Filter interviews by
Code to swap elements in array using Go
Create a function that takes in an array of strings and two indices to swap
Use a temporary variable to store one of the elements before swapping
Update the array with the elements swapped
Singly linked list has one pointer in each node pointing to the next node, while doubly linked list has two pointers - one pointing to the next node and one pointing to the previous node.
Singly linked list is more memory efficient as it only requires one pointer per node.
Doubly linked list allows for traversal in both directions, while singly linked list only allows traversal in one direction.
Insertions and deleti...
Polymorphism is the ability of a function or method to behave differently based on the object it is called with.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Types of polymorphism include compile-time (method overloading) and runtime (method overriding) polymorphism.
Example: Animal superclass with subclasses Dog and Cat. Both Dog and Cat can be treated as Animals.
Types of exceptions include checked and unchecked exceptions.
Checked exceptions are checked at compile time, like IOException.
Unchecked exceptions are not checked at compile time, like NullPointerException.
Keywords used in Java programming language
static keyword is used to create class-level variables and methods
finally keyword is used in exception handling to define a block of code that will always be executed
super keyword is used to refer to the superclass of the current object
Microservice architecture involves breaking down a large application into smaller, independent services. Services can communicate with each other through APIs.
Microservice architecture breaks down a large application into smaller, independent services that can be developed, deployed, and scaled independently.
Services communicate with each other through APIs, typically using HTTP/REST or messaging protocols like Ra...
Abstraction focuses on what an object does, while encapsulation focuses on how it does it.
Abstraction is the process of hiding complex implementation details and showing only the necessary information to the user.
Encapsulation is the process of wrapping data and methods into a single unit, preventing direct access to the data from outside the unit.
Abstraction is achieved through abstract classes and interfaces.
Enc...
Dependency injection is a design pattern that allows objects to be passed as dependencies rather than being created within a class.
Dependency injection promotes loose coupling and makes code more testable.
Concrete classes are tightly coupled and can be difficult to test.
Dependency injection can be achieved through constructor injection, setter injection, or interface injection.
Example: A class that requires a data...
Middleware is software that connects different applications or systems together.
Middleware acts as a bridge between different applications or systems
It provides a common platform for communication and data exchange
Examples of middleware include message queues, API gateways, and ESBs
Microservice architecture involves breaking down a large application into smaller, independent services. Services can communicate with each other through APIs.
Microservice architecture breaks down a large application into smaller, independent services that can be developed, deployed, and scaled independently.
Services communicate with each other through APIs, typically using HTTP/REST or messaging protocols like RabbitM...
Types of exceptions include checked and unchecked exceptions.
Checked exceptions are checked at compile time, like IOException.
Unchecked exceptions are not checked at compile time, like NullPointerException.
I applied via Referral and was interviewed in Sep 2023. There were 2 interview rounds.
Code to swap elements in array using Go
Create a function that takes in an array of strings and two indices to swap
Use a temporary variable to store one of the elements before swapping
Update the array with the elements swapped
I applied via Naukri.com and was interviewed in Aug 2022. There were 3 interview rounds.
Abstraction focuses on what an object does, while encapsulation focuses on how it does it.
Abstraction is the process of hiding complex implementation details and showing only the necessary information to the user.
Encapsulation is the process of wrapping data and methods into a single unit, preventing direct access to the data from outside the unit.
Abstraction is achieved through abstract classes and interfaces.
Encapsul...
I am currently working on developing a mobile application for tracking personal fitness goals.
Developing a mobile application
Tracking personal fitness goals
Implementing features like goal setting, progress tracking, and workout logging
Using technologies like React Native, Firebase, and Redux
I use a combination of debugging tools and techniques to identify and resolve issues in code.
I start by reproducing the issue and identifying the scope of the problem.
I use debugging tools like breakpoints, logging, and tracing to narrow down the issue.
I review the code and documentation to understand the expected behavior.
I collaborate with team members to get a fresh perspective and brainstorm solutions.
I test and va...
Middleware is software that connects different applications or systems together.
Middleware acts as a bridge between different applications or systems
It provides a common platform for communication and data exchange
Examples of middleware include message queues, API gateways, and ESBs
Dependency injection is a design pattern that allows objects to be passed as dependencies rather than being created within a class.
Dependency injection promotes loose coupling and makes code more testable.
Concrete classes are tightly coupled and can be difficult to test.
Dependency injection can be achieved through constructor injection, setter injection, or interface injection.
Example: A class that requires a database ...
Transient variables are not serialized, while scoped variables are.
Transient variables are not saved when an object is serialized and deserialized.
Scoped variables are saved when an object is serialized and deserialized.
Transient variables are used to indicate that a variable should not be serialized.
Scoped variables are used to indicate that a variable should be serialized.
Temp tables are physical tables created in tempdb while CTEs are temporary result sets.
Temp tables are useful for storing intermediate results and can be indexed.
CTEs are useful for simplifying complex queries and can be recursive.
Temp tables require more resources and can cause contention in tempdb.
CTEs are limited to the scope of a single query.
Example: CREATE TABLE #temp (id INT); WITH cte AS (SELECT id FROM table) ...
I applied via Referral and was interviewed in Apr 2022. There were 3 interview rounds.
Regarding previous experience
Top trending discussions
I appeared for an interview in Sep 2017.
I applied via Naukri.com and was interviewed before May 2018. There were 5 interview rounds.
I appeared for an interview in Sep 2019.
I applied via Recruitment Consultant and was interviewed before Jan 2020. There were 5 interview rounds.
I am proficient in Java, Python, and C++. I have 2 years of experience in software development. I have excellent communication skills for client interaction.
Proficient in Java, Python, and C++
2 years of software development experience
Excellent communication skills for client interaction
I applied via Walk-in and was interviewed before Jul 2021. There were 3 interview rounds.
Data structures and algorithms
Python etl,pandas, pyspark questions
I applied via first naukari and was interviewed before Oct 2020. There were 4 interview rounds.
To find the shortest path in a graph stored in SQL, use algorithms like Dijkstra's or A* with SQL queries for traversal.
Use Dijkstra's algorithm for weighted graphs to find the shortest path efficiently.
For unweighted graphs, consider using Breadth-First Search (BFS).
Store graph edges in a table with columns for source, destination, and weight.
Example SQL query: SELECT * FROM edges WHERE source = 'A' AND destination = ...
based on 2 interview experiences
Difficulty level
Duration
based on 6 reviews
Rating in categories
Technical Support Engineer
180
salaries
| ₹2.6 L/yr - ₹9 L/yr |
Senior Software Engineer
133
salaries
| ₹9 L/yr - ₹35 L/yr |
Security Analyst
122
salaries
| ₹3 L/yr - ₹8 L/yr |
Software Support Specialist
78
salaries
| ₹3.5 L/yr - ₹6.2 L/yr |
Software Engineer
67
salaries
| ₹4.5 L/yr - ₹14.8 L/yr |
ITC Infotech
CMS IT Services
KocharTech
3i Infotech