Filter interviews by
I applied via Approached by Company
My framework is a comprehensive set of tools, libraries, and best practices that I use to streamline the development process and ensure high-quality deliverables.
Utilizes design patterns such as MVC for structuring code
Includes libraries for common tasks like data manipulation and networking
Emphasizes unit testing and continuous integration for code quality
Integrates with popular tools like Git for version control
Suppo...
Types of Selenium waits include implicit, explicit, and fluent waits.
Implicit wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit wait: Waits for a certain condition to occur before proceeding further.
Fluent wait: Waits for a condition to be true with a defined polling frequency.
Example: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS);
XPath is used to navigate through XML documents, while CSS is used to style HTML elements.
XPath is more powerful and flexible for navigating XML documents
CSS is more commonly used for styling HTML elements
XPath uses path expressions to select nodes in an XML document
CSS uses selectors to target specific HTML elements
posted on 6 Nov 2024
Basic English and General aptitude questions
posted on 24 Feb 2025
I was interviewed before Feb 2024.
Mainly Related with English Proficiency You'll be given a topic and asked to elaborate
Windows RT is a discontinued operating system for ARM-based devices.
Developed by Microsoft for tablets and PCs
Limited to apps from Windows Store
Does not support traditional desktop applications
Discontinued in 2015
Windows 8.1 is the updated version of Windows 8, with improvements in user interface, features, and performance.
Introduced Start button for easier navigation
Improved multitasking capabilities with split-screen view
Enhanced search functionality with Bing integration
Updated apps and better customization options
Increased security features like built-in antivirus software
DELETE is used to remove rows from a table while keeping the table structure intact. DROP is used to remove an entire table from the database.
DELETE is a DML (Data Manipulation Language) command, while DROP is a DDL (Data Definition Language) command.
DELETE can be rolled back, while DROP cannot be rolled back.
Example: DELETE FROM table_name WHERE condition; DROP TABLE table_name;
Autocalender creates a date table automatically, while duplicate creates a copy of a table and reference creates a linked table in Power BI.
Autocalender automatically generates a date table based on the data in your model.
Duplicate creates a copy of a table with the same data and structure.
Reference creates a linked table that shares the same data as the original table.
Autocalender is useful for quickly creating date t...
posted on 3 Oct 2024
I applied via Job Portal and was interviewed in Oct 2023. There was 1 interview round.
Yes
LiveData is lifecycle aware and can be used to observe changes in data.
ViewModel provides a way to store and manage UI-related data across configuration changes.
ViewModel can hold LiveData objects to provide data to the UI.
LiveData and ViewModel work together to ensure data consistency and prevent memory leaks.
The ViewModel survives configuration changes by being retained by the system.
ViewModels are designed to survive configuration changes like screen rotations or language changes.
When an activity is destroyed and recreated, the ViewModel is not destroyed and retains its data.
The ViewModel is associated with the activity's lifecycle and is retained until the activity is finished.
The retained ViewModel instance can be acces...
MVP offers better separation of concerns and easier unit testing compared to MVC.
MVP separates the presentation layer from the business logic, making it easier to maintain and modify the codebase.
MVP allows for easier unit testing as the presenter can be tested independently from the view.
MVP provides better decoupling between components, enabling easier code reuse and scalability.
MVP promotes a clear separation of con...
SSL pinning is a security technique that ensures a client only communicates with a server using a pre-defined public key.
SSL pinning involves hardcoding the server's public key in the client's code or configuration.
During the SSL handshake, the client checks if the server's public key matches the pinned key.
If the keys match, the connection is established; otherwise, it is rejected.
Pinning prevents man-in-the-middle at
Data security can be achieved through encryption, access controls, backups, and regular security audits.
Encrypt sensitive data using strong encryption algorithms.
Implement access controls to restrict unauthorized access to the data.
Regularly backup the data to prevent data loss.
Conduct regular security audits to identify and fix vulnerabilities.
Use secure protocols and communication channels for data transfer.
Implement...
Encryption keys should be securely stored in a separate key management system.
Encryption keys should not be stored alongside the encrypted data.
Use a dedicated key management system (KMS) to store and manage encryption keys.
Implement strong access controls and authentication mechanisms for the KMS.
Consider using hardware security modules (HSMs) for added security.
Regularly rotate encryption keys to minimize the impact
posted on 27 Feb 2024
I applied via Approached by Company and was interviewed in Jul 2023. There were 4 interview rounds.
I applied via Company Website and was interviewed in Nov 2022. There were 4 interview rounds.
There will be ask 30 MCQ's in 30 minutes when I was attend for Aptitude test
It was conducted virtual
There will be 2 coding questions asked we have to complete one of it .If we practice well very easy to clear .
I am a highly motivated individual with a passion for technology and problem-solving.
I have a degree in Computer Science and have completed several internships in the tech industry.
I am proficient in programming languages such as Java and Python.
I enjoy working in a team environment and collaborating to find innovative solutions.
In my free time, I enjoy tinkering with new technologies and building personal projects.
I a...
My strengths include problem-solving, adaptability, and teamwork. My weakness is public speaking.
Strengths: problem-solving (e.g. finding solutions to complex technical issues), adaptability (e.g. quickly adjusting to new technologies or work environments), teamwork (e.g. