Filter interviews by
Overriding is when a subclass provides its own implementation of a method from the superclass, while overloading is when a class has multiple methods with the same name but different parameters.
Overriding is used to provide a specific implementation of a method in a subclass that is already defined in the superclass.
Overloading is used to define multiple methods with the same name but different parameters in a cla...
Delegates are a type-safe function pointer used to encapsulate a method.
Delegates allow methods to be passed as parameters to other methods.
They can be used to implement callbacks and event handlers.
Delegates can be chained together to create a pipeline of method calls.
They are commonly used in .NET framework for event handling and LINQ queries.
String is immutable while StringBuilder is mutable.
String is a final class and its value cannot be changed once created.
StringBuilder is a mutable class and its value can be changed without creating a new object.
String concatenation creates a new String object each time, while StringBuilder is more efficient for concatenation.
Use String for fixed values and StringBuilder for dynamic values.
Action Filters are attributes that can be applied to controller actions to perform pre/post processing.
Action Filters are used to modify the behavior of controller actions.
They can be used to perform authentication, logging, caching, etc.
Action Filters can be applied globally or to specific actions.
Examples include [Authorize] for authentication and [OutputCache] for caching.
Action Filters can also be created by t...
IEnumerable is in-memory collection while IQueryable is a queryable data source.
IEnumerable is used for querying data from in-memory collections like List, Array, etc.
IQueryable is used for querying data from a data source like a database.
IEnumerable executes the query on the client-side while IQueryable executes the query on the server-side.
IQueryable is more efficient when working with large datasets as it allow...
Shallow copy creates a new object with same values as original, but references the same memory locations.
Shallow copy only copies the top-level object, not the nested objects.
Changes made to the original object will reflect in the copied object.
Use MemberwiseClone() method to create shallow copy of an object.
Example: int[] arr1 = {1, 2, 3}; int[] arr2 = arr1.Clone() as int[]; arr2[0] = 4; Console.WriteLine(arr1[0]...
Interfaces define contracts for behavior while abstract classes provide partial implementation.
Interfaces cannot have implementation while abstract classes can have partial implementation.
A class can implement multiple interfaces but can inherit from only one abstract class.
Interfaces are used for loose coupling while abstract classes are used for code reuse.
Example: An interface 'Drawable' can define a method 'dr...
Yes, authentication is implemented using OAuth 2.0 protocol.
OAuth 2.0 protocol is used for authentication.
Access tokens are issued to authorized clients.
Refresh tokens are used to obtain new access tokens.
Authentication is required for all API endpoints.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a table into smaller tables and defining relationships between them.
There are different levels of normalization, with each level reducing redundancy and improving data integrity further.
Normalization helps to prevent data inconsistencies and anomalies, and makes it easi...
Value types hold the data directly, while reference types hold a reference to the data.
Value types are stored on the stack, while reference types are stored on the heap.
String is a reference type in .NET.
Value types include int, float, and bool.
Reference types include arrays, classes, and interfaces.
I applied via Indeed and was interviewed in Feb 2023. There were 2 interview rounds.
I am a highly experienced Senior Software Engineer with a strong background in developing scalable and efficient software solutions.
Over 10 years of experience in software development
Expertise in multiple programming languages such as Java, C++, and Python
Proficient in designing and implementing complex systems
Strong problem-solving and analytical skills
Proven track record of delivering high-quality software on time an...
I am currently working on a web application for a retail company using React, Node.js, and MongoDB.
Developing a responsive UI using React and Redux
Implementing server-side logic using Node.js and Express
Storing and retrieving data using MongoDB
Integrating third-party APIs for payment processing and shipping
Writing automated tests using Jest and Enzyme
Yes, authentication is implemented using OAuth 2.0 protocol.
OAuth 2.0 protocol is used for authentication.
Access tokens are issued to authorized clients.
Refresh tokens are used to obtain new access tokens.
