i
Ethics Infotech
Filter interviews by
Be the first one to contribute and help others!
posted on 12 Oct 2024
I applied via Referral and was interviewed in Sep 2024. There were 3 interview rounds.
I was responsible for developing and maintaining software applications, debugging code, and collaborating with team members.
Developed and maintained software applications
Debugged code to identify and fix issues
Collaborated with team members on projects
Key features of Java 8 include lambda expressions, functional interfaces, streams, and default methods.
Lambda expressions allow for functional programming style in Java.
Functional interfaces enable the use of lambda expressions.
Streams provide a way to work with collections in a more functional way.
Default methods allow interfaces to have method implementations.
Multi-threading is a programming concept where multiple threads run concurrently within a single process.
Multi-threading allows for parallel execution of tasks, improving performance and responsiveness.
Used in applications that require handling multiple tasks simultaneously, such as web servers or video editing software.
Example: Implementing a multi-threaded server to handle multiple client requests concurrently.
Some compatible features of Java include platform independence, object-oriented programming, and automatic memory management.
Platform independence allows Java programs to run on any platform with a Java Virtual Machine (JVM)
Object-oriented programming allows for modular and reusable code through classes and objects
Automatic memory management with garbage collection helps manage memory allocation and deallocation
Java al...
ConcurrentModificationException occurs when a collection is modified while iterating over it.
Occurs in Java when a collection is modified while being iterated over
Can be resolved by using an Iterator to remove elements instead of directly modifying the collection
Alternatively, use synchronized collections or ConcurrentHashMap to avoid this exception
Spring Boot is a Java-based framework used to create standalone, production-grade Spring-based applications.
Spring Boot simplifies the process of creating and deploying Spring applications.
It provides a set of pre-configured tools and conventions to get started quickly.
Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow for easy deployment.
It allows for easy configuration through properties files or Y...
Microservices are a software development technique where applications are composed of small, independent services that communicate with each other.
Microservices are small, focused services that work together to form a complete application
Each microservice is responsible for a specific function or feature
Microservices communicate with each other through APIs
Microservices can be developed, deployed, and scaled independen...
Yes, microservices can contain transactional data.
Microservices can handle transactional data by using distributed transactions or event sourcing.
Each microservice can manage its own database, which can include transactional data.
Microservices can communicate with each other to ensure consistency in transactional data.
Examples: E-commerce platform with separate microservices for inventory, orders, payments, etc.
Microservices can be updated with new data by using versioning, rolling updates, blue-green deployments, and canary releases.
Use versioning to manage different versions of microservices.
Implement rolling updates to gradually update instances without downtime.
Utilize blue-green deployments to switch between old and new versions seamlessly.
Employ canary releases to test new data on a small subset of users before full dep
Technologies like Kafka, RabbitMQ, and Apache Pulsar can be used to update microservices with data.
Kafka
RabbitMQ
Apache Pulsar
To configure login in Spring Boot, you can use Spring Security to handle authentication and authorization.
Add Spring Security dependency in your pom.xml file
Create a class that extends WebSecurityConfigurerAdapter to configure security settings
Override configure(HttpSecurity http) method to define login form, login processing URL, success and failure URLs
Use @EnableWebSecurity annotation on your main application class
Multiple data sources in Spring Boot can be handled using Spring Data JPA and configuring multiple data source beans.
Use @Primary annotation to specify the primary data source bean
Configure additional data sources in application.properties or application.yml file
Use @Qualifier annotation to specify which data source to inject in a specific repository or service class
Yes, I typically use a hash set or dictionary to filter out duplicate employee records from a list.
Iterate through the list of employee records
Use a hash set or dictionary to keep track of unique employee IDs
Check each employee record against the hash set or dictionary to filter out duplicates
To identify an object in a collection, you can iterate through the collection and compare each object with the target object.
Iterate through the collection using a loop
Compare each object in the collection with the target object using a conditional statement
Use a unique identifier or property of the object to match it with the target object
Example: Identifying a specific student in a list of students by comparing their
REST API is a set of rules and conventions for building and interacting with web services.
REST stands for Representational State Transfer
Uses standard HTTP methods like GET, POST, PUT, DELETE
Communicates over HTTP using JSON or XML
Stateless, meaning each request from a client to server must contain all the information needed to understand the request
Implementing an authentication service involves creating a secure system for verifying user identities.
Use encryption to securely store user passwords
Implement multi-factor authentication for added security
Utilize tokens or cookies for session management
Integrate with OAuth or OpenID Connect for third-party authentication
Implement rate limiting and account lockout mechanisms to prevent brute force attacks
REST services return data in JSON or XML format.
