i
Cvent
Filter interviews by
Online coding
Basic questions quite easy
I was interviewed before Jan 2024.
Big data refers to large volumes of structured and unstructured data that is too complex for traditional data processing applications.
Big data involves processing and analyzing large volumes of data to uncover patterns, trends, and insights.
It can come from various sources such as social media, sensors, devices, and business transactions.
Examples of big data technologies include Hadoop, Spark, and NoSQL databases.
Big d...
I applied via Referral and was interviewed in Feb 2024. There were 2 interview rounds.
posted on 11 Dec 2023
I was interviewed in Jun 2023.
I have 5 years of experience in SQL and Node JS.
I have worked extensively with SQL databases, writing complex queries and optimizing performance.
I am proficient in using Node JS for server-side development, building RESTful APIs and handling database operations.
I have experience in integrating SQL databases with Node JS applications using libraries like Sequelize or Knex.
I have successfully delivered projects that invo...
Indexes in SQL are data structures that improve the speed of data retrieval operations on database tables.
Indexes are created on one or more columns of a table to allow faster searching and sorting of data.
They work similar to the index of a book, allowing the database engine to quickly locate the data.
Indexes can be created on primary keys, foreign keys, or any other frequently searched columns.
They reduce the amount ...
Normalization is a process in DBMS that eliminates data redundancy and ensures data integrity.
Normalization is used to organize data in a database efficiently.
There are different normal forms, such as 1NF, 2NF, 3NF, BCNF, and 4NF.
Each normal form has specific rules and dependencies to achieve data normalization.
Normalization helps in reducing data duplication, improving data consistency, and simplifying database mainte...
Views in mySQL are virtual tables that are based on the result of a query. They can be used to simplify complex queries and provide a layer of abstraction.
Views are created using the CREATE VIEW statement.
They are stored in the database and can be accessed like regular tables.
Views can be used to hide complexity by encapsulating complex queries into a single view.
They can also be used to restrict access to certain colu...
Stored Procedures are precompiled database objects that contain a set of SQL statements and can be executed with a single call.
Stored Procedures are used to encapsulate and execute frequently used SQL statements.
They improve performance by reducing network traffic and optimizing query execution.
They can accept input parameters and return output values.
Stored Procedures can be used for data manipulation, data retrieval,...
Internet of Things (IoT) refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity.
IoT enables devices to collect and exchange data over the internet.
It allows for remote monitoring and control of devices and systems.
IoT has applications in various industries such as healthcare, transportation, agriculture, and smart homes.
Examples of IoT device...
JWT stands for JSON Web Token. It is a compact, URL-safe means of representing claims between two parties.
JWT is used for authentication and authorization purposes in web applications.
It consists of three parts: header, payload, and signature.
The header contains the algorithm used to sign the token.
The payload contains the claims or information about the user.
The signature is used to verify the integrity of the token.
J...
Webtokens and APIs are both used in web development, but they serve different purposes.
Webtokens are used for authentication and authorization, providing a secure way to transmit user information between client and server.
APIs (Application Programming Interfaces) are sets of rules and protocols that allow different software applications to communicate and interact with each other.
Webtokens are often used within APIs to...
oAuth is an open standard for authorization. In my project, I used the oAuth 2.0 protocol for authentication and authorization.
oAuth is a protocol that allows users to grant limited access to their resources on one website to another website without sharing their credentials.
It provides a secure way for users to authenticate and authorize third-party applications to access their data.
oAuth 2.0 is the most widely used v...
Further optimization of normalized data can be achieved through indexing, denormalization, and caching.
Create appropriate indexes on frequently queried columns to improve query performance.
Consider denormalizing the data by combining related tables to reduce the number of joins required.
Implement caching mechanisms to store frequently accessed data in memory for faster retrieval.
Use materialized views or summary tables...
Indexing in a database improves query performance by creating a data structure that allows for faster data retrieval.
Indexing involves creating an index on one or more columns of a database table.
The column used for indexing should be chosen based on the frequency of data retrieval and the cardinality of the column.
Columns with high selectivity and frequent data retrieval are good candidates for indexing.
Examples of co...
I was interviewed in Oct 2023.
Questions were based on C pointers
The Tower of Hanoi is a classic problem that involves moving disks from one peg to another, following specific rules.
Start by moving the top n-1 disks from the source peg to the auxiliary peg.
Move the largest disk from the source peg to the target peg.
Move the n-1 disks from the auxiliary peg to the target peg.
Repeat the process recursively for the n-1 disks on the auxiliary peg.
Continue until all disks are moved to th
I applied via Job Fair
I attended through campus placement.they gave a general topic and ask us to speak
A variable is a storage location in a computer program that holds data and can be referenced and manipulated.
Variables are used to store data in a program and can be of different types such as integers, strings, or arrays.
In HTML, variables are not directly used, but data can be stored in attributes or elements for manipulation.
Coding in an array involves storing multiple values in a single variable, accessed by index
posted on 15 Jun 2021
I applied via Referral and was interviewed in Mar 2022. There were 2 interview rounds.
based on 7 reviews
Rating in categories
Assistant Team Leader
164
salaries
| ₹6 L/yr - ₹23.3 L/yr |
Product Consultant
162
salaries
| ₹4.5 L/yr - ₹9.6 L/yr |
Senior Software Engineer
145
salaries
| ₹14 L/yr - ₹42 L/yr |
Senior Associate
94
salaries
| ₹5 L/yr - ₹14 L/yr |
Team Lead
92
salaries
| ₹8.4 L/yr - ₹24 L/yr |
Salesforce
Adobe
Oracle
SAP