Filter interviews by
Class loader is a part of the Java Runtime Environment that dynamically loads Java classes into the Java Virtual Machine.
Responsible for loading Java classes into memory
Can be customized to load classes from different sources like network or database
Follows delegation hierarchy to load classes
Continuous memory allocation refers to allocating memory in a sequential manner, while contiguous memory allocation refers to allocating memory in a single block without any gaps.
Continuous memory allocation involves allocating memory addresses in a sequential order without any gaps.
Contiguous memory allocation involves allocating memory in a single block without any fragmentation.
Example of continuous memory allocatio...
Top trending discussions
I applied via Company Website and was interviewed in Dec 2024. There were 2 interview rounds.
There are two main sections: foundation and advanced. The foundation section consists of three subsections: quantitative, reasoning, and verbal. If you pass the foundation section but do not clear the advanced section, you will be considered for either the ninja role or the digital role during the interview process. The advanced section includes advanced aptitude questions and two coding questions.
There were a total of seven sections: verbal ability, logical reasoning, arithmetic problems, verbal reasoning, puzzles, pseudocodes, and essay writing, with each section having its own cutoff scores.
I was interviewed in Oct 2024.
I was interviewed in Jul 2024.
Lambda expression is a concise way to represent an anonymous function in programming languages.
Lambda expressions are used to create functions without a name.
They are often used in functional programming languages like Python and Java.
Lambda expressions can take parameters and return a value.
Example: (x, y) -> x + y is a lambda expression that takes two parameters and returns their sum.
Hibernate is better than JDBC due to its object-relational mapping capabilities, automatic table creation, and improved performance.
Hibernate provides object-relational mapping (ORM) which simplifies database interactions by mapping Java objects to database tables, eliminating the need for manual SQL queries.
Hibernate can automatically generate SQL queries based on the Java objects, reducing the amount of code that nee...
Filter names starting with A from a list of strings
Iterate through the list of strings
Check if each string starts with 'A'
Add the string to a new list if it starts with 'A'
I applied via Company Website and was interviewed in Mar 2024. There were 4 interview rounds.
Devlopment in working
Assignment in work based
Coading A re Working based
A technical problem is an issue or challenge related to the functionality or performance of a system or technology.
Technical problems can arise from software bugs, hardware malfunctions, network issues, or compatibility issues.
Identifying and troubleshooting technical problems often requires a systematic approach, such as using diagnostic tools or following a step-by-step process.
Examples of technical problems include ...
It was a good interview experience
Designed and implemented a cloud-based monitoring system for a large-scale network infrastructure
Utilized AWS services such as CloudWatch and Lambda functions
Developed custom scripts for data collection and analysis
Implemented real-time alerts and notifications for system administrators
Improved system performance and reliability through proactive monitoring
Collaborated with cross-functional teams to gather requirements
I applied via TCS and was interviewed in Dec 2024. There was 1 interview round.
Hash technology is a method used to convert data into a fixed-size string of characters, typically used for data security and integrity.
Hash technology uses algorithms to generate a unique fixed-size string of characters from input data.
It is commonly used for data security, password storage, digital signatures, and data integrity verification.
Examples of hash algorithms include MD5, SHA-1, and SHA-256.
Blockchain is a decentralized, distributed ledger technology used to securely record transactions across multiple computers.
Decentralized database
Consensus mechanism
Immutable record of transactions
Cryptographic security
Smart contracts
Examples: Bitcoin, Ethereum
DML stands for Data Manipulation Language, used to manage data in a database.
DML is a subset of SQL (Structured Query Language) used to insert, update, delete, and retrieve data in a database.
Examples of DML commands include INSERT, UPDATE, DELETE, and SELECT.
DML is essential for managing and manipulating data within a database system.
Binary to decimal conversion involves multiplying each digit by 2 raised to the power of its position.
To convert binary to decimal, start from the rightmost digit and multiply each digit by 2 raised to the power of its position.
Add all the results together to get the decimal equivalent.
For example, to convert binary 1011 to decimal: 1*2^3 + 0*2^2 + 1*2^1 + 1*2^0 = 11.
Iterate through array and compare each element to find the maximum number.
Iterate through the array using a loop.
Compare each element to a variable storing the current maximum number.
Update the variable if a larger number is found.
Return the maximum number at the end.
Basic HTML code for inserting image and creating a table
Use <img> tag to insert an image with src attribute
Use <table>, <tr>, <td> tags to create a table structure
Specify image source and table content within respective tags
I applied via Campus Placement and was interviewed in Nov 2024. There were 2 interview rounds.
Its very easy
Basic maths questions learned up to 10
Basic Apptitude questions
The recent challenges faced in the field of System Engineering include adapting to remote work, cybersecurity threats, and managing complex systems.
Adapting to remote work due to the COVID-19 pandemic
Increased cybersecurity threats and the need for enhanced security measures
Managing complex systems with evolving technology and integration challenges
Troubleshooting DB errors involves identifying the root cause, checking logs, verifying configurations, and testing queries.
Identify the specific error message or behavior
Check database logs for any relevant information
Verify database configurations and settings
Test the problematic queries to isolate the issue
Consider recent changes or updates that may have caused the error
To troubleshoot performance related errors, analyze system logs, check resource utilization, identify bottlenecks, and optimize configurations.
Analyze system logs for any error messages or warnings related to performance issues
Check resource utilization such as CPU, memory, disk, and network usage
Identify bottlenecks in the system that may be causing performance degradation
Optimize configurations such as adjusting sett...
P1 tickets are high priority issues that require immediate attention and resolution.
Acknowledge the ticket immediately to show the user that their issue is being addressed
Assess the severity of the issue and prioritize accordingly
Communicate with the user regularly to provide updates on the progress
Involve necessary stakeholders or teams to expedite resolution
Ensure proper documentation of the issue and resolution step
TCS
Accenture
Wipro
Cognizant