Filter interviews by
Overriding is when a subclass provides its own implementation of a method from the superclass, while overloading is when a class has multiple methods with the same name but different parameters.
Overriding is used to provide a specific implementation of a method in a subclass that is already defined in the superclass.
Overloading is used to define multiple methods with the same name but different parameters in a cla...
Delegates are a type-safe function pointer used to encapsulate a method.
Delegates allow methods to be passed as parameters to other methods.
They can be used to implement callbacks and event handlers.
Delegates can be chained together to create a pipeline of method calls.
They are commonly used in .NET framework for event handling and LINQ queries.
String is immutable while StringBuilder is mutable.
String is a final class and its value cannot be changed once created.
StringBuilder is a mutable class and its value can be changed without creating a new object.
String concatenation creates a new String object each time, while StringBuilder is more efficient for concatenation.
Use String for fixed values and StringBuilder for dynamic values.
Action Filters are attributes that can be applied to controller actions to perform pre/post processing.
Action Filters are used to modify the behavior of controller actions.
They can be used to perform authentication, logging, caching, etc.
Action Filters can be applied globally or to specific actions.
Examples include [Authorize] for authentication and [OutputCache] for caching.
Action Filters can also be created by t...
IEnumerable is in-memory collection while IQueryable is a queryable data source.
IEnumerable is used for querying data from in-memory collections like List, Array, etc.
IQueryable is used for querying data from a data source like a database.
IEnumerable executes the query on the client-side while IQueryable executes the query on the server-side.
IQueryable is more efficient when working with large datasets as it allow...
Shallow copy creates a new object with same values as original, but references the same memory locations.
Shallow copy only copies the top-level object, not the nested objects.
Changes made to the original object will reflect in the copied object.
Use MemberwiseClone() method to create shallow copy of an object.
Example: int[] arr1 = {1, 2, 3}; int[] arr2 = arr1.Clone() as int[]; arr2[0] = 4; Console.WriteLine(arr1[0]...
Interfaces define contracts for behavior while abstract classes provide partial implementation.
Interfaces cannot have implementation while abstract classes can have partial implementation.
A class can implement multiple interfaces but can inherit from only one abstract class.
Interfaces are used for loose coupling while abstract classes are used for code reuse.
Example: An interface 'Drawable' can define a method 'dr...
Yes, authentication is implemented using OAuth 2.0 protocol.
OAuth 2.0 protocol is used for authentication.
Access tokens are issued to authorized clients.
Refresh tokens are used to obtain new access tokens.
Authentication is required for all API endpoints.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a table into smaller tables and defining relationships between them.
There are different levels of normalization, with each level reducing redundancy and improving data integrity further.
Normalization helps to prevent data inconsistencies and anomalies, and makes it easi...
Value types hold the data directly, while reference types hold a reference to the data.
Value types are stored on the stack, while reference types are stored on the heap.
String is a reference type in .NET.
Value types include int, float, and bool.
Reference types include arrays, classes, and interfaces.
I applied via Indeed and was interviewed in Feb 2023. There were 2 interview rounds.
I am a highly experienced Senior Software Engineer with a strong background in developing scalable and efficient software solutions.
Over 10 years of experience in software development
Expertise in multiple programming languages such as Java, C++, and Python
Proficient in designing and implementing complex systems
Strong problem-solving and analytical skills
Proven track record of delivering high-quality software on time an...
I am currently working on a web application for a retail company using React, Node.js, and MongoDB.
Developing a responsive UI using React and Redux
Implementing server-side logic using Node.js and Express
Storing and retrieving data using MongoDB
Integrating third-party APIs for payment processing and shipping
Writing automated tests using Jest and Enzyme
Yes, authentication is implemented using OAuth 2.0 protocol.
OAuth 2.0 protocol is used for authentication.
Access tokens are issued to authorized clients.
Refresh tokens are used to obtain new access tokens.
Authentication is required for all API endpoints.
Dependency Injection is a design pattern used to remove hard-coded dependencies and make code more flexible and testable.
Dependency Injection is implemented by injecting the required dependencies into a class rather than creating them within the class.
This can be achieved through constructor injection, setter injection, or interface injection.
For example, in Java, Spring Framework provides a powerful dependency injecti...
Action Filters are attributes that can be applied to controller actions to perform pre/post processing.
Action Filters are used to modify the behavior of controller actions.
They can be used to perform authentication, logging, caching, etc.
Action Filters can be applied globally or to specific actions.
Examples include [Authorize] for authentication and [OutputCache] for caching.
Action Filters can also be created by the de...
Interfaces are a way to define a contract between two objects, specifying the methods and properties that one object must implement.
Interfaces allow for loose coupling between objects, making it easier to change the implementation of one object without affecting others.
They promote code reusability by allowing multiple objects to implement the same interface.
Interfaces can be used to create mock objects for testing pur...
Interfaces define contracts for behavior while abstract classes provide partial implementation.
Interfaces cannot have implementation while abstract classes can have partial implementation.
A class can implement multiple interfaces but can inherit from only one abstract class.
Interfaces are used for loose coupling while abstract classes are used for code reuse.
Example: An interface 'Drawable' can define a method 'draw' w...
Shallow copy creates a new object with same values as original, but references the same memory locations.
Shallow copy only copies the top-level object, not the nested objects.
Changes made to the original object will reflect in the copied object.
Use MemberwiseClone() method to create shallow copy of an object.
Example: int[] arr1 = {1, 2, 3}; int[] arr2 = arr1.Clone() as int[]; arr2[0] = 4; Console.WriteLine(arr1[0]); //...
Ref and out are keywords used in C# to pass arguments by reference instead of value.
Ref and out are used to pass arguments by reference instead of value
Ref keyword is used to pass a reference of the variable to the method
Out keyword is used to pass a reference of the variable to the method and requires the variable to be initialized before use
Ref keyword can be used to modify the value of the variable passed as an argu...
String is immutable while StringBuilder is mutable.
String is a final class and its value cannot be changed once created.
StringBuilder is a mutable class and its value can be changed without creating a new object.
String concatenation creates a new String object each time, while StringBuilder is more efficient for concatenation.
Use String for fixed values and StringBuilder for dynamic values.
Self Join is a way to join a table with itself using aliases.
It is useful when we need to compare records within the same table.
It requires the use of aliases to differentiate between the two instances of the same table.
Example: SELECT a.name, b.name FROM employees a, employees b WHERE a.manager_id = b.employee_id;
Delegates are a type-safe function pointer used to encapsulate a method.
Delegates allow methods to be passed as parameters to other methods.
They can be used to implement callbacks and event handlers.
Delegates can be chained together to create a pipeline of method calls.
They are commonly used in .NET framework for event handling and LINQ queries.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a table into smaller tables and defining relationships between them.
There are different levels of normalization, with each level reducing redundancy and improving data integrity further.
Normalization helps to prevent data inconsistencies and anomalies, and makes it easier to...
Overriding is when a subclass provides its own implementation of a method from the superclass, while overloading is when a class has multiple methods with the same name but different parameters.
Overriding is used to provide a specific implementation of a method in a subclass that is already defined in the superclass.
Overloading is used to define multiple methods with the same name but different parameters in a class.
Ov...
IEnumerable is in-memory collection while IQueryable is a queryable data source.
IEnumerable is used for querying data from in-memory collections like List, Array, etc.
IQueryable is used for querying data from a data source like a database.
IEnumerable executes the query on the client-side while IQueryable executes the query on the server-side.
IQueryable is more efficient when working with large datasets as it allows for...
Value types hold the data directly, while reference types hold a reference to the data.
Value types are stored on the stack, while reference types are stored on the heap.
String is a reference type in .NET.
Value types include int, float, and bool.
Reference types include arrays, classes, and interfaces.
Top trending discussions
Truncate removes all data from a table while delete removes specific rows.
Truncate is faster than delete as it doesn't log individual row deletions
Truncate resets auto-increment values while delete doesn't
To truncate a table in MySQL, use the TRUNCATE TABLE statement
Methodology used in my project was Agile
posted on 14 May 2022
I applied via Naukri.com and was interviewed before May 2021. There was 1 interview round.
I applied via Referral and was interviewed before Aug 2021. There were 2 interview rounds.
The most challenging part of KTA development was integrating with legacy systems.
Integrating with legacy systems required extensive testing and debugging.
The lack of documentation for legacy systems made integration even more difficult.
Ensuring data consistency between KTA and legacy systems was a major challenge.
Customizing KTA workflows to fit with legacy systems was time-consuming.
Working with stakeholders to unders...
I appeared for an interview before Oct 2021.
There are technical and objective questions
They asked about projects and asked to speak on any topics.
I envision myself in a leadership role, driving innovative projects and mentoring junior engineers while contributing to impactful solutions.
I see myself leading a team of engineers, fostering collaboration and innovation.
I aim to specialize in cloud technologies, contributing to scalable solutions.
I want to mentor junior developers, sharing knowledge and best practices.
I aspire to contribute to open-source projects, e...
I applied via Monster and was interviewed before Nov 2020. There was 1 interview round.
I lead a team in developing scalable software solutions, focusing on architecture, code quality, and mentoring junior developers.
Architected a microservices-based application that improved system scalability by 30%.
Implemented CI/CD pipelines using Jenkins, reducing deployment time by 50%.
Mentored 3 junior developers, helping them improve their coding skills and understanding of best practices.
Collaborated with cross-f...
I applied via Company Website and was interviewed before May 2021. There were 3 interview rounds.
Python assignment
posted on 22 Sep 2022
I applied via Naukri.com and was interviewed before Sep 2021. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Jun 2021. There were 2 interview rounds.
Tuple is immutable and ordered while list is mutable and ordered.
Tuple uses parentheses while list uses square brackets.
Tuple is faster than list for accessing elements.
Tuple can be used as keys in dictionaries while list cannot.
Tuple is used for heterogeneous data while list is used for homogeneous data.
Tuple is used for returning multiple values from a function.
based on 1 interview experience
Difficulty level
Duration
based on 4 reviews
Rating in categories
Devops Engineer
55
salaries
| ₹4.5 L/yr - ₹8.9 L/yr |
Software Engineer
24
salaries
| ₹3 L/yr - ₹7.2 L/yr |
Project Manager
11
salaries
| ₹9.7 L/yr - ₹17 L/yr |
Cloud Security Engineer
9
salaries
| ₹4.5 L/yr - ₹7.5 L/yr |
SCCM System Administrator
8
salaries
| ₹9 L/yr - ₹11 L/yr |
TCS
Accenture
Wipro
Cognizant