Authentication is required for all API endpoints.
Dependency Injection is a design pattern used to remove hard-coded dependencies and make code more flexible and testable.
Dependency Injection is implemented by injecting the required dependencies into a class rather than creating them within the class.
This can be achieved through constructor injection, setter injection, or interface injection.
For example, in Java, Spring Framework provides a powerful dependency injecti...
Action Filters are attributes that can be applied to controller actions to perform pre/post processing.
Action Filters are used to modify the behavior of controller actions.
They can be used to perform authentication, logging, caching, etc.
Action Filters can be applied globally or to specific actions.
Examples include [Authorize] for authentication and [OutputCache] for caching.
Action Filters can also be created by the de...
Interfaces are a way to define a contract between two objects, specifying the methods and properties that one object must implement.
Interfaces allow for loose coupling between objects, making it easier to change the implementation of one object without affecting others.
They promote code reusability by allowing multiple objects to implement the same interface.
Interfaces can be used to create mock objects for testing pur...
Interfaces define contracts for behavior while abstract classes provide partial implementation.
Interfaces cannot have implementation while abstract classes can have partial implementation.
A class can implement multiple interfaces but can inherit from only one abstract class.
Interfaces are used for loose coupling while abstract classes are used for code reuse.
Example: An interface 'Drawable' can define a method 'draw' w...
Shallow copy creates a new object with same values as original, but references the same memory locations.
Shallow copy only copies the top-level object, not the nested objects.
Changes made to the original object will reflect in the copied object.
Use MemberwiseClone() method to create shallow copy of an object.
Example: int[] arr1 = {1, 2, 3}; int[] arr2 = arr1.Clone() as int[]; arr2[0] = 4; Console.WriteLine(arr1[0]); //...
Ref and out are keywords used in C# to pass arguments by reference instead of value.
Ref and out are used to pass arguments by reference instead of value
Ref keyword is used to pass a reference of the variable to the method
Out keyword is used to pass a reference of the variable to the method and requires the variable to be initialized before use
Ref keyword can be used to modify the value of the variable passed as an argu...
String is immutable while StringBuilder is mutable.
String is a final class and its value cannot be changed once created.
StringBuilder is a mutable class and its value can be changed without creating a new object.
String concatenation creates a new String object each time, while StringBuilder is more efficient for concatenation.
Use String for fixed values and StringBuilder for dynamic values.
Self Join is a way to join a table with itself using aliases.
It is useful when we need to compare records within the same table.
It requires the use of aliases to differentiate between the two instances of the same table.
Example: SELECT a.name, b.name FROM employees a, employees b WHERE a.manager_id = b.employee_id;
Delegates are a type-safe function pointer used to encapsulate a method.
Delegates allow methods to be passed as parameters to other methods.
They can be used to implement callbacks and event handlers.
Delegates can be chained together to create a pipeline of method calls.
They are commonly used in .NET framework for event handling and LINQ queries.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a table into smaller tables and defining relationships between them.
There are different levels of normalization, with each level reducing redundancy and improving data integrity further.
Normalization helps to prevent data inconsistencies and anomalies, and makes it easier to...
Overriding is when a subclass provides its own implementation of a method from the superclass, while overloading is when a class has multiple methods with the same name but different parameters.
Overriding is used to provide a specific implementation of a method in a subclass that is already defined in the superclass.
Overloading is used to define multiple methods with the same name but different parameters in a class.
Ov...
IEnumerable is in-memory collection while IQueryable is a queryable data source.
IEnumerable is used for querying data from in-memory collections like List, Array, etc.
IQueryable is used for querying data from a data source like a database.
IEnumerable executes the query on the client-side while IQueryable executes the query on the server-side.
IQueryable is more efficient when working with large datasets as it allows for...
Value types hold the data directly, while reference types hold a reference to the data.
Value types are stored on the stack, while reference types are stored on the heap.
String is a reference type in .NET.
