i
Codiant Software Technologies
Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2024. There were 3 interview rounds.
About your technologies based questions
Crud operation based on mern
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Closure is a function that has access to its own scope, as well as the scope of its outer function.
Closure allows a function to access variables from its outer function even after the outer function has finished executing.
It helps in maintaining state in functional programming.
Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }
CodePush is a cloud service that enables React Native developers to deploy updates to their apps instantly without going through the app store review process.
CodePush allows developers to push updates to their React Native apps directly to users' devices, bypassing the app store.
Developers can push bug fixes, new features, and other updates without requiring users to download a new version of the app.
CodePush supports ...
Codiant Software Technologies interview questions for popular designations
I applied via Approached by Company and was interviewed before Aug 2022. There were 3 interview rounds.
Documents are written, printed, or electronic materials that provide information or evidence.
Documents can be classified into various types such as legal documents, financial documents, technical documents, and business documents.
Legal documents include contracts, agreements, and court filings.
Financial documents include invoices, receipts, and financial reports.
Technical documents include manuals, specifications, and ...
Scope creep refers to the gradual expansion of a project's goals, requirements, and deliverables without proper authorization.
Scope creep can lead to project delays, increased costs, and decreased quality.
It often occurs when stakeholders request additional features or changes that were not originally planned.
Effective project management techniques, such as regular communication and scope validation, can help prevent s...
Stakeholders are individuals or groups who have an interest in the project or organization and can influence or be influenced by its outcomes.
Stakeholders can include employees, customers, suppliers, investors, government agencies, and the community.
Their functions may involve providing resources, making decisions, offering feedback, or advocating for their interests.
Effective stakeholder management is crucial for proj...
I applied via LinkedIn and was interviewed before Aug 2023. There were 2 interview rounds.
Asked to develop a demo application
I applied via Company Website and was interviewed before May 2023. There was 1 interview round.
I applied via LinkedIn and was interviewed before May 2022. There were 2 interview rounds.
Integrate dummy Api and list data with search and pagination
posted on 29 Jun 2024
I applied via Referral and was interviewed before Jun 2023. There were 3 interview rounds.
Coding test are just basic Array and linkedList question
The 4 pillars of OOP are Inheritance, Encapsulation, Abstraction, and Polymorphism.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation restricts access to certain components of an object, protecting its integrity.
Abstraction hides complex implementation details and only shows the necessary features.
Polymorphism allows objects of different classes to be treated as objects of a
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
Retrieving a value involves hashing the ...
Implementation of Create, Read, Update, and Delete operations in a software system.
Use SQL queries for database operations
Create separate functions for each operation
Handle errors and exceptions properly
Test thoroughly to ensure functionality
Consider security measures to prevent unauthorized access
Seeking new challenges and opportunities for growth.
Looking for a new environment to learn and develop new skills
Interested in working on different projects and technologies
Seeking better career advancement opportunities
Wanting to work in a more collaborative team environment
The question is asking for the current time and the angles formed by the hour and minute hands on a clock.
The angle between the hour and minute hands of a clock can be calculated using the formula: angle = |(30*hour - (11/2)*minutes)|
At 3:00, the angle between the hour and minute hands is 90 degrees.
At 6:00, the angle between the hour and minute hands is 180 degrees.
At 9:00, the angle between the hour and minute hands
based on 9 interviews
Interview experience
based on 69 reviews
Rating in categories
Software Engineer
59
salaries
| ₹2 L/yr - ₹8 L/yr |
Business Analyst
29
salaries
| ₹2 L/yr - ₹6 L/yr |
Senior Software Engineer
22
salaries
| ₹6.2 L/yr - ₹15 L/yr |
Software Developer
21
salaries
| ₹2.2 L/yr - ₹6.3 L/yr |
IOS Developer
20
salaries
| ₹2.2 L/yr - ₹7 L/yr |
Saama Technologies
Jumio
DISYS
Data-Core Systems