Filter interviews by
To delete an activity, you can typically use a delete button or option within the application.
Locate the activity you want to delete within the application.
Look for a delete button or option next to the activity.
Confirm the deletion when prompted.
The activity should now be removed from the application.
Caching is the process of storing data in a temporary location to reduce load times and improve performance.
Use caching libraries like Redis or Memcached
Identify which data needs to be cached based on frequency of use
Set expiration times for cached data to ensure freshness
Implement caching strategies like lazy loading or write-through
Monitor cache performance and adjust as needed
SQL operations are actions performed on a database using SQL commands to retrieve, update, insert, or delete data.
SQL operations include SELECT (retrieve data), INSERT (add new data), UPDATE (modify existing data), DELETE (remove data)
SQL operations can also include creating and modifying database tables, indexes, and views
Examples: SELECT * FROM table_name, INSERT INTO table_name (column1, column2) VALUES (value1...
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization is used to eliminate data redundancy by breaking up tables into smaller, related tables.
It helps in reducing data anomalies such as insertion, update, and deletion anomalies.
Normalization is achieved through a series of normal forms (1NF, 2NF, 3NF, BCNF, etc.).
Example: A database table that s...
Ranking in SQL is a way to assign a rank to each row in a result set based on a specified criteria.
Ranking functions include RANK(), DENSE_RANK(), and ROW_NUMBER().
RANK() assigns a unique rank to each distinct row, with gaps in the ranking if there are ties.
DENSE_RANK() assigns a unique rank to each distinct row, with no gaps in the ranking if there are ties.
ROW_NUMBER() assigns a unique sequential integer to each...
To reduce redundancy, implement data normalization, use modular design, automate repetitive tasks, and utilize version control systems.
Implement data normalization to eliminate duplicate data entries.
Use modular design to create reusable components and avoid repeating code.
Automate repetitive tasks using scripts or tools to save time and reduce errors.
Utilize version control systems like Git to track changes and a...
Data is temporarily stored in memory during program execution.
Data is stored in memory to be accessed quickly by the CPU.
Memory is volatile, meaning data is lost when the power is turned off.
Examples include variables, arrays, and objects stored in RAM.
I applied via Job Portal and was interviewed in Sep 2023. There were 3 interview rounds.
SQL operations are actions performed on a database using SQL commands to retrieve, update, insert, or delete data.
SQL operations include SELECT (retrieve data), INSERT (add new data), UPDATE (modify existing data), DELETE (remove data)
SQL operations can also include creating and modifying database tables, indexes, and views
Examples: SELECT * FROM table_name, INSERT INTO table_name (column1, column2) VALUES (value1, val...
Ranking in SQL is a way to assign a rank to each row in a result set based on a specified criteria.
Ranking functions include RANK(), DENSE_RANK(), and ROW_NUMBER().
RANK() assigns a unique rank to each distinct row, with gaps in the ranking if there are ties.
DENSE_RANK() assigns a unique rank to each distinct row, with no gaps in the ranking if there are ties.
ROW_NUMBER() assigns a unique sequential integer to each row ...
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization is used to eliminate data redundancy by breaking up tables into smaller, related tables.
It helps in reducing data anomalies such as insertion, update, and deletion anomalies.
Normalization is achieved through a series of normal forms (1NF, 2NF, 3NF, BCNF, etc.).
Example: A database table that stores...
To reduce redundancy, implement data normalization, use modular design, automate repetitive tasks, and utilize version control systems.
Implement data normalization to eliminate duplicate data entries.
Use modular design to create reusable components and avoid repeating code.
Automate repetitive tasks using scripts or tools to save time and reduce errors.
Utilize version control systems like Git to track changes and avoid ...
Caching is the process of storing data in a temporary location to reduce load times and improve performance.
Use caching libraries like Redis or Memcached
Identify which data needs to be cached based on frequency of use
Set expiration times for cached data to ensure freshness
Implement caching strategies like lazy loading or write-through
Monitor cache performance and adjust as needed
Data is temporarily stored in memory during program execution.
Data is stored in memory to be accessed quickly by the CPU.
Memory is volatile, meaning data is lost when the power is turned off.
Examples include variables, arrays, and objects stored in RAM.
To delete an activity, you can typically use a delete button or option within the application.
Locate the activity you want to delete within the application.
Look for a delete button or option next to the activity.
Confirm the deletion when prompted.
The activity should now be removed from the application.
Top trending discussions
posted on 20 May 2021
I applied via Referral and was interviewed in Nov 2020. There were 4 interview rounds.
I applied via Walk-in and was interviewed before Mar 2021. There were 3 interview rounds.
Aptitude test
Current affairs
posted on 12 Mar 2022
I applied via Job Fair and was interviewed before Mar 2021. There were 3 interview rounds.
In this round, we have questions from time relation, blood relation, programming questions. Around 45 questions in 30 minutes,
In this round, we have two programming questions. Both are hacker rank easy to medium level.
posted on 13 Oct 2022
I applied via Campus Placement and was interviewed in Sep 2022. There were 3 interview rounds.
3 basic coding question about recursion, string manipulation and queues
posted on 31 Jan 2024
posted on 28 Feb 2024
The first round was an aptitude test. There were 30 questions with 1 marks for each.
After being selected from the first round the second round was the Coding test there were 6 sets and 1 set had 3 questions. they told me to do it in an online compiler without an internet connection.
posted on 8 Mar 2024
I applied via Campus Placement and was interviewed in Feb 2024. There were 4 interview rounds.
30min Pseudo Code,Ratio and Proportion
1 hour Array,HashMap
Program to check if a string is an Anagram or not
Create a function that takes in two strings as input
Sort the characters in both strings and compare if they are equal
Return true if they are anagrams, false otherwise
To connect MongoDB with a database, you need to use the MongoDB URI and a MongoDB client library.
Use the MongoDB URI to specify the connection details such as host, port, username, password, and database name
Install a MongoDB client library like Mongoose for Node.js or pymongo for Python
Use the client library to establish a connection to the MongoDB database and perform CRUD operations
An event listener is a function that waits for a specific event to occur and then triggers a response.
Event listeners are commonly used in web development to handle user interactions like clicks, keypresses, etc.
They are attached to specific elements and listen for events to occur on those elements.
Once the event occurs, the listener executes a callback function to respond to the event.
Example: Adding a click event lis...
Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example: Inheritance in object-oriented programming languages like Java allows for polymorphism.
Use two pointers to swap characters in place
Initialize two pointers, one at the beginning of the string and one at the end
Swap characters at the two pointers and move them towards each other until they meet or cross
Repeat the process until the entire string is reversed
Use bitwise XOR operation to find the missing number in O(N) time complexity.
Iterate through the array and XOR all the elements with their indices and the array length.
The missing number will be the result of XORing all the elements with their indices and the array length.
posted on 9 Jun 2024
Practice atleast 20 questions for every topic.
posted on 9 May 2025
I appeared for an interview before May 2024, where I was asked the following questions.
I have worked on various software projects, including web applications, mobile apps, and backend systems using diverse technologies.
E-commerce Platform: Developed a full-stack e-commerce application using Java Spring Boot for the backend and React for the frontend, implementing features like user authentication and payment processing.
Mobile App Development: Created a cross-platform mobile application using Flutter that...
based on 1 interview experience
Difficulty level
Duration
Consultant
9
salaries
| ₹3.7 L/yr - ₹13.4 L/yr |
Junior Consultant
5
salaries
| ₹3.5 L/yr - ₹5.5 L/yr |
Project Manager
4
salaries
| ₹14 L/yr - ₹20 L/yr |
Servicenow Developer
4
salaries
| ₹5.5 L/yr - ₹7.5 L/yr |
Technical Account Manager
3
salaries
| ₹23.5 L/yr - ₹23.5 L/yr |
Medcode
Cyfuture
Maxgen Technologies
JoulestoWatts Business Solutions