ฎ๐˜๐—ฎ ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐˜๐˜€ ๐Ÿ˜

Mercedes :- https://pdlink.in/3RPLXNM

TechM :- https://pdlink.in/4cws0oN

SE :- https://pdlink.in/42feu5D

Siemens :- https://pdlink.in/4jxhzDR

Dxc :- https://pdlink.in/4ctIeis

EY:- https://pdlink.in/4lwMQZo

Apply before the link expires ๐Ÿ’ซ
๐Ÿ‘1