i
Easiloan Techno Solutions
Filter interviews by
Yes, the project directory in Django follows a specific structure.
The main project directory contains settings.py, urls.py, and wsgi.py files.
Each app within the project has its own directory with models.py, views.py, and urls.py files.
Static files are stored in a 'static' directory within each app.
Templates are stored in a 'templates' directory within each app.
Media files are stored in a 'media' directory within the p
CRUD stands for Create, Read, Update, and Delete. It refers to the basic operations performed on data in a database.
CRUD is a fundamental concept in database management.
Create refers to adding new data to the database.
Read refers to retrieving data from the database.
Update refers to modifying existing data in the database.
Delete refers to removing data from the database.
CRUD is used in many software applications, inclu
Top trending discussions
React is a modern JavaScript library for building user interfaces, while jQuery is a fast and concise JavaScript library for DOM manipulation.
React is component-based, promoting reusability and modularity.
React uses a virtual DOM for efficient updates, while jQuery directly manipulates the DOM.
React is declarative, making it easier to reason about the UI, while jQuery is imperative.
React is typically used for single-pa...
I applied via Referral and was interviewed in Jul 2024. There were 3 interview rounds.
3 dsa questions medium level
posted on 14 Apr 2024
I applied via Naukri.com and was interviewed in Mar 2024. There were 3 interview rounds.
Technical Aptitude on singalton pattern
A man-in-the-middle attack is a cyber security attack where the attacker secretly intercepts and possibly alters the communication between two parties.
Attacker intercepts communication between two parties
Attacker may alter the communication
Commonly occurs in public Wi-Fi networks
Can lead to data theft or unauthorized access
Protecting API involves using authentication, authorization, encryption, rate limiting, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys
Use authorization to control access to different parts of the API
Encrypt sensitive data using SSL/TLS
Implement rate limiting to prevent abuse and protect against DDoS attacks
Monitor API traffic for unusual activity and potential security threats
CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing actions on another website without their knowledge.
CSRF attacks exploit the trust that a site has in a user's browser, by sending unauthorized requests using the user's session.
Prevent CSRF attacks by using tokens in forms, checking the origin of requests, and implementing proper authentication and autho...
posted on 13 Nov 2024
I applied via Naukri.com and was interviewed before Nov 2023. There were 3 interview rounds.
2Sum problem involves finding two numbers in an array that add up to a specific target.
Use a hashmap to store the difference between the target and each element in the array.
Iterate through the array and check if the current element's complement exists in the hashmap.
Return the indices of the two numbers that add up to the target.
Spiral traversal of a Binary tree involves visiting nodes level by level alternating between left to right and right to left.
Start by pushing the root node into a queue.
While the queue is not empty, pop a node, print its value, and push its children into the queue.
Alternate between popping nodes from the queue and printing their values in a spiral manner.
The aggressive cows problem involves finding the maximum distance between cows in a field while ensuring they are not too close to each other.
Use binary search to find the maximum distance between cows.
Sort the cows' positions and check if a certain distance is feasible.
Consider the constraints of the problem such as the number of cows and the size of the field.
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
LRU cache is a data structure that maintains the least recently used items in memory for efficient access.
Use a combination of a doubly linked list and a hashmap to store and access the cache items.
When a new item is accessed, move it to the front of the linked list to mark it as the most recently used.
If the cache is full, remove the least recently used item from the end of the linked list and the hashmap.
Coding and aptitude round
posted on 15 May 2024
I applied via LinkedIn and was interviewed in Apr 2024. There was 1 interview round.
HashMap is implemented using an array of linked lists to handle collisions.
HashMap stores key-value pairs in an array of linked lists
Hash function is used to determine the index of the array where the key-value pair will be stored
Collision handling is done by chaining, where multiple key-value pairs with the same hash value are stored in the same linked list
HashMap allows null keys and values
HashMap is not synchronized...
I applied via Referral and was interviewed before May 2023. There were 4 interview rounds.
posted on 9 Feb 2023
JMeter is a load testing tool used to measure the performance of web applications.
JMeter can simulate heavy loads on a server, allowing testers to identify performance bottlenecks.
It can be used to test the performance of web applications, FTP servers, databases, and more.
JMeter can generate reports and graphs to help analyze test results.
It supports various protocols including HTTP, FTP, JDBC, SOAP, and more.
JMeter ca...
Defect life cycle is the process of identifying, reporting, prioritizing, fixing, and verifying defects in software.
Defect is identified by testers during testing or reported by users
Defect is logged in a defect tracking tool with details like severity, priority, etc.
Defect is assigned to a developer for fixing
Developer fixes the defect and marks it as resolved
Tester verifies the fix and either closes the defect or reo...
Integration of Excel in JMeter can be done using the Apache POI library.
Download and add the Apache POI library to JMeter's classpath.
Create a Test Plan and add a Thread Group.
Add a Sampler and choose the appropriate request type.
Add a Listener and choose the appropriate output format.
Use the POI classes to read or write data to Excel files.
Use JMeter variables to pass data between requests.
Xpath locator is a way to locate elements in HTML/XML documents using path expressions.
Xpath is a language used to navigate through elements and attributes in an XML document
It uses path expressions to select nodes or sets of nodes in an XML document
Xpath locators can be used in automated testing to locate elements on a web page
Example: //input[@id='username'] selects the input element with id='username'
To generate 5000 data in Excel and import in Jmeter, then fetch the data from excel and apply in post Api's request body.
Postman is a tool for testing APIs. An API is a set of protocols that allows communication between different software applications.
Postman allows developers to test APIs by sending requests and receiving responses.
API stands for Application Programming Interface and is a set of rules that allows different software applications to communicate with each other.
APIs can be used to retrieve data from a server, update data o...
No, different methods are required for different operations in API.
Different methods are required for different HTTP verbs like GET, POST, PUT, DELETE.
Methods should be designed to perform specific actions like fetching data, updating data, etc.
Using a single method for all operations can lead to confusion and errors.
For example, using GET method for updating data can cause security issues.
UI automation can be done using tools like Selenium, Appium, and TestComplete.
Identify the elements to be automated
Choose the appropriate tool for the technology stack
Write test scripts using the tool's API
Execute the scripts and analyze the results
Maintain the scripts as the UI changes
Database testing is the process of verifying the data stored in the database and ensuring its accuracy, completeness, and security.
It involves testing the database schema, data integrity, data validation, and performance.
Testers use SQL queries to retrieve and manipulate data for testing purposes.
Database testing can be automated using tools like Selenium, JMeter, and TestComplete.
Examples of database testing include t...
Security testing is the process of identifying vulnerabilities and weaknesses in a software system to prevent unauthorized access.
It involves testing the system for confidentiality, integrity, authentication, authorization, and availability.
Common security testing techniques include penetration testing, vulnerability scanning, and risk assessment.
Examples of security testing tools include Burp Suite, OWASP ZAP, and Nes...
Relationship Manager
4
salaries
| ₹3.6 L/yr - ₹5 L/yr |
Cluster Manager
4
salaries
| ₹7 L/yr - ₹10 L/yr |
React Developer
4
salaries
| ₹4 L/yr - ₹5 L/yr |
Software Development Engineer
3
salaries
| ₹4.5 L/yr - ₹4.9 L/yr |
Business Development Manager
3
salaries
| ₹6.7 L/yr - ₹12.1 L/yr |
Bajaj Finance
HDFC Bank
ICICI Bank
Axis Bank