i
EbixCash Limited
Filter interviews by
I was interviewed in Aug 2024.
4 questions of coding, level - easy and medium
I applied via Job Portal and was interviewed before Dec 2023. There were 2 interview rounds.
Data structure problem solving in the second roun
I applied via Company Website and was interviewed in Jun 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed before Jul 2021. There was 1 interview round.
Hashmap is a data structure that stores key-value pairs and provides constant time complexity for insertion, deletion, and retrieval.
Hashmap uses hashing function to map keys to indices in an array
Collisions can occur when two keys map to the same index, which can be resolved using separate chaining or open addressing
Java implementation: HashMap
Spring is a framework while Spring Boot is a tool that simplifies Spring application development.
Spring Boot provides auto-configuration and embedded servers.
Spring requires more configuration and setup.
Spring Boot is opinionated and follows 'convention over configuration'.
Spring Boot reduces boilerplate code.
Spring Boot is ideal for microservices and standalone applications.
The type of controller in Spring is @Controller and the type of annotations are @RequestMapping and @ResponseBody.
@Controller is used to mark a class as a Spring MVC controller.
@RequestMapping is used to map a URL to a method in a controller.
@ResponseBody is used to indicate that the return value of a method should be serialized and returned as the response body.
Junkins is not a known term in software engineering.
Junkins is not a term used in software engineering.
It is possible that the interviewer misspoke or meant to ask a different question.
It is important to clarify any confusion or misunderstandings during an interview.
EbixCash Limited interview questions for designations
Top trending discussions
posted on 8 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
OOPS is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOPS focuses on the concept of classes and objects
Encapsulation: bundling data and methods that operate on the data within a single unit
Inheritance: allows a class to inherit properties and behavior from another class
Polymorphism: ability to present the same interface for diffe...
Comparable is an interface used for natural ordering, Comparator is an interface used for custom ordering. Abstract class can have method implementations, Interface cannot.
Comparable interface is used to define the natural ordering of objects. Example: String class implements Comparable interface for natural ordering based on alphabetical order.
Comparator interface is used to define custom ordering of objects. Example:...
Count occurrences of each character in a given string
Create an array to store the count of each character
Iterate through the string and increment the count of each character in the array
Return the array with counts for each character
Remove duplicates from an array of strings
Iterate through the array and store each element in a set to keep track of unique values
Create a new array with the unique values from the set
I applied via campus placement at National Institute of Technology (NIT), Raipur and was interviewed in Jul 2024. There were 2 interview rounds.
The coding test consists of multiple-choice questions and one medium-hard level coding question.
The angle between the minute and hour hand of a clock at 3:45 is 157.5 degrees.
Calculate the angle formed by the hour hand from 12 o'clock position to 3:45 position (135 degrees)
Calculate the angle formed by the minute hand from 12 o'clock position to 3:45 position (22.5 degrees)
Subtract the smaller angle from the larger angle to get the angle between the two hands (157.5 degrees)
Indexing in DBMS is a technique used to improve the performance of queries by allowing faster retrieval of data.
Indexes are data structures that store a small portion of the data set in an easily searchable format.
They help in speeding up the data retrieval process by reducing the number of disk accesses needed.
Indexes can be created on one or more columns of a table to improve the performance of SELECT queries.
Example...
The lifecycle of a React component includes mounting, updating, and unmounting phases.
Mounting phase: constructor, render, componentDidMount
Updating phase: shouldComponentUpdate, render, componentDidUpdate
Unmounting phase: componentWillUnmount
To delete an entry in MongoDB database, you can use the deleteOne() or deleteMany() methods.
Use deleteOne() method to delete a single document based on a specific condition
Use deleteMany() method to delete multiple documents based on a specific condition
Make sure to specify the filter criteria to accurately delete the desired entry
I applied via Referral and was interviewed in Feb 2024. There were 2 interview rounds.
posted on 11 Dec 2023
I was interviewed in Jun 2023.
I have 5 years of experience in SQL and Node JS.
I have worked extensively with SQL databases, writing complex queries and optimizing performance.
I am proficient in using Node JS for server-side development, building RESTful APIs and handling database operations.
I have experience in integrating SQL databases with Node JS applications using libraries like Sequelize or Knex.
I have successfully delivered projects that invo...
Indexes in SQL are data structures that improve the speed of data retrieval operations on database tables.
Indexes are created on one or more columns of a table to allow faster searching and sorting of data.
They work similar to the index of a book, allowing the database engine to quickly locate the data.
Indexes can be created on primary keys, foreign keys, or any other frequently searched columns.
They reduce the amount ...
Normalization is a process in DBMS that eliminates data redundancy and ensures data integrity.
Normalization is used to organize data in a database efficiently.
There are different normal forms, such as 1NF, 2NF, 3NF, BCNF, and 4NF.
Each normal form has specific rules and dependencies to achieve data normalization.
Normalization helps in reducing data duplication, improving data consistency, and simplifying database mainte...
Views in mySQL are virtual tables that are based on the result of a query. They can be used to simplify complex queries and provide a layer of abstraction.
Views are created using the CREATE VIEW statement.
They are stored in the database and can be accessed like regular tables.
Views can be used to hide complexity by encapsulating complex queries into a single view.
They can also be used to restrict access to certain colu...
Stored Procedures are precompiled database objects that contain a set of SQL statements and can be executed with a single call.
Stored Procedures are used to encapsulate and execute frequently used SQL statements.
They improve performance by reducing network traffic and optimizing query execution.
They can accept input parameters and return output values.
Stored Procedures can be used for data manipulation, data retrieval,...
Internet of Things (IoT) refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity.
IoT enables devices to collect and exchange data over the internet.
It allows for remote monitoring and control of devices and systems.
IoT has applications in various industries such as healthcare, transportation, agriculture, and smart homes.
Examples of IoT device...
JWT stands for JSON Web Token. It is a compact, URL-safe means of representing claims between two parties.
JWT is used for authentication and authorization purposes in web applications.
It consists of three parts: header, payload, and signature.
The header contains the algorithm used to sign the token.
The payload contains the claims or information about the user.
The signature is used to verify the integrity of the token.
J...
Webtokens and APIs are both used in web development, but they serve different purposes.
Webtokens are used for authentication and authorization, providing a secure way to transmit user information between client and server.
APIs (Application Programming Interfaces) are sets of rules and protocols that allow different software applications to communicate and interact with each other.
Webtokens are often used within APIs to...
oAuth is an open standard for authorization. In my project, I used the oAuth 2.0 protocol for authentication and authorization.
oAuth is a protocol that allows users to grant limited access to their resources on one website to another website without sharing their credentials.
It provides a secure way for users to authenticate and authorize third-party applications to access their data.
oAuth 2.0 is the most widely used v...
Further optimization of normalized data can be achieved through indexing, denormalization, and caching.
Create appropriate indexes on frequently queried columns to improve query performance.
Consider denormalizing the data by combining related tables to reduce the number of joins required.
Implement caching mechanisms to store frequently accessed data in memory for faster retrieval.
Use materialized views or summary tables...
Indexing in a database improves query performance by creating a data structure that allows for faster data retrieval.
Indexing involves creating an index on one or more columns of a database table.
The column used for indexing should be chosen based on the frequency of data retrieval and the cardinality of the column.
Columns with high selectivity and frequent data retrieval are good candidates for indexing.
Examples of co...
based on 3 interviews
Interview experience
based on 33 reviews
Rating in categories
Software Engineer
188
salaries
| ₹2 L/yr - ₹9.5 L/yr |
Network Engineer
174
salaries
| ₹1.2 L/yr - ₹6.5 L/yr |
Software Developer
151
salaries
| ₹2 L/yr - ₹10.9 L/yr |
System Analyst
142
salaries
| ₹3 L/yr - ₹12 L/yr |
Senior System Analyst
137
salaries
| ₹5.5 L/yr - ₹14 L/yr |
TCS
Infosys
Wipro
HCLTech