Data is typically returned in JSON or XML format.
JSON is more commonly used due to its simplicity and readability.
REST services can also return data in other formats like HTML or plain text.
Example: {"name": "John Doe", "age": 30}
Spring Boot actuator provides production-ready features to help monitor and manage your application.
Provides endpoints to monitor application health, metrics, info, etc.
Can be used to check the status of the application, database connections, and more.
Allows customization and security configurations for the endpoints.
Securing a Spring Boot application, especially in the context of a banking application, involves implementing Spring Security.
Use Spring Security to handle authentication and authorization
Implement secure communication using HTTPS
Utilize role-based access control to restrict user permissions
Enable CSRF protection to prevent cross-site request forgery attacks
Implement secure password storage and session management
Integrating Spring Data JPA with Spring Boot allows for easy database operations in a Spring Boot application.
Add Spring Data JPA dependency in pom.xml
Create JPA entity classes annotated with @Entity
Create a repository interface extending JpaRepository
Use repository interface in service classes for database operations
Configure application.properties with database connection details
Optional in Java is a container object which may or may not contain a non-null value.
Optional was introduced in Java 8 to handle null values more effectively.
It is used to avoid NullPointerExceptions by explicitly checking if a value is present before using it.
Optional can be used with methods that may return null to indicate that the value may be absent.
Example: Optional
Yes, I have experience with job scheduling in previous projects.
Utilized cron jobs to automate tasks at specific times
Worked with tools like Apache Airflow for complex job scheduling workflows
Implemented job scheduling in Python scripts using libraries like schedule or APScheduler
Microservice architecture is a modular approach where an application is divided into smaller, independent services, while monolithic architecture is a single, unified structure.
Microservice architecture breaks down an application into smaller, loosely coupled services that can be developed, deployed, and scaled independently.
Monolithic architecture involves building the entire application as a single unit, making it ha...
CI/CD pipeline automates the process of integrating code changes and deploying them to production.
Automates the process of integrating code changes
Automates the process of testing code changes
Automates the process of deploying code changes
Helps in detecting and fixing bugs early in the development cycle
Increases the speed of software delivery
Ensures consistency in the deployment process
I used AngularJS and Bootstrap to create the UI side of the springboard application.
AngularJS
Bootstrap
Vaadin is an open-source web application framework for building modern web apps using Java.
Vaadin allows developers to build web applications using Java on the server-side and HTML/CSS/JavaScript on the client-side.
It provides a set of customizable UI components and a Java API for creating interactive web interfaces.
Vaadin simplifies the development process by handling client-server communication and UI updates automat...
JDK is a development kit for creating Java applications, while JRE is a runtime environment for executing Java programs.
JDK stands for Java Development Kit and includes tools for developing Java applications, such as compiler and debugger.
JRE stands for Java Runtime Environment and is used to run Java applications. It includes JVM, libraries, and other necessary components.
JDK is needed for developing Java applications...
No, Java programs require JRE to run.
Java programs are compiled into bytecode which is executed by the Java Runtime Environment (JRE)
JRE is necessary to interpret and run Java programs
Without JRE, Java programs cannot be executed
HashMap in Java is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.
HashMap uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine its index in the array.
If multiple keys hash to the same index, a linked list is used to handle collisions.
HashMap allows null keys and values, and does not guarantee the order of key-
A key with a null value in HashMap will be stored in the HashMap as a key-value pair with a null value.
In a HashMap, keys can have null values but only one key with a null value is allowed.
If you try to store a key with a null value multiple times, the previous value associated with that key will be overwritten.
Example: HashMap
Fail-fast stops immediately upon detecting an error, while fail-safe continues to operate despite errors. Fail-safe is synchronized.
Fail-fast immediately stops the operation upon encountering an error, ensuring that no further damage is done.
Fail-safe continues to operate despite errors, often by handling the error and allowing the program to continue running.
Fail-safe is synchronized, meaning that it is designed to ha...
HashMap is unordered while LinkedHashMap maintains insertion order.
HashMap does not maintain insertion order while LinkedHashMap does.
LinkedHashMap extends HashMap and adds a doubly-linked list to maintain order.
HashMap is faster for iteration while LinkedHashMap is slower due to maintaining order.
Load factor in HashMap determines when the HashMap should be resized to maintain performance.
Load factor is a measure of how full the HashMap is allowed to get before its capacity is automatically increased.
The default load factor of HashMap is 0.75, which means the HashMap will be resized when it is 75% full.