Value types include int, float, and bool.
Reference types include arrays, classes, and interfaces.
Top trending discussions
I applied via Naukri.com and was interviewed in Nov 2019. There were 3 interview rounds.
I'm seeking new challenges and opportunities for growth that align with my career goals and aspirations.
Desire for professional growth: I'm looking to expand my skill set and take on more leadership responsibilities.
Seeking a better cultural fit: My current company has a different work culture than what I thrive in; I value collaboration and innovation.
Interest in new technologies: I'm excited about working with cuttin...
posted on 19 May 2021
I applied via Walk-in and was interviewed before May 2020. There were 3 interview rounds.
C++ is a high-level programming language used for developing system software, application software, device drivers, and video games.
C++ is an extension of the C programming language.
It supports object-oriented programming concepts like classes, inheritance, polymorphism, and encapsulation.
C++ is used in developing operating systems, browsers, databases, and other software applications.
It is known for its performance an...
A data structure that stores a sequence of elements in a linear order.
Consists of nodes that contain data and a pointer to the next node.
Can be singly linked or doubly linked.
Used for implementing stacks, queues, and hash tables.
Example: Singly linked list - 1 -> 2 -> 3 -> null
Example: Doubly linked list - null <- 1 <-> 2 <-> 3 -> null
I applied via Recruitment Consultant and was interviewed before May 2020. There were 3 interview rounds.
posted on 28 Mar 2018
I applied via Other and was interviewed in Nov 2017. There were 5 interview rounds.
As a Senior Software Engineer, I worked with various tools and technologies to develop and maintain software applications.
Developed and maintained software applications using Java, Python, and C++ programming languages
Used Agile methodology for software development and collaborated with cross-functional teams
Worked with various tools such as Git, JIRA, Jenkins, and Docker for version control, issue tracking, continuous...
posted on 3 Aug 2017
I appeared for an interview before Aug 2016.
I appeared for an interview in Nov 2016.
Developed a Btech project on automated attendance system using facial recognition.
Developed a software application to automate the attendance process in educational institutions.
Implemented facial recognition technology to identify and mark attendance of students.
Used machine learning algorithms to train the system for accurate recognition.
Integrated the application with a database to store attendance records.
Provided ...
Code Pascal's Triangle
Pascal's Triangle is a triangular array of binomial coefficients
Each number is the sum of the two numbers above it
The first and last numbers in each row are 1
Can be implemented using nested loops or recursion
Abstract functions cannot be instantiated and must be implemented by child classes, while normal functions can be directly called.
Abstract functions have no implementation in the parent class, while normal functions do.
Abstract functions are declared with the 'abstract' keyword, while normal functions are not.
Normal functions can be called directly, while abstract functions must be implemented by child classes.
An examp...
Perfectionism and public speaking anxiety
I tend to be a perfectionist, which can sometimes lead to spending too much time on a task
I struggle with public speaking anxiety, but I have been working on improving my communication skills through practice and training
Capgemini is a global leader in consulting, technology services, and digital transformation.
Capgemini has a strong reputation in the industry for delivering high-quality software solutions.
The company offers a wide range of opportunities for career growth and development.
Capgemini has a collaborative and inclusive work culture that fosters innovation and teamwork.
The company has a global presence, providing exposure to...
based on 1 interview experience
Difficulty level
Duration
based on 4 reviews
Rating in categories
Devops Engineer
55
salaries
| ₹4.5 L/yr - ₹8.9 L/yr |
Software Engineer
24
salaries
| ₹3 L/yr - ₹7.2 L/yr |
Project Manager
11
salaries
| ₹9.7 L/yr - ₹17 L/yr |
Cloud Security Engineer
9
salaries
| ₹4.5 L/yr - ₹7.5 L/yr |
SCCM System Administrator
8
salaries
| ₹9 L/yr - ₹11 L/yr |
TCS
Accenture
Wipro
Cognizant