Filter interviews by
I applied via LinkedIn and was interviewed before Nov 2023. There were 3 interview rounds.
Apptitude test was quite easy to attend
Hackerrank platform was used for coding round.
Yes, I am willing to relocate for the right opportunity.
I am open to relocating for a position that aligns with my career goals and offers growth opportunities.
I have relocated in the past for job opportunities and have found it to be a positive experience.
I understand that relocation may come with challenges, but I am prepared to adapt and thrive in a new environment.
Microservices offer benefits such as scalability, flexibility, and easier maintenance.
Scalability: Microservices can be scaled independently, allowing for better resource utilization.
Flexibility: Microservices can be developed and deployed independently, allowing for faster iteration and innovation.
Easier maintenance: Microservices are smaller and more focused, making it easier to identify and fix issues.
Improved fault...
Spring is a framework while Spring Boot is an extension of Spring.
Spring Boot provides auto-configuration and embedded servers.
Spring Boot reduces boilerplate code and simplifies application setup.
Spring Boot is opinionated and provides defaults for configuration.
Spring Boot is ideal for microservices and standalone applications.
Spring is more flexible and customizable than Spring Boot.
Yes, I have configured service registry.
I have experience with service registry tools like Consul and Eureka.
I have configured service registry for microservices architecture.
I have implemented service discovery and load balancing using service registry.
I have used service registry to manage service endpoints and metadata.
Profile registry is used to store user profiles and their preferences in a centralized location.
Profile registry is used to manage user profiles and preferences in a centralized location
It can be configured in a project by defining the schema for user profiles and preferences
Profile registry can be accessed through APIs or SDKs
It can be used to personalize user experience and provide targeted content
Examples of profile...
Spring Boot is a framework that simplifies the development of Java applications by providing pre-configured settings and dependencies.
Spring Boot uses an embedded server to run applications.
It provides auto-configuration for commonly used libraries and frameworks.
Spring Boot uses Spring Framework's core features like Inversion of Control (IoC) and Aspect Oriented Programming (AOP).
It uses annotations to configure and c...
We can handle the situation by implementing fault tolerance mechanisms.
Implementing circuit breakers to prevent cascading failures
Using load balancers to redirect traffic to healthy instances
Implementing retry mechanisms to handle temporary failures
Using monitoring tools to detect and alert on failures
Implementing graceful degradation to provide partial functionality
Using backups or replicas to ensure high availability
We use @RestController, @RequestMapping, @Autowired, @Service, @Repository, @Transactional, @GetMapping, @PostMapping, @PutMapping, @DeleteMapping annotations in our Spring Boot project.
@RestController - used to define RESTful web services
@RequestMapping - used to map HTTP requests to handler methods
@Autowired - used for automatic dependency injection
@Service - used to define a service layer component
@Repository - used...
Spring Data JPA simplifies the implementation of data access layer in Spring applications.
Provides a framework for easily creating repositories and queries
Reduces boilerplate code for data access layer
Supports pagination and sorting of data
Integrates with Spring's transaction management
Example: @Repository interface UserRepository extends JpaRepository
A hash map is a data structure that uses a hash function to map keys to values in constant time.
Hash map uses an array to store key-value pairs
The hash function is used to convert the key into an index of the array
Collisions occur when two keys map to the same index, which is resolved using chaining or open addressing
Retrieving a value from a hash map involves computing the hash of the key and then looking up the corre...
Comparable is an interface used for natural ordering while Comparator is an interface used for custom ordering.
Comparable is implemented by the class itself while Comparator is implemented by a separate class.
Comparable provides a single method compareTo() while Comparator provides a single method compare().
Comparable is used for sorting elements in a collection while Comparator is used for custom sorting.
Example: Stri...
Concurrent Hash Map is a thread-safe implementation of a hash map.
It allows multiple threads to access and modify the map concurrently.
It uses a technique called lock striping to achieve high concurrency.
