Filter interviews by
I applied via Company Website and was interviewed before Nov 2021. There were 3 interview rounds.
General questions easy to solve it
Top trending discussions
React is a JavaScript library for building user interfaces.
React is used for creating reusable UI components.
It uses a virtual DOM for efficient rendering.
React allows for declarative programming.
It was developed by Facebook and is open source.
React Native is a framework for building mobile apps using React.
Hooks are a feature in React that allow you to use state and other React features in functional components. Redux is a state management library for JavaScript applications.
Hooks are functions that let you use React state and lifecycle features in functional components.
Hooks provide a way to reuse stateful logic between components.
Redux is a predictable state container for JavaScript apps.
Redux helps manage the state of...
Class components are ES6 classes that extend the React.Component class, while functional components are just plain JavaScript functions.
Class components are more feature-rich and have access to lifecycle methods.
Functional components are simpler and easier to read and test.
Class components can have state and use lifecycle methods like componentDidMount and componentDidUpdate.
Functional components are stateless and do n...
ES5 is the older version of JavaScript, while ES6 is the newer version with added features and syntax improvements.
ES6 introduced let and const for variable declaration.
ES6 introduced arrow functions for shorter syntax.
ES6 introduced classes for object-oriented programming.
ES6 introduced template literals for easier string interpolation.
ES6 introduced destructuring assignment for extracting values from objects and arra...
I applied via Referral and was interviewed in Apr 2021. There were 4 interview rounds.
Authentication in .NET involves using various authentication mechanisms such as Forms Authentication, Windows Authentication, and OAuth.
Use Forms Authentication for web applications
Use Windows Authentication for intranet applications
Use OAuth for third-party authentication
Implement authentication using ASP.NET Identity
Use secure password storage mechanisms such as hashing and salting
Dependency injection is a design pattern where an object's dependencies are provided externally rather than created internally.
Dependency injection helps to decouple components and make them more modular.
It allows for easier testing and maintenance of code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database connection ob...
A pipe is a feature in Angular that allows you to transform data before displaying it.
Pipes are used in Angular templates with the '|' symbol.
There are built-in pipes like 'uppercase' and 'date'.
Custom pipes can be created using the 'Pipe' decorator and implementing the 'PipeTransform' interface.
Custom pipes can take arguments to modify their behavior.
Pipes can be chained together to perform multiple transformations on
Middleware is software that acts as a bridge between different applications, allowing them to communicate and exchange data.
Middleware is a layer of software that sits between applications and operating systems
It provides services such as message routing, authentication, and data transformation
Examples include Apache Tomcat, Microsoft IIS, and IBM WebSphere
No, assigning null to an array makes it empty and its length becomes 0.
Assigning null to an array makes it empty.
The length of an empty array is 0.
Trying to access length property of null will result in an error.
Null value in JavaScript represents absence of any object value.
Null is a primitive value in JavaScript.
It is assigned to a variable to indicate that it has no value.
It is different from undefined, which means a variable has been declared but not assigned a value.
Null is falsy in JavaScript, meaning it is considered false in a boolean context.
Null can be used to clear the value of an object property.
posted on 19 Nov 2020
I applied via Referral and was interviewed in Oct 2020. There were 5 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
IDisposable is an interface used to release unmanaged resources.
It is used to release unmanaged resources like file handles, database connections, etc.
It has a single method called Dispose() which is used to release the resources.
It is implemented by classes that use unmanaged resources and needs to be disposed of.
Example: SqlConnection class implements IDisposable to release the database connection.
Example: FileStream...
Dependency Injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
Dependency Injection is used to reduce tight coupling between software components.
It allows for easier testing and maintenance of code.
There are three types of Dependency Injection: Constructor Injection, Setter Injection, and Interface Injection.
Frameworks like Spring and Angular provide built-in s
Concatenate the values in the given integer array with comma.
Convert the integer array to string array using Arrays.toString()
Use String.join() method to concatenate with comma
Interfaces and abstract classes are used for abstraction and defining contracts.
Interfaces are a collection of abstract methods that define a contract for a class to implement.
Abstract classes are classes that cannot be instantiated and can have both abstract and concrete methods.
Interfaces can be implemented by multiple classes, while a class can only inherit from one abstract class.
Interfaces are used for loose coupl...
No, abstract classes cannot be instantiated.
Abstract classes are incomplete and cannot be instantiated on their own.
They can only be used as a base class for other classes.
Instantiation of an abstract class will result in a compile-time error.
However, concrete classes that inherit from the abstract class can be instantiated.
SOLID is a set of principles for object-oriented programming to make software more maintainable and scalable.
S - Single Responsibility Principle
O - Open/Closed Principle
L - Liskov Substitution Principle
I - Interface Segregation Principle
D - Dependency Inversion Principle
Example: Using Single Responsibility Principle to separate UI and business logic
Example: Using Open/Closed Principle to extend functionality without mo
We used the Model-View-Controller (MVC) design pattern in our application.
MVC separates the application into three interconnected components: the model, the view, and the controller.
The model represents the data and business logic of the application.
The view displays the data to the user.
The controller handles user input and updates the model and view accordingly.
MVC promotes separation of concerns and modularity.
Examp...
I applied via Naukri.com and was interviewed in Feb 2021. There were 3 interview rounds.
WVD with Citrix provides enhanced security, scalability, and flexibility for virtual desktop infrastructure.
Improved user experience with Citrix HDX technology
Centralized management and monitoring with Citrix Virtual Apps and Desktops
Enhanced security with Citrix ADC and NetScaler Gateway
Scalability and flexibility with Citrix Cloud services
Ability to leverage existing Citrix investments
Reduced infrastructure costs and
posted on 22 Nov 2020
posted on 22 Dec 2020
I applied via Naukri.com and was interviewed in Nov 2020. There were 3 interview rounds.
based on 5 reviews
Rating in categories
Relationship Manager
5
salaries
| ₹2.2 L/yr - ₹6 L/yr |
Customer Relationship Officer
5
salaries
| ₹2.5 L/yr - ₹3 L/yr |
Assistant Manager
4
salaries
| ₹2.5 L/yr - ₹4 L/yr |
Branch Manager
4
salaries
| ₹7.2 L/yr - ₹14 L/yr |
Deputy Manager
3
salaries
| ₹4.3 L/yr - ₹8.5 L/yr |
Cognizant
NTT Data Information Processing Services
Sutherland Global Services
Hexaware Technologies