i
Accion Labs
Filter interviews by
MVC is a software design pattern that separates an application into three main components: Model, View, and Controller.
Model represents the data and business logic of the application.
View is responsible for displaying the data to the user.
Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly.
MVC helps in organizing code, improving maintainability, and promotin...
InnoDB is a transaction-safe storage engine for MySQL, while MyISAM is not transaction-safe.
InnoDB supports transactions with ACID properties, while MyISAM does not.
InnoDB supports foreign keys, while MyISAM does not.
InnoDB is more reliable and crash-safe compared to MyISAM.
InnoDB is the default storage engine for MySQL 5.5 and higher versions.
MyISAM is faster for read-heavy operations, while InnoDB is better for write
Interface defines only method signatures while abstract class can have both method signatures and implementations.
Interface cannot have method implementations, only method signatures.
Abstract class can have both method signatures and implementations.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used to define a contract for classes to implement, while abstract cla...
A static method is a method that belongs to the class itself, rather than to instances of the class.
Static methods can be called directly on the class without needing to create an instance of the class.
Static methods are commonly used for utility functions that do not require access to instance-specific data.
Static methods are declared using the 'static' keyword in PHP.
Optimizing SQL queries involves analyzing query performance, indexing, minimizing data retrieval, and using appropriate joins.
Analyze query performance using tools like EXPLAIN to identify bottlenecks
Use indexes on columns frequently used in WHERE clauses
Minimize data retrieval by selecting only necessary columns
Avoid using SELECT * and instead specify required columns
Use appropriate joins like INNER JOIN, LEFT JOIN, e
array_map in PHP is used to apply a callback function to each element of an array.
array_map() returns an array containing all the elements of the input array after applying the callback function to each one.
It is useful for applying a function to all elements of an array without using a loop.
Example: array_map('strtoupper', ['apple', 'banana', 'cherry']) will return ['APPLE', 'BANANA', 'CHERRY'].
A callback function in PHP is a function that is passed as an argument to another function and is executed at a later time.
Callback functions are commonly used in PHP for event handling, asynchronous processing, and custom sorting.
Example: array_map() function in PHP takes a callback function as an argument to apply a user-defined function to each element of an array.
Another example: usort() function in PHP uses a call...
PHPUnit workflow involves writing test cases, running tests, and analyzing results.
Write test cases using PHPUnit framework
Run tests using PHPUnit command line interface or IDE integration
Analyze test results to identify failures and errors
Make necessary code changes to fix failing tests
Repeat the process until all tests pass successfully
I applied via Company Website and was interviewed before Feb 2021. There were 2 interview rounds.
I applied via Naukri.com and was interviewed before Feb 2021. There were 3 interview rounds.
Subject
I applied via Approached by Company and was interviewed in Nov 2017. There were 3 interview rounds.
We can achieve this by sending the data in chunks using pagination.
Implement pagination to limit the amount of data sent per request.
Use a cursor-based pagination approach to efficiently retrieve large amounts of data.
Consider compressing the data to reduce the size of each chunk.
Use HTTP range requests to retrieve specific chunks of data.
To achieve load balance and fault tolerance while deploying an application, we can use techniques like load balancing, clustering, and redundancy.
Implement load balancing to distribute incoming traffic across multiple servers.
Use clustering to group multiple servers together to work as a single unit.
Ensure redundancy by having multiple instances of critical components to handle failures.
Implement fault-tolerant mechani...
Shared variables are accessible by all tasks in a process, while job shared variables are only accessible by tasks in a specific job.
Shared variables are used to share data between tasks in a process.
Job shared variables are used to share data between tasks in a specific job.
Shared variables can cause race conditions and should be used with caution.
Job shared variables are useful for passing data between tasks in a job
DB activities that can be part of a transaction group
Insertion of data into a table
Updating data in a table
Deletion of data from a table
Creating or dropping a table
Altering the structure of a table
Executing stored procedures
Executing functions
Executing triggers
I applied via Approached by Company and was interviewed in Dec 2018. There were 3 interview rounds.
SOX Compliance is a set of regulations that public companies must follow to ensure accurate financial reporting.
SOX stands for Sarbanes-Oxley Act
It was enacted in 2002 after accounting scandals at Enron and WorldCom
It requires companies to establish and maintain internal controls over financial reporting
It also mandates regular audits and certifications of financial statements
Non-compliance can result in fines, legal a
PCI DSS stands for Payment Card Industry Data Security Standard.
It is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
It was created by major credit card companies such as Visa, Mastercard, American Express, Discover, and JCB International.
It includes requirements for network security, data protection, access...
ISO 27K is a set of standards for information security management systems.
ISO 27K provides guidelines for managing and protecting sensitive information.
It includes controls for risk management, access control, and incident management.
ISO 27K certification is often required for companies handling sensitive data.
Examples of ISO 27K standards include ISO 27001 and ISO 27002.
Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.
Identify potential threats and vulnerabilities
Evaluate the impact of each threat or vulnerability
Determine the likelihood of each threat or vulnerability occurring
Prioritize risks based on their impact and likelihood
Develop a plan to mitigate or manage each risk
I applied via Recruitment Consultant and was interviewed in Oct 2019. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Aug 2020. There were 3 interview rounds.
I applied via Walk-in and was interviewed before May 2021. There was 1 interview round.
based on 1 interview
Interview experience
Senior Software Engineer
678
salaries
| ₹8.3 L/yr - ₹33 L/yr |
Principal Software Engineer
418
salaries
| ₹10.4 L/yr - ₹40 L/yr |
Software Engineer
307
salaries
| ₹4.8 L/yr - ₹18.3 L/yr |
Technical Lead
161
salaries
| ₹12.1 L/yr - ₹39 L/yr |
Senior Principal Software Engineer
144
salaries
| ₹13.5 L/yr - ₹36.1 L/yr |
TCS
Infosys
Wipro
HCLTech