It is part of the java.util.concurrent package in Java.
Example: ConcurrentHashMap in Java.
Top trending discussions
I applied via Naukri.com and was interviewed before Jun 2019. There were 3 interview rounds.
Implement stack data structure
Use an array or linked list to store elements
Push operation adds element to top of stack
Pop operation removes element from top of stack
Peek operation returns top element without removing it
Global variables are accessible from any part of the program and can be modified by any function.
Global variables are declared outside of any function.
They can be accessed and modified by any function in the program.
If a function modifies the value of a global variable, the new value is visible to all other functions.
Global variables can be useful for sharing data between functions.
However, overuse of global variables
Program to transpose a matrix
Iterate through rows and columns of the matrix
Swap the elements at (i,j) and (j,i) positions
Return the transposed matrix
Pre and post fix operators are used to increment or decrement a value before or after it is used in an expression.
Pre-fix operator (++x) increments the value of x and returns the new value.
Post-fix operator (x++) returns the value of x and then increments it.
Both operators can be used with variables of numeric data types.
They can also be used with pointers to increment or decrement the memory address they point to.
I applied via Naukri.com and was interviewed before May 2020. There were 5 interview rounds.
I applied via Recruitment Consulltant and was interviewed in May 2022. There were 3 interview rounds.
Program using OOPs concept
Identify the objects and their properties
Create classes and define their methods
Use inheritance and polymorphism
Encapsulate data and use access modifiers
Example: A program to simulate a bank account
Code reviews are conducted regularly to ensure code quality and adherence to coding standards.
Code reviews are conducted by peers or senior developers.
Reviewers check for code quality, readability, maintainability, and adherence to coding standards.
Issues found during code review are documented and addressed by the developer.
Code reviews are conducted regularly, either before merging code or on a scheduled basis.
Tools ...
One programming challange just to see how good you use OOPs
I applied via Recruitment Consulltant and was interviewed in Nov 2022. There were 3 interview rounds.
I have been working as a Software Engineer for the past 5 years, specializing in developing web applications using Java and JavaScript.
Proficient in Java and JavaScript
Experience in developing web applications
Strong understanding of software development principles
Familiarity with agile methodologies
Knowledge of database management systems
Experience with version control systems like Git
Ability to work in a team and comm
Coding Round two questions with OOPs concepts
I applied via Company Website and was interviewed in Jun 2024. There were 2 interview rounds.
Tomarrow, power system
Machine power system drive
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
They asked to find the elements which are present more than once. I solved it using map in c++
My favorite algorithm is Dijkstra's algorithm for finding the shortest path in a graph.
Dijkstra's algorithm is a greedy algorithm that finds the shortest path between nodes in a graph.
It works by maintaining a priority queue of nodes to visit next, updating the shortest distance to each node as it explores the graph.
The algorithm is commonly used in routing and network optimization.
Example: Finding the shortest route b
Deadlocks occur when two or more processes are unable to proceed because each is waiting for the other to release a resource.
Resource deadlocks: Processes hold resources and wait for others to release resources. Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X.
Communication deadlocks: Processes wait for messages from each other indefinitely. Example...
Developed a web application for online shopping with user authentication and payment gateway integration.
Implemented user authentication using JWT tokens
Integrated Stripe API for payment processing
Designed responsive UI using React and Bootstrap
I was interviewed in Jun 2024.
Electrical engineering
Power system machine power electronics
Some of the top questions asked at the CG Power and Industrial Solutions Software Engineer interview -
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Deputy Manager
208
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Executive
183
salaries
| ₹0 L/yr - ₹0 L/yr |
Territory Manager
183
salaries
| ₹0 L/yr - ₹0 L/yr |
Territory Sales Manager
127
salaries
| ₹0 L/yr - ₹0 L/yr |
Manager
104
salaries
| ₹0 L/yr - ₹0 L/yr |
Siemens
ABB
BHEL
Thermax Limited