i
Cencora
Filter interviews by
Clear (1)
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
Security in web API involves implementing authentication, authorization, encryption, and input validation.
Implement authentication mechanisms such as OAuth, JWT, or API keys to verify the identity of clients accessing the API.
Use authorization to control access to resources based on roles or permissions.
Encrypt sensitive data using SSL/TLS to ensure secure communication between clients and the API.
Validate and sanitize...
I applied via Naukri.com and was interviewed before Oct 2023. There were 2 interview rounds.
Top trending discussions
I applied via Naukri.com and was interviewed in Apr 2024. There were 2 interview rounds.
C,c++ questions and two coding questions. basic mcq
TreeSet and HashSet are both implementations of the Set interface in Java, but they have some key differences.
TreeSet is a sorted set that maintains elements in ascending order, while HashSet does not guarantee any specific order.
TreeSet uses a Red-Black tree data structure for storage, which allows for efficient retrieval of elements in sorted order.
HashSet uses a hash table for storage, which provides constant-time p...
Full selectors select all descendants of a specified element, while partial selectors select only direct children.
Full selectors use a space between the parent and child elements, while partial selectors use the > symbol.
Full selectors are more general and can target multiple levels of descendants, while partial selectors are more specific and target only direct children.
Example of full selector: div p selects all
ele...
Screen scraping is extracting data from a website's HTML code, while data scraping is extracting data from various sources.
Screen scraping involves extracting data from the visual representation of a website, usually using automation tools like web scrapers.
Data scraping involves extracting data from various sources such as databases, APIs, and documents.
Both screen scraping and data scraping are used to collect and an...
Formula to calculate number of squares that can fit inside a triangle
Calculate the area of the triangle and the area of the square
Divide the area of the triangle by the area of the square to get the number of squares that can fit inside the triangle
Formula: (h*b)/(a*a)
SVM is a machine learning algorithm used for classification and regression analysis.
SVM finds the best hyperplane that separates data into different classes.
It works by maximizing the margin between the hyperplane and the closest data points.
SVM can handle both linear and non-linear data using kernel functions.
It is widely used in image classification, text classification, and bioinformatics.
SVM has been shown to be ef...
Logistic regression is used for classification while linear regression is used for regression analysis.
Logistic regression predicts the probability of an event occurring, while linear regression predicts the value of a continuous variable.
Logistic regression uses a sigmoid function to map input values to a probability between 0 and 1.
Linear regression assumes a linear relationship between the independent and dependent ...
I applied via Referral and was interviewed in Apr 2021. There were 3 interview rounds.
Accidents can be avoided by implementing safety measures and promoting awareness.
Conduct regular safety training sessions for employees
Ensure proper maintenance of equipment and machinery
Implement safety protocols and procedures
Provide personal protective equipment (PPE) to employees
Promote a safety culture within the organization
Encourage reporting of near-misses and incidents for analysis and improvement
Regularly rev
I was interviewed before Sep 2020.
Round duration - 60 minutes
Round difficulty - Medium
30 Aptitude problems and two coding questions
Given an integer array ARR
of size N
, your task is to find the total number of inversions that exist in the array.
An inversion is defined for a pair of integers in the...
Count the total number of inversions in an integer array.
Iterate through the array and for each pair of elements, check if the conditions for inversion are met.
Use a nested loop to compare each pair of elements efficiently.
Keep a count of the inversions found and return the total count at the end.
Given an array of integers, determine the maximum possible sum of any contiguous subarray within the array.
array = [34, -50, 42, 14, -5, 86]
Find the maximum sum of any contiguous subarray within an array of integers.
Iterate through the array and keep track of the maximum sum of subarrays encountered so far.
At each index, decide whether to include the current element in the subarray or start a new subarray.
Use Kadane's algorithm to solve the problem efficiently.
Example: For array [34, -50, 42, 14, -5, 86], the maximum subarray sum is 137.
Round duration - 90 minutes
Round difficulty - Medium
Data structure and algorithms plus object oriented problems
You are given a sequence of numbers, ARR
. Your task is to return a sorted sequence of ARR
in non-descending order using the Merge Sort algorithm.
The Merge Sort...
Implement Merge Sort algorithm to sort a sequence of numbers in non-descending order.
Divide the input array into two halves recursively until each array has only one element.
Merge the sorted halves to produce a completely sorted array.
Time complexity of Merge Sort is O(n log n).
Example: Input: [3, 1, 4, 1, 5], Output: [1, 1, 3, 4, 5]
Given a singly linked list of integers and a reference to a node, your task is to delete that specific node from the linked list. Each node in the linked li...
Given a singly linked list of integers and a reference to a node, delete the specified node from the linked list.
Traverse the linked list to find the node to be deleted
Update the pointers to skip over the node to be deleted
Print the modified linked list after deletion
Round duration - 60 miinutes
Round difficulty - Easy
Database questions and discussion about projects
Normal forms in database management systems help in organizing data to reduce redundancy and improve data integrity.
Normal forms are rules used to design relational database tables to minimize redundancy and dependency.
Boyce-Codd Normal Form (BCNF) is a stricter version of Third Normal Form (3NF) where every determinant is a candidate key.
BCNF helps in eliminating anomalies like insertion, update, and deletion anomalie...
WHILE is used in loops to repeatedly execute a block of code, while HAVING is used in SQL queries to filter results based on aggregate functions.
WHILE is used in programming languages like SQL to create loops for executing a block of code multiple times.
HAVING is used in SQL queries to filter results based on aggregate functions like SUM, COUNT, AVG, etc.
WHILE is used for iterative operations, while HAVING is used for
Tip 1 : Competitive Programming
Tip 2 : Do atleast 2 projects
Tip 1 : To be precise, mention your technical skills, achievements, dont write anything unnecessary plus write your professional summary good mention your project details in not more than 2 lines and make sure those sentences make sense to reader.
Tip 2 : Resume should be not more than one page. Write everything within one page
I applied via unstop and was interviewed before Oct 2023. There were 3 interview rounds.
It was medium to difficult level test
based on 2 interviews
Interview experience
Analyst
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Quality Engineer
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Engineer
3
salaries
| ₹0 L/yr - ₹0 L/yr |
UnitedHealth
Johnson & Johnson
B. Braun Medical
Vcare Trichology