i
Capital Numbers Infotech
Filter interviews by
Clear (1)
I applied via Approached by Company and was interviewed in Jan 2024. There was 1 interview round.
UI focuses on the look and feel of a product, while UX focuses on the overall user experience and usability.
UI stands for User Interface and deals with the visual elements of a product, such as colors, typography, and layout.
UX stands for User Experience and focuses on the overall experience of a user interacting with a product, including ease of use, efficiency, and satisfaction.
UI design is more about the aesthetics ...
A landing page is a standalone web page created for a specific marketing campaign, while a home page is the main page of a website.
Landing pages are designed for a specific purpose or campaign, such as promoting a product or service.
Home pages serve as the main entry point to a website and typically include navigation to other pages.
Landing pages have a clear call-to-action (CTA) to encourage visitors to take a specifi...
Top trending discussions
posted on 17 Sep 2024
My design process involves research, ideation, prototyping, testing, and iteration to create user-centered solutions.
Research: Understand user needs and goals.
Ideation: Brainstorm and generate design concepts.
Prototyping: Create interactive prototypes for testing.
Testing: Gather feedback from users and stakeholders.
Iteration: Refine designs based on feedback and testing results.
Information architecture is the organization and structure of information within a digital product or website.
It involves categorizing and organizing content in a way that is easy for users to navigate and understand.
Information architecture helps users find what they are looking for quickly and efficiently.
It includes creating sitemaps, wireframes, and navigation systems to guide users through the product.
Good informa...
I applied via Campus Placement and was interviewed before Jun 2023. There were 2 interview rounds.
Had to create a concept (fidelity was flexible) of the given problem statement. Focus was more on the idea than on the visuals.
Heuristic laws are general principles or rules of thumb used in UI/UX design to improve user experience.
Visibility of system status
Match between system and the real world
User control and freedom
Consistency and standards
Error prevention
Recognition rather than recall
Flexibility and efficiency of use
Aesthetic and minimalist design
Help users recognize, diagnose, and recover from errors
Help and documentation
It was design task with time constraints
I applied via Recruitment Consulltant and was interviewed before Mar 2023. There were 3 interview rounds.
Assignment Related to UI UX
posted on 20 Jan 2025
posted on 11 Jun 2024
Strings are immutable to ensure data integrity and security by preventing accidental or intentional modification.
Immutable strings prevent accidental changes to data
Enhances security by preventing data tampering
Allows for efficient memory management
Count the number of repeated words in a given string
Split the string into words using a delimiter like space
Create a hashmap to store word frequencies
Iterate through the words and update the hashmap accordingly
Count the number of words with frequency greater than 1
I applied via Referral and was interviewed in Jun 2024. There was 1 interview round.
Controller is a general term for a component that handles user requests, while a REST controller specifically handles RESTful requests.
Controller is a general term for a component that handles user requests in a web application
REST controller specifically handles RESTful requests, following the principles of REST architecture
REST controller typically returns data in JSON or XML format, while a regular controller may re
Print highest salary of an employee using coding
Create an array of employee salaries
Sort the array in descending order
Print the first element of the sorted array as the highest salary
JWT token is a JSON web token used for securely transmitting information between parties as a compact and self-contained way.
JWT stands for JSON Web Token
It consists of three parts: header, payload, and signature
It is commonly used for authentication and information exchange in web development
Microservices interact with each other through APIs, messaging queues, or event-driven architecture.
Use RESTful APIs for synchronous communication between microservices
Implement messaging queues like RabbitMQ or Kafka for asynchronous communication
Leverage event-driven architecture with tools like Apache Kafka or AWS SNS/SQS
Consider using service mesh like Istio for managing communication between microservices
I applied via Job Portal and was interviewed in Feb 2024. There was 1 interview round.
I applied via Walk-in and was interviewed in Dec 2021. There were 3 interview rounds.
Basic Programming questions will be there
Java is most secured due to its strong memory management, bytecode verification, and security manager.
Java's strong memory management prevents buffer overflow and other memory-related vulnerabilities.
Bytecode verification ensures that the code is safe to execute and prevents malicious code from running.
Security manager allows fine-grained control over access to system resources.
Java also has a robust set of security AP...
Java programs are executed by the Java Virtual Machine (JVM) which interprets and executes the bytecode generated by the Java compiler.
Java source code is compiled into bytecode by the Java compiler
The bytecode is platform-independent and can be executed on any device with a JVM
The JVM interprets the bytecode and executes the instructions
The JVM manages memory, handles exceptions, and provides other runtime services
Exa
based on 1 interview
Interview experience
Software Engineer
203
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
126
salaries
| ₹0 L/yr - ₹0 L/yr |
Front end Developer
48
salaries
| ₹0 L/yr - ₹0 L/yr |
Web Developer
29
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Manager
29
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech