Filter interviews by
I applied via Naukri.com and was interviewed in May 2021. There were 3 interview rounds.
Query to find second highest marks of a student
Sort the marks in descending order
Select the second highest mark
Join with student table to get student details
Joins in SQL are used to combine data from two or more tables based on a related column.
Joins are used to retrieve data from multiple tables.
There are different types of joins such as inner join, left join, right join, and full outer join.
The join condition is specified using the ON keyword.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;
No, static methods cannot be overridden but can be overloaded.
Static methods belong to the class and not to the instance of the class.
Overriding is not possible as it requires inheritance and static methods cannot be inherited.
Overloading is possible as it allows multiple methods with the same name but different parameters.
Example: public static void method() and public static void method(int a)
Top trending discussions
I applied via Referral and was interviewed in Dec 2024. There were 4 interview rounds.
I was interviewed in Jan 2025.
The Java Virtual Machine (JVM) is an abstract computing machine that enables a computer to run Java programs.
JVM is platform-independent and converts Java bytecode into machine code.
It consists of class loader, runtime data areas, execution engine, and native method interface.
JVM memory is divided into method area, heap, stack, and PC register.
Examples of JVM implementations include Oracle HotSpot, OpenJ9, and GraalVM.
The default connection pooling in Spring Boot is HikariCP, which can be customized through properties in the application.properties file.
HikariCP is the default connection pooling library in Spring Boot, known for its high performance and low overhead.
To customize the connection pooling, you can modify properties like 'spring.datasource.hikari.*' in the application.properties file.
For example, you can set maximum pool ...
Best practices for optimizing a Spring Boot application
Use Spring Boot Actuator to monitor and manage application performance
Implement caching mechanisms like Spring Cache to reduce database calls
Optimize database queries and indexes for better performance
Use asynchronous processing with Spring's @Async annotation for non-blocking operations
Profile and analyze application performance using tools like VisualVM or JProfi
A heap dump is a snapshot of the memory usage of a Java application at a specific point in time.
Heap dumps can be generated using tools like jmap or VisualVM.
They provide detailed information about objects in memory, their sizes, and references.
Analyzing a heap dump can help identify memory leaks by pinpointing objects that are consuming excessive memory.
Common signs of memory leaks in a heap dump include a large numbe...
Diagonally iterate through and print elements of a 2D array of strings.
Use nested loops to iterate through rows and columns of the 2D array.
Calculate the diagonal elements by incrementing row and column indices together.
Print the elements as you iterate through the diagonal of the array.
I was interviewed in Nov 2024.
Here’s a simple framework to approach a case study effectively:
---
Case Study Framework
1. Understand the Problem
Read the case thoroughly and identify the key issue.
Ask clarifying questions if needed (if in a live setting).
Summarize the problem in your own words.
2. Analyze the Situation
SWOT Analysis (Strengths, Weaknesses, Opportunities, Threats)
Identify relevant stakeholders.
Gather data or key insights from the case text.
3. Identify Alternatives
Brainstorm possible solutions to the problem.
Consider multiple approaches (e.g., short-term vs. long-term solutions).
4. Evaluate the Alternatives
Weigh the pros and cons of each solution.
Assess feasibility, costs,
Common performance issues in a system include slow response times, high resource usage, bottlenecks, and crashes.
Slow response times can be caused by inefficient code, network latency, or overloaded servers.
High resource usage can lead to system slowdowns and crashes, often caused by memory leaks or inefficient algorithms.
Bottlenecks occur when a component of the system becomes a limiting factor, such as a database ser...
I have experience in identifying and resolving software bugs through thorough testing and collaboration with developers.
Identifying bugs by reproducing issues reported by users
Collaborating with developers to understand root cause of bugs
Testing bug fixes to ensure they are effective
Utilizing bug tracking tools like Jira or Bugzilla
Experience with regression testing to prevent reoccurrence of bugs
Shortcut Tips for Coding Tests: 1. Master the Basics: Familiarize yourself with arrays, strings, loops, and conditional statements. 2. Learn Patterns: Concentrate on sliding window, two-pointer techniques, recursion, and divide-and-conquer methods. 3. Use Standard Algorithms: Study breadth-first search (BFS), depth-first search (DFS), sorting algorithms, and dynamic programming principles. 4. Understand Data Structures: Practice with stacks, queues, linked lists, and trees. 5. Practice Edge Cases: Consider scenarios involving empty inputs, duplicates, and large datasets. 6. Write Pseudocode: Outline your plan before starting to code. 7. Optimize Early: Always strive for efficiency in your solutions.
posted on 3 Dec 2024
I applied via Walk-in
They gave 100 aptitude questions like distance,time,logical reasoning , puzzle, etc.. to solve within 1 hour but 40 marks is pass mark.
The question is asking for a program to calculate the sum of digits in a given number.
Create a function that takes in a number as input
Convert the number to a string to iterate through each digit
Sum up all the digits and return the total
I applied via LinkedIn and was interviewed in Dec 2024. There were 2 interview rounds.
Basic Hacker Rank SQL Questions 2 . and 10 MCQ based
The query selects all columns and calculates the total amount for each customer in table t2.
The query uses a window function to calculate the sum of 'amt' for each customer in the 't2' table.
The 'partition by customer' clause divides the result set into partitions based on the 'customer' column.
The 'select *' statement selects all columns from the table along with the calculated total amount.
The 'sum(amt) over (partiti...
To find customers who purchased the same item multiple times on the same day.
Identify unique customers who purchased the same item multiple times on the same day
Check for duplicate transactions by customer and item on the same day
Aggregate the data to count the number of customers who made multiple purchases of the same item on the same day
IT hardware refers to physical components of a computer system, such as the motherboard, CPU, RAM, and hard drive.
IT hardware includes components like motherboards, CPUs, RAM, and hard drives.
It also encompasses peripherals like monitors, keyboards, and printers.
Understanding IT hardware is essential for troubleshooting and maintaining computer systems.
Examples of IT hardware brands include Intel, AMD, Samsung, and Wes
Material management involves planning, organizing, and controlling the flow of materials from acquisition to consumption.
Involves procurement, storage, and distribution of materials
Focuses on optimizing inventory levels to meet demand
Includes forecasting, inventory control, and supplier management
Ensures efficient use of resources and cost-effective operations
IT hardware refers to physical components of a computer system, such as the motherboard, CPU, RAM, and hard drive.
IT hardware includes components like motherboards, CPUs, RAM, hard drives, and graphics cards.
Understanding IT hardware is essential for troubleshooting computer issues and upgrading systems.
Examples of IT hardware brands include Intel, AMD, NVIDIA, and Western Digital.
Material management involves planning, organizing, and controlling the flow of materials from acquisition to use or disposal.
Involves procurement, storage, and distribution of materials
Ensures efficient use of resources and cost-effective operations
Includes inventory management and supply chain optimization
Focuses on reducing waste and improving productivity
Examples: Just-in-time inventory system, ABC analysis for inve
I applied via LinkedIn and was interviewed in Sep 2024. There were 5 interview rounds.
Aptitude and Logical Reasoning
Listen to their concerns, empathize with them, offer solutions, and follow up to ensure satisfaction.
Listen actively to their concerns without interrupting.
Empathize with their situation and show understanding.
Offer solutions or alternatives to address their issues.
Follow up with the customer to ensure their satisfaction and resolve any remaining concerns.
Apologize for any inconvenience caused and take responsibility f...
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
posted on 16 Dec 2024
I applied via Referral and was interviewed in Jun 2024. There were 3 interview rounds.
I have handled high and critical alerts related to malware infections, data breaches, and phishing attacks.
Identifying the source and scope of the alert
Isolating affected systems to prevent further damage
Implementing security patches and updates
Conducting forensic analysis to determine the extent of the breach
Collaborating with IT teams to strengthen security measures
SIEM tool architecture includes data collection, normalization, correlation, and reporting components.
Data collection: Gathers security data from various sources like logs, network traffic, and endpoints.
Normalization: Standardizes the collected data into a common format for analysis.
Correlation: Identifies patterns and relationships in the data to detect security incidents.
Reporting: Generates reports and alerts based...
based on 18 reviews
Rating in categories
Data Scientist
8
salaries
| ₹5 L/yr - ₹10.6 L/yr |
Jr. Data Scientist
8
salaries
| ₹5.3 L/yr - ₹14.9 L/yr |
Data Analyst
6
salaries
| ₹5.5 L/yr - ₹10 L/yr |
Analyst
5
salaries
| ₹5 L/yr - ₹6 L/yr |
Consultant
5
salaries
| ₹14 L/yr - ₹17 L/yr |
Fractal Analytics
Mu Sigma
Tiger Analytics
LatentView Analytics