Increasing the load factor reduces the space overhead but increases the time cost of resolving collisions.
Examp...
A Daemon thread is a background thread that runs without blocking the main program from exiting.
Daemon threads are used for tasks that do not require user interaction or continuous monitoring.
They are automatically terminated by the JVM when all non-daemon threads have finished.
An example of a Daemon thread is the garbage collector in Java.
Multithreading in Java allows multiple threads to execute concurrently, improving performance and responsiveness.
Multithreading allows multiple threads to run concurrently within a single process.
Each thread has its own stack and program counter, but share the same heap memory.
Java provides built-in support for multithreading through the java.lang.Thread class.
Example: Creating a new thread by extending the Thread clas
Executor framework in Java is a framework that provides a way to manage and control the execution of tasks in a multithreaded environment.
Allows for decoupling task submission from task execution
Provides a way to manage thread creation, pooling, and scheduling of tasks
Helps in handling exceptions and errors that occur during task execution
Examples include ThreadPoolExecutor and ScheduledThreadPoolExecutor classes
Some methods in Executor framework include execute(), submit(), shutdown(), awaitTermination(), and invokeAll().
execute() - Used to execute the given command at some time in the future.
submit() - Submits a Runnable or Callable task for execution and returns a Future representing the task.
shutdown() - Initiates an orderly shutdown in which previously submitted tasks are executed, but no new tasks will be accepted.
awaitT...
The join method in Java is used to concatenate the elements of an array into a single string.
The join method is a part of the String class in Java.
It takes an array of strings as input and concatenates them with a specified delimiter.
Example: String[] arr = {"Hello", "World"}; String result = String.join(", ", arr); // Output: Hello, World
One-to-many and many-to-one relationships in Hibernate are used to define the relationship between entities in a database.
One-to-many relationship: One entity can be associated with multiple instances of another entity. For example, one department can have multiple employees.
Many-to-one relationship: Multiple instances of one entity can be associated with a single instance of another entity. For example, multiple emplo
An ID in Hibernate is a unique identifier for an entity in a database. It is used to uniquely identify each record.
ID is a field in an entity class annotated with @Id in Hibernate.
It can be of different types like int, long, String, etc.
ID is used to uniquely identify each record in a database table.
It is often generated automatically using strategies like @GeneratedValue.
Example: @Id @GeneratedValue(strategy = Generat
Custom queries in Spring Data JPA can be created using @Query annotation or method naming conventions.
Use @Query annotation with JPQL or native SQL to define custom queries
Follow method naming conventions to automatically generate queries based on method names
Use parameters in custom queries by adding method parameters and referencing them in the query
Some common annotations used in Spring Boot are @RestController, @Autowired, @RequestMapping, @Component, @Service, @Repository.
@RestController - Used to define a controller class in Spring MVC.
@Autowired - Used for automatic dependency injection.
@RequestMapping - Used to map web requests to specific handler methods.
@Component - Indicates that a class is a Spring component.
@Service - Indicates that a class is a Spring ...
To create a repository interface in Spring Data JPA, you need to define an interface that extends JpaRepository.
Create an interface that extends JpaRepository
Add custom query methods by defining method signatures in the repository interface.
Spring Data JPA will automatically generate the implementation for the repository interface at run
Custom queries in repository interface are defined using @Query annotation in Spring Data JPA.
Use @Query annotation above the method declaration in the repository interface.
Write the custom query in JPQL or native SQL within the @Query annotation.
You can also pass parameters to the query using method parameters.
The main difference is that @RestController is a specialized version of @Controller that is used for RESTful web services.
Both @Controller and @RestController are used in Spring MVC to handle HTTP requests, but @RestController is specifically used for RESTful web services.
@Controller is used to create web pages that return HTML, while @RestController is used to create RESTful web services that return data in JSON or XM...
DispatcherServlet is the front controller in Spring Boot that receives incoming requests and dispatches them to the appropriate handler.
DispatcherServlet is a servlet that manages the flow of incoming requests in a Spring Boot application.
It acts as the front controller, receiving all requests and then dispatching them to the appropriate handler for processing.
DispatcherServlet is configured in the web.xml file or thro...
Microservices are a software development technique where applications are broken down into smaller, independently deployable services.
Microservices allow for easier scalability and maintenance of complex systems.
Each microservice typically focuses on a specific business function.
Communication between microservices is usually done through APIs.
Examples of companies using microservices include Netflix, Amazon, and Uber.
Communication between microservices can happen through synchronous or asynchronous protocols like HTTP, messaging queues, or gRPC.
Microservices can communicate through synchronous protocols like HTTP, where one service sends a request to another service and waits for a response.
Alternatively, microservices can communicate asynchronously using messaging queues like RabbitMQ or Kafka, where messages are sent between serv...
Messaging between microservices involves communication through message brokers or direct API calls.
Microservices communicate through message brokers like RabbitMQ or Kafka.
Messages are sent in a format like JSON or XML.
Microservices can also communicate through direct API calls using REST or gRPC.
Message queues help in decoupling services and ensuring reliable communication.
Service discovery mechanisms like Consul or E
Find max and min sum after removing one element from array. Time complexity analysis required.
Iterate through array to find sum of all elements
For each element, calculate sum after removing it
Track max and min sum as you iterate
Time complexity: O(n) where n is the number of elements in the array
posted on 8 Jan 2025
I was interviewed in Dec 2024.
posted on 8 Jan 2025
I applied via Recruitment Consulltant and was interviewed in Dec 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
Test Paper Task, which is to be given in a Word Document.
1. WireFraming
2. User Story Writing
3. Use Case
4. Sequence Diagram
Educational background in IT industry provides foundational knowledge, skills, and problem-solving abilities.
Educational background in computer science or related field helps in understanding technical concepts and languages used in IT industry.
Analytical and critical thinking skills acquired through education are essential for analyzing data and solving complex problems in IT projects.
Project management and communicat...
Requirement development components in requirement gathering phases
Stakeholder analysis
Interviews with stakeholders
Document analysis
Observations
Prototyping
Brainstorming sessions
Requirement elicitation techniques are methods used to gather and clarify requirements from stakeholders.
Interviews with stakeholders to understand their needs and expectations
Surveys and questionnaires to collect feedback from a larger group of stakeholders
Observations of current processes or systems to identify areas for improvement
Prototyping to visualize requirements and gather feedback early in the process
Brainsto...
The next step after requirement gathering is analyzing the gathered requirements to identify patterns, prioritize needs, and create a solution.
Analyze the gathered requirements to identify patterns and common themes
Prioritize the needs and requirements based on business goals and constraints
Create a solution design or proposal that addresses the identified requirements
Collaborate with stakeholders to validate the propo
Validation ensures the product meets the customer's requirements, while verification ensures the product is built correctly.
Validation is checking if the right product is being built, while verification is checking if the product is being built right.
Validation involves evaluating the product against customer requirements, while verification involves checking the product against specifications.
Validation is subjective ...
A project initiation plan is a document that outlines the objectives, scope, and deliverables of a project.
Defines the purpose and goals of the project
Identifies key stakeholders and their roles
Outlines the project scope and constraints
Includes a high-level timeline and budget estimate
Provides a roadmap for project execution
Stakeholders in business analysis include project sponsors, end users, developers, and testers.
Project sponsors provide funding and support for the project.
End users provide input on requirements and usability.
Developers implement the solutions based on requirements.
Testers ensure the quality of the final product.
Other stakeholders may include managers, customers, and regulatory bodies.
RACI metrics are used to define roles and responsibilities within a project or organization.
RACI stands for Responsible, Accountable, Consulted, and Informed
It helps clarify who is responsible for what tasks and decisions
Example: R - John is responsible for data analysis, A - Sarah is accountable for project success, C - Mark is consulted for technical expertise, I - Emily is informed of project updates
RTM metrics refer to the metrics used to track and measure the requirements traceability matrix.
RTM metrics help in tracking the progress of requirements throughout the project lifecycle.
They measure the coverage of requirements, identify gaps, and ensure all requirements are met.
Examples of RTM metrics include requirement status (e.g. implemented, in progress, pending), requirement source, and requirement priority.
MoSCoW matrix is a prioritization technique used in project management to categorize requirements into Must have, Should have, Could have, and Won't have.
MoSCoW stands for Must have, Should have, Could have, and Won't have
Must have - essential requirements that are critical for project success
Should have - important requirements that are high priority but not critical
Could have - desirable requirements that are nice to...
Requirements should be prioritized based on business value, impact on stakeholders, and feasibility.
Identify and prioritize requirements that align with the organization's strategic goals.
Consider the impact on stakeholders and prioritize requirements that address their needs.
Assess the feasibility of implementing each requirement and prioritize those that are achievable within constraints.
Use techniques like MoSCoW pr...
Use cases are specific scenarios where a product or service can be used to solve a particular problem or achieve a specific goal.
Identifying business needs and requirements
Improving processes and workflows
Enhancing decision-making through data analysis
Optimizing resource allocation
Increasing customer satisfaction
Reducing costs and increasing efficiency
Alternate flow of Use Cases refers to scenarios in which the main flow of a use case is deviated due to certain conditions or exceptions.
Alternate flow describes deviations from the main flow of a use case
It represents different paths that a use case can take based on conditions or exceptions
These alternate flows are usually documented to ensure all possible scenarios are considered
Examples include error handling, vali...
JIRA is a project management tool used for tracking tasks, issues, and progress in projects.
JIRA allows users to create and assign tasks to team members
It provides a centralized platform for tracking project progress and deadlines
Users can create custom workflows and dashboards to visualize project status
JIRA integrates with other tools like Confluence and Bitbucket for seamless collaboration
Yes, I have experience working on pre-sales efforts and cost estimation.
I have worked on creating proposals and estimates for potential clients
I have experience analyzing requirements and determining the effort needed for a project
I have collaborated with sales teams to provide accurate cost estimates
I have used tools and techniques such as cost-benefit analysis and risk assessment in pre-sales activities
Implemented a data analytics solution for a retail company to optimize inventory management
Analyzed historical sales data to identify trends and patterns
Developed predictive models to forecast demand and optimize inventory levels
Collaborated with cross-functional teams to implement the solution and train end users
Business Process Modeling is the visual representation of a business process to analyze, improve, and optimize its efficiency.
It involves creating diagrams or flowcharts to illustrate the steps, activities, and decisions involved in a business process.
Business Process Modeling helps in identifying bottlenecks, redundancies, and inefficiencies in a process.
It can be used to simulate different scenarios and analyze the i...
I will leverage my analytical skills to understand the unique challenges and opportunities in the Power Sector and collaborate with stakeholders to drive effective solutions.
Conduct thorough research on the Power Sector to understand industry trends, regulations, and key players
Collaborate with internal teams and stakeholders to gather requirements and identify pain points
Utilize data analysis and modeling techniques t...
I was interviewed in Nov 2024.
posted on 26 Dec 2024
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
Window functions are used to perform calculations across a set of table rows that are related to the current row.
Window functions are used in SQL to perform calculations on a specific subset of rows related to the current row.
They are often used with aggregate functions like SUM, AVG, and COUNT to calculate running totals, moving averages, and rankings.
Examples of window functions include ROW_NUMBER(), RANK(), LEAD(),
Use PySpark code to connect data to ADLS with partitioning
Use SparkSession to create a Spark application
Set the configuration for ADLS storage account and container
Read data from ADLS using Spark DataFrame API
Partition the data based on a specific column while writing back to ADLS
posted on 23 Dec 2024
I applied via Job Portal and was interviewed in Nov 2024. There was 1 interview round.
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
I have 5 years of experience working as a Game Artist in the gaming industry.
Worked on creating 2D and 3D assets for various game projects
Collaborated with game designers and developers to ensure visual consistency
Experience with game engines like Unity and Unreal Engine
Created concept art, character designs, and environment assets
Knowledge of animation and visual effects for games
My salary expectation is based on industry standards, my experience, and the responsibilities of the role.
Research industry standards for Game Artists salaries
Consider my level of experience and skills
Factor in the responsibilities and requirements of the specific role
Be open to negotiation based on benefits and other perks offered
Design a character and Royal symbol (fully rendered in realistic style) and one Mid Pay concept sketch for slot game.
I applied via campus placement at Vivekananda Institute of Professional Studies Technical Campus, Delhi and was interviewed in Oct 2024. There were 3 interview rounds.
There were basic questions asked related to the profile
There were some questions and an ER diagram to create.
I applied via LinkedIn and was interviewed in Nov 2024. There was 1 interview round.
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications.
Kubernetes follows a master-slave architecture with a master node that controls multiple worker nodes.
Master node components include API server, scheduler, controller manager, and etcd.
Worker node components include kubelet, kube-proxy, and container runtime (e.g. Docker).
Ku...
based on 17 reviews
Rating in categories
Software Developer
7
salaries
| ₹1.4 L/yr - ₹4.5 L/yr |
Software Engineer
4
salaries
| ₹3 L/yr - ₹7.4 L/yr |
Softwaretest Engineer
4
salaries
| ₹1.5 L/yr - ₹3.5 L/yr |
Software Tester
4
salaries
| ₹2.6 L/yr - ₹4.5 L/yr |
System Administrator
4
salaries
| ₹2.6 L/yr - ₹5.2 L/yr |
Infosys
TCS
Wipro
HCLTech