Filter interviews by
I have worked on various types of transformations including Aggregator, Expression, Filter, Joiner, Lookup, Router, and Sorter.
Aggregator transformation for performing calculations on groups of data
Expression transformation for performing calculations and manipulating data
Filter transformation for filtering out unwanted data
Joiner transformation for joining data from multiple sources
Lookup transformation for retrieving...
Sorter can be active or inactive depending on the configuration.
Sorter transformation can be configured to be active or passive.
If active, it sorts the data based on specified criteria.
If passive, it passes the data through without sorting.
Sorter can be used to remove duplicates from data.
Sorter can also be used to sort data in ascending or descending order.
Update strategy is a transformation used to flag rows for insert, update, delete or reject.
Update strategy is used to control the flow of data in a mapping.
It is used to flag rows for insert, update, delete or reject.
It can be used to update a target table based on a source table.
It can be used to insert new rows into a target table.
It can be used to delete rows from a target table.
It can be used to reject rows that do
Caches are temporary storage areas that hold frequently accessed data for quick access.
There are several types of caches including CPU cache, disk cache, browser cache, and DNS cache.
CPU cache stores frequently accessed data from RAM for faster access.
Disk cache stores frequently accessed data from hard disk for faster access.
Browser cache stores frequently accessed web pages, images, and other resources for faster loa...
If we don't specify anything in group by aggregator, it will return the result without any grouping.
The result will contain all the rows from the input without any aggregation.
The output will have the same number of rows as the input.
No grouping will be performed on any column.
The output will be similar to a select statement without a group by clause.
posted on 25 Sep 2024
I applied via Company Website and was interviewed before Sep 2023. There were 2 interview rounds.
RBAC stands for Role-Based Access Control, a method of restricting network access based on roles assigned to users.
RBAC assigns permissions to roles, and roles to users
It simplifies access management by grouping users with similar access needs
RBAC helps enforce the principle of least privilege, granting only necessary permissions
Example: Admin role has full access, while User role has limited access
Cybersecurity is crucial in application security to protect sensitive data and prevent cyber attacks.
Cybersecurity helps in identifying and mitigating vulnerabilities in applications.
It ensures the confidentiality, integrity, and availability of data within applications.
Implementing secure coding practices and regular security assessments are essential in application security.
Examples include using encryption to protec...
posted on 4 Oct 2024
I applied via Approached by Company and was interviewed before Oct 2023. There were 2 interview rounds.
I applied via Approached by Company and was interviewed before Jul 2023. There were 2 interview rounds.
There was a small test which included few mcqs and one sql coding question. It was about 30 mins. It was fairly easy if you have knowledge on SQL.
Rollback and commit are database transactions used to manage changes made to the database.
Rollback is used to undo changes made in a transaction and restore the database to its previous state.
Commit is used to save the changes made in a transaction permanently to the database.
Rollback is typically used when an error occurs during a transaction, while commit is used when the transaction is successful.
Example: If a trans...
Transactions are a set of operations that are executed as a single unit of work, ensuring data integrity and consistency.
Transactions help maintain data integrity by ensuring all operations within the transaction are completed successfully or rolled back if any operation fails.
Transactions follow the ACID properties - Atomicity, Consistency, Isolation, and Durability.
Examples of transactions include transferring funds ...
posted on 1 Jun 2024
I applied via Recruitment Consulltant and was interviewed before Jun 2023. There were 2 interview rounds.
I can add value by identifying and mitigating security risks, implementing security measures, and ensuring compliance with regulations.
Identifying security risks and vulnerabilities in systems and networks
Implementing security measures such as firewalls, encryption, and access controls
Ensuring compliance with regulations and industry standards such as GDPR, HIPAA, and PCI DSS
Monitoring and responding to security incide...
posted on 15 Sep 2021
I applied via Naukri.com and was interviewed in Aug 2021. There were 5 interview rounds.
posted on 26 Oct 2021
I applied via Referral and was interviewed in Apr 2021. There were 3 interview rounds.
Senior Associate
2.1k
salaries
| ₹3.6 L/yr - ₹14.3 L/yr |
Assistant Manager
1.3k
salaries
| ₹5.9 L/yr - ₹24 L/yr |
Associate 1
1k
salaries
| ₹2.5 L/yr - ₹9.3 L/yr |
Associate
810
salaries
| ₹2 L/yr - ₹8 L/yr |
Senior Software Engineer
460
salaries
| ₹7.5 L/yr - ₹28 L/yr |
HSBC Group
Standard Chartered
ICICI Bank
HDFC Bank