i
BeeHyv
Filter interviews by
I applied via Campus Placement and was interviewed in Sep 2023. There were 2 interview rounds.
It was completely a math based test
Top trending discussions
I applied via Referral and was interviewed before Aug 2021. There was 1 interview round.
I applied via LinkedIn and was interviewed before Jul 2020. There was 1 interview round.
Functions return a value while stored procedures do not.
Functions can be used in SQL statements while stored procedures cannot.
Functions can be called from within stored procedures.
Functions can be used in views while stored procedures cannot.
Functions can have input parameters while stored procedures can have both input and output parameters.
A unique key is a field or combination of fields in a database table that uniquely identifies each record.
A unique key ensures that no two records in a table have the same values for the specified field(s).
It can be a single field or a combination of fields.
It is used to enforce data integrity and prevent duplicate records.
Examples include primary keys, candidate keys, and alternate keys.
There are four types of joining in SQL: Inner Join, Left Join, Right Join, and Full Join.
Inner Join returns only the matching rows from both tables.
Left Join returns all the rows from the left table and matching rows from the right table.
Right Join returns all the rows from the right table and matching rows from the left table.
Full Join returns all the rows from both tables, with NULL values in the columns where there ...
A constraint is a limitation or restriction on something.
Constraints can be applied in various fields such as software development, engineering, and project management.
In software development, constraints can include limitations on memory usage, processing speed, and storage capacity.
In engineering, constraints can include limitations on materials, dimensions, and weight.
In project management, constraints can include l...
ASP.NET life cycle is the series of events that occur during the processing of a request.
ASP.NET life cycle includes stages like initialization, page rendering, and disposal.
During initialization, the page and its controls are created and initialized.
During page rendering, the page is processed and HTML is generated.
During disposal, resources used by the page are released.
Events like Page_Load and Page_PreRender occur ...
View state is a hidden state of the page that stores values of controls and other page-specific data.
View state is used to maintain the state of server-side controls between postbacks.
It is stored in a hidden field on the page and is encrypted for security purposes.
View state can be disabled to improve performance, but this may cause issues with control state.
Example: A user fills out a form, but then navigates away fr...
Session is a way to store and retrieve user data between HTTP requests.
Session is a temporary storage of user data on the server side.
It is identified by a unique session ID which is stored in a cookie or URL parameter.
Session data can be used to maintain user state, such as login status or shopping cart contents.
response.redirect is a method used in web development to redirect the user to a different URL.
response.redirect is used to redirect the user to a different URL
It is commonly used in web applications to redirect users after a successful login or when accessing restricted pages
The method can be used with different programming languages and frameworks, such as ASP.NET, PHP, and Node.js
The redirected URL can be specified a
A query string is a part of a URL that contains data to be passed to a web server.
It starts with a question mark (?) and is followed by key-value pairs separated by ampersands (&).
It is commonly used to filter or sort data on a web page.
Example: www.example.com/search?q=apple&category=fruit
To use it, simply append the query string to the end of the URL.
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they were objects of the same class.
It is achieved through method overriding and method overloading.
Example: A parent class Animal can have child classes like Dog, Cat, and Bird. Each child class can have its own implementation of the method 'makeSound'.
Polymorphism makes code more flexibl
The 4 pillars of C++ are Abstraction, Encapsulation, Inheritance, and Polymorphism.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together to prevent external interference.
Inheritance: Creating new classes from existing ones, inheriting their properties and methods.
Polymorphism: Using a single interface to represent multiple types of objects.
To setup a network in a lab, you need equipment and a plan.
Determine the network topology and design
Choose appropriate networking equipment such as routers, switches, and cables
Configure network settings such as IP addresses and subnet masks
Test the network to ensure connectivity and functionality
Consider security measures such as firewalls and access control
Examples of equipment: Cisco routers, Juniper switches, Cat6
I appeared for an interview before Aug 2016.
I applied via Campus Placement and was interviewed in May 2020. There were 4 interview rounds.
Method overloading is when multiple methods have the same name but different parameters. Method overriding is when a subclass provides a different implementation of a method from its superclass.
Method overloading allows a class to have multiple methods with the same name but different parameters.
Method overriding occurs when a subclass provides a different implementation of a method that is already defined in its super...
Explanation of Java class loading and dynamic class loading.
Java class loaders are responsible for loading classes into the JVM.
There are three types of class loaders: bootstrap, extension, and application.
To run a class in a package, you need to specify the fully qualified name of the class.
Dynamic class loading allows classes to be loaded at runtime instead of compile time.
This can be useful for plugins or modules th
I applied via Recruitment Consulltant and was interviewed before Mar 2021. There were 2 interview rounds.
HashMap is a data structure that stores key-value pairs and provides constant time complexity for basic operations.
HashMap is implemented using an array of linked lists or a balanced tree.
It allows null values and at most one null key.
The put() method is used to insert a key-value pair into the HashMap.
The get() method is used to retrieve the value associated with a given key.
Example: HashMap
based on 1 interview
Interview experience
Software Developer
89
salaries
| ₹6 L/yr - ₹17.5 L/yr |
Software Engineer
15
salaries
| ₹8 L/yr - ₹14 L/yr |
Developer
14
salaries
| ₹6 L/yr - ₹11 L/yr |
Full Stack Developer
8
salaries
| ₹7.1 L/yr - ₹16 L/yr |
Software Developer Trainee
8
salaries
| ₹6.3 L/yr - ₹8 L/yr |
Persistent Systems
TCS
Infosys
Wipro