Filter interviews by
Top trending discussions
I applied via LinkedIn and was interviewed in Mar 2024. There were 3 interview rounds.
posted on 5 Oct 2023
I applied via campus placement at Coimbatore Institute of Technology, Coimbatore and was interviewed in Sep 2023. There were 2 interview rounds.
There was Aptitude, Technical and Coding. Coding there were 4 sections for 4 languages (C, C++, java, Python) We had to do atleast 2. Technical MCQs were based on OS, CN, DSA, C, C++, Python (Numpy, Panda) and Java
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Object-oriented programming concepts that help in organizing and structuring code.
Encapsulation: Bundling data and methods together in a class.
Inheritance: Creating new classes from existing ones, inheriting their properties and behaviors.
Polymorphism: Objects of different classes can be treated as objects of a common superclass.
Abstraction: Hiding complex implementation details and providing simplified interfaces.
Enca...
I applied via Walk-in and was interviewed in May 2023. There were 2 interview rounds.
Collection , logical
OOPs concept is a programming paradigm based on the concept of objects, Spring Boot is a framework for building Java applications.
OOPs concept stands for Object-Oriented Programming, which focuses on creating objects that interact with each other to solve problems.
It involves concepts like inheritance, encapsulation, polymorphism, and abstraction.
Spring Boot is a framework that simplifies the development of Java applic...
Controller is a class that handles user requests and returns appropriate response. Rest controller is a specialized controller for RESTful web services.
Controller is a class in MVC architecture that handles user requests and interacts with the model and view.
Rest controller is a specialized controller in Spring framework for building RESTful web services.
Rest controller uses annotations like @RestController and @Reques...
HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to find the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
HashMap allows null keys and values, but only one null ...
I applied via Naukri.com and was interviewed in Mar 2023. There were 2 interview rounds.
Microservices communicate with each other through APIs and messaging protocols.
Microservices use APIs to communicate with each other.
Messaging protocols like HTTP, AMQP, and MQTT are used for asynchronous communication.
Service discovery mechanisms like Eureka and Consul are used to locate services.
API gateways like Zuul and Kong are used to manage API traffic.
Event-driven architecture is used for real-time communicatio
Securing APIs involves implementing authentication, authorization, encryption, and input validation.
Implement authentication mechanisms like OAuth, JWT, or API keys
Use authorization to control access to APIs based on user roles and permissions
Encrypt sensitive data transmitted over the network using HTTPS
Validate and sanitize input to prevent common security vulnerabilities like SQL injection or cross-site scripting (X
ORM (Object-Relational Mapping) tool is a software framework that maps objects to relational databases.
ORM tool simplifies database operations by allowing developers to interact with databases using object-oriented programming.
It eliminates the need for writing complex SQL queries by providing a higher-level abstraction.
ORM tools handle tasks like data persistence, retrieval, and mapping between objects and database ta...
Hibernate simplifies database programming in Java applications.
Hibernate provides a simple and efficient way to interact with databases.
It eliminates the need for writing complex SQL queries.
It supports object-oriented programming and mapping of Java classes to database tables.
It provides caching and lazy loading mechanisms for improved performance.
It supports transaction management and reduces the risk of data corrupt...
Rest controller is used for RESTful web services while Controller is used for traditional web applications.
Rest controller maps HTTP requests to RESTful web services while Controller maps HTTP requests to traditional web applications.
Rest controller uses @RestController annotation while Controller uses @Controller annotation.
Rest controller returns data in JSON or XML format while Controller returns data in HTML format...
Using component instead of service may cause confusion and errors in the code.
Components and services are two different concepts in Java development.
Components are used for UI elements while services are used for business logic.
Using component instead of service may lead to errors in the code and confusion for other developers.
For example, if a component is used instead of a service for business logic, it may not have ...
The @Autowired annotation is used to automatically wire beans by matching the data type of the bean with the data type of the property.
Used to inject dependencies automatically
Reduces the need for manual bean configuration
Can be used with constructors, fields, and methods
Can be used with @Qualifier to specify which bean to wire
Eureka server is a service registry that enables microservices to discover and communicate with each other.
Eureka server is a component of Netflix's OSS suite.
It allows services to register themselves and discover other services.
It uses a REST API for communication.
Default port is 8761.
Circuit breaker is a design pattern used to prevent cascading failures in distributed systems. Hystrix is a popular implementation.
Circuit breaker monitors the availability of a service and trips if the service fails repeatedly.
It helps to prevent cascading failures by failing fast and providing fallback options.
Hystrix is a popular implementation of circuit breaker pattern in Java.
It provides features like request cac
Ternary operators are conditional operators that evaluate a boolean expression and return one of two values based on the result.
Ternary operators are written in the form of 'condition ? value1 : value2'
If the condition is true, the operator returns value1, otherwise it returns value2
Ternary operators can be used as a shorthand for if-else statements
Example: int x = (a > b) ? a : b; // assigns the larger value of a and
Entity class represents a table in a database and its attributes as fields.
Define class with @Entity annotation
Add @Id annotation to primary key field
Add @Column annotation to map fields to table columns
Implement getters and setters
Override equals() and hashCode() methods
CRUD is a basic operation for data manipulation while JPA is a Java specification for ORM.
CRUD stands for Create, Read, Update, and Delete which are basic operations for data manipulation.
JPA is a Java specification for Object-Relational Mapping (ORM) which provides a way to map Java objects to relational database tables.
JPA provides a higher level of abstraction and simplifies the data access layer by providing an API...
I applied via Naukri.com and was interviewed in Jan 2023. There were 2 interview rounds.
Checked exceptions are exceptions that must be declared in a method's signature or handled using try-catch blocks.
Checked exceptions are checked at compile-time.
They are typically used for exceptional conditions that can be reasonably recovered from.
Examples of checked exceptions in Java include IOException, SQLException, and ClassNotFoundException.
To remove duplicates from an ArrayList of strings, use a HashSet to store unique elements.
Create a HashSet and add all elements from the ArrayList to it.
Create a new ArrayList and add all elements from the HashSet to it.
The new ArrayList will contain only unique elements.
HashSet and HashMap are both data structures in Java that use hashing to store and retrieve elements.
HashSet uses HashMap internally to store its elements as keys with a dummy value.
HashMap uses an array of linked lists called buckets to store key-value pairs.
Both HashSet and HashMap use the hashCode() method to calculate the hash value of keys.
HashSet uses the hash value to determine the bucket where an element should...
Using Java stream, find the sum of all odd numbers in a list.
Use the filter() method to filter out the odd numbers from the list.
Use the mapToInt() method to convert the filtered numbers to integers.
Use the sum() method to calculate the sum of the filtered odd numbers.
posted on 31 Oct 2022
I applied via Recruitment Consulltant and was interviewed in Oct 2022. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Hashmap is a data structure that stores key-value pairs and uses hashing to retrieve values quickly.
Hashmap uses a hash function to convert the key into an index in an array.
Collisions can occur when two keys map to the same index, which is resolved using separate chaining or open addressing.
Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval of values.
Java's Hashmap implementation use...
String is immutable to ensure thread safety and prevent unintended modification.
Immutable objects are safer to use in multi-threaded environments as they cannot be changed by other threads.
String pool is possible because of immutability, which saves memory and improves performance.
StringBuffer and StringBuilder classes are used for mutable string operations.
Example: String s = "hello"; s.concat(" world"); // returns a
Business Analyst
7
salaries
| ₹4 L/yr - ₹8 L/yr |
Associate
7
salaries
| ₹6.3 L/yr - ₹8 L/yr |
Senior Programmer Analyst
7
salaries
| ₹7 L/yr - ₹10.9 L/yr |
Senior Software Engineer
7
salaries
| ₹7.5 L/yr - ₹20 L/yr |
Junior Associate
6
salaries
| ₹4 L/yr - ₹5 L/yr |
Infosys
TCS
Wipro
HCLTech