i
bebo Technologies
Filter interviews by
I applied via Approached by Company and was interviewed in Dec 2023. There were 2 interview rounds.
Implementing data security in Apex to prevent unauthorized DML operations on fields and objects.
Use field-level security to restrict access to sensitive fields
Implement object-level security using profiles and permission sets
Utilize Apex sharing rules to control record-level access
Consider using custom validation rules to enforce data integrity
Implement triggers to enforce additional business logic and security measure
Integration practices involve connecting different systems to share data and functionality.
Use APIs to connect systems and exchange data
Implement middleware like MuleSoft or Dell Boomi for seamless integration
Leverage Salesforce Connect to access external data sources within Salesforce
Consider batch processing for large data transfers
Implement error handling and monitoring for robust integrations
LMS stands for Learning Management System, a software application for the administration, documentation, tracking, reporting, and delivery of educational courses or training programs.
LMS helps organizations deliver online courses and training programs to employees or students.
It allows for the creation and management of courses, assessments, and learning materials.
LMS can track learner progress, generate reports, and p...
Shadow DOM is a way to encapsulate the styling and structure of a web component, preventing styles from leaking out or clashing with the rest of the page.
Shadow DOM allows for creating self-contained components with their own styles and markup
It helps in preventing styles from the main document affecting the component and vice versa
Shadow DOM can be created using the 'shadowRoot' property of an element
Some common exceptions in Salesforce development include DMLException, QueryException, and LimitException.
DMLException: Thrown when an error occurs while performing DML operations like insert, update, delete.
QueryException: Thrown when an error occurs while querying data from the database.
LimitException: Thrown when governor limits are exceeded, such as SOQL query limit or CPU time limit.
Yes, I have worked on integration in Salesforce development.
I have experience integrating Salesforce with external systems using REST and SOAP APIs.
I have worked on integrating Salesforce with third-party applications like MailChimp and DocuSign.
I have implemented custom integrations using tools like Salesforce Connect and MuleSoft.
I have experience with data mapping, transformation, and synchronization during integrat
Governor limits are in place to ensure efficient use of resources and prevent abuse in Salesforce platform.
Governor limits help in maintaining system performance and preventing monopolization of resources.
They ensure fair usage of resources among all users on the platform.
Examples include limits on number of records retrieved in a single query, number of SOQL queries executed, and CPU time consumed.
Governor limits also...
One challenge I faced was integrating a third-party API with Salesforce.
Had to understand the API documentation thoroughly
Encountered compatibility issues with Salesforce platform
Implemented custom code to bridge the gap between API and Salesforce
posted on 11 Oct 2023
Technical round on Salesforce basics
posted on 5 Oct 2022
I applied via Job Portal
Triggers are pieces of code that execute before or after specific events occur on a record.
Triggers can be used to automate processes, enforce business rules, and maintain data consistency.
Triggers can be written in Apex and are associated with a specific object.
Triggers can be executed before or after insert, update, delete, or undelete operations.
Triggers can access and modify related records and perform complex vali
Custom settings are org-wide while custom metadata is record-specific.
Custom settings are used to store data that is org-wide and can be accessed by all users.
Custom metadata is used to store data that is specific to a record or a set of records.
Custom settings can be accessed using the hierarchy custom setting or the list custom setting.
Custom metadata can be accessed using the Metadata API or the Apex Metadata API.
Cu...
Apex asynchronous batch is used for processing large data sets asynchronously.
Batch Apex is used for processing large data sets asynchronously
It is used to avoid governor limits and timeouts
Batch Apex can be scheduled to run at a specific time or can be executed manually
Example: Updating all accounts with a specific field value using Batch Apex
I applied via LinkedIn and was interviewed in Jul 2022. There were 2 interview rounds.
Some trigger to update another object when parent data changes.
Technology advantage or not
All aptitude topics,logical reasoning
posted on 4 Nov 2024
I applied via Approached by Company and was interviewed in Jun 2024. There were 3 interview rounds.
Design a RESTful API for CRUD operations on user resources.
Use HTTP methods like GET, POST, PUT, DELETE for CRUD operations
Create endpoints like /users for listing all users, /users/{id} for specific user
Use status codes like 200 for success, 404 for not found, 400 for bad request
Implement authentication and authorization mechanisms for security
Include request and response body formats like JSON or XML
OOPS stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.
OOPS focuses on creating objects that contain data and methods to manipulate that data.
It allows for encapsulation, inheritance, and polymorphism.
Examples of OOPS languages include Java, C++, and Python.
Dependency Injection is a design pattern where components are given their dependencies rather than creating them internally.
Allows for easier testing by mocking dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Example: Constructor injection, Setter injection
Normalization in SQL is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a table into smaller tables and defining relationships between them.
It helps in reducing data redundancy by storing data in a structured manner.
There are different normal forms like 1NF, 2NF, 3NF, and BCNF that define the level of normalization.
Example: If we have a t...
posted on 18 Sep 2024
I applied via Shine and was interviewed in Aug 2024. There were 2 interview rounds.
Normal coding round with simple oa complexity
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Consumers read data from topics, while producers write data to topics in Kafka.
Consumers subscribe to topics to read messages from them
Producers publish messages to topics for consumers to read
Consumers can be part of a consumer group to scale out consumption
Producers can specify key for messages to control partitioning
Software Engineer
222
salaries
| ₹3 L/yr - ₹9.7 L/yr |
Senior Software Engineer
178
salaries
| ₹4.5 L/yr - ₹15 L/yr |
Module Lead
39
salaries
| ₹7 L/yr - ₹18 L/yr |
Principal Software Engineer
33
salaries
| ₹8 L/yr - ₹19.5 L/yr |
Associate Software Engineer
26
salaries
| ₹3 L/yr - ₹5 L/yr |
TCS
Infosys
Wipro
HCLTech