Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Oct 2021. There were 4 interview rounds.
The coding test was basically on basics MCQs on Java, pseudo code, find the errors in a given code snippet and finally a simple scenario based program.
Java is secure due to its bytecode verification process and platform independent due to its write once, run anywhere philosophy.
Java code is compiled into bytecode which is executed by the Java Virtual Machine (JVM). The JVM verifies the bytecode before executing it, ensuring that it is safe and secure.
Java's platform independence is due to its 'write once, run anywhere' philosophy. Java code can be compiled on one pla...
Top trending discussions
I excel as an individual contributor and transition smoothly into a team lead role by leveraging my technical expertise and leadership skills.
Demonstrate strong technical skills and consistently deliver high-quality work as an individual contributor.
Proactively seek opportunities to mentor and guide team members, showcasing leadership potential.
Communicate effectively with team members, fostering collaboration and driv...
posted on 14 Oct 2024
I applied via campus placement at National Institute of Technology, (NIT), Sikkim and was interviewed in Sep 2024. There were 2 interview rounds.
60 min total
45-aptitude question
2-coding question
Garbage collector is a program that automatically frees up memory by reclaiming memory occupied by objects that are no longer in use.
Garbage collector is a part of the memory management system in programming languages like Java, C#, and Python.
It helps prevent memory leaks by identifying and freeing up memory that is no longer needed.
Garbage collection can be automatic or manual, depending on the programming language a
Public key is used for encryption and decryption in asymmetric cryptography, while foreign key is used to establish a relationship between tables in a database.
Public key is used in asymmetric cryptography for secure communication.
Foreign key is used in databases to establish relationships between tables.
Public key is shared with others for encryption, while private key is kept secret for decryption.
Foreign key links a...
I applied via Naukri.com and was interviewed in Jun 2024. There were 2 interview rounds.
Non functional requirements are criteria that specify how a system should behave, rather than what it should do.
Performance - system should respond within 2 seconds for all user interactions
Scalability - system should be able to handle 1000 concurrent users
Reliability - system should have a 99.99% uptime
Security - system should encrypt all sensitive data
Usability - system should have a user-friendly interface
Improve legacy app performance by optimizing code, implementing caching, and scaling resources.
Optimize code by identifying and removing bottlenecks
Implement caching to reduce database calls and improve response time
Scale resources by using containers or serverless architecture
Use asynchronous processing for long-running tasks
Upgrade hardware or infrastructure if necessary
Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices and external clients.
Implement monitoring and logging to detect and respond to security incidents.
Consider using API gateways for central...
Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.
Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.
Services communicate through APIs, allowing for flexibility and scalability.
Each microservice can be developed, deployed, and scaled independently, leading to faster develo...
I applied via Referral and was interviewed in May 2024. There were 3 interview rounds.
Hacker Rank test, problem solving. Java 8
Java8 Stream program to filter even numbers and double them
Use Stream to filter even numbers
Use map to double the filtered numbers
Use collect to collect the results into a list
I applied via Walk-in and was interviewed in Aug 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
SOA focuses on large, monolithic services while Microservices are small, independent services.
SOA is a centralized architecture with shared services, while Microservices are decentralized with each service having its own database.
SOA is typically implemented using ESB (Enterprise Service Bus), while Microservices communicate via lightweight protocols like HTTP or messaging queues.
SOA is more suitable for large enterpri...
posted on 27 Dec 2024
I was interviewed in Jan 2024.
based on 2 reviews
Rating in categories
Technical Specialist
28
salaries
| ₹4.2 L/yr - ₹12.4 L/yr |
Salesforce Developer
19
salaries
| ₹3 L/yr - ₹13 L/yr |
Senior Technical Specialist
8
salaries
| ₹10 L/yr - ₹15 L/yr |
Associate Technical Specialist
5
salaries
| ₹3 L/yr - ₹3.2 L/yr |
QA Specialist
4
salaries
| ₹6 L/yr - ₹8.4 L/yr |
Tech Mahindra
Infosys
Wipro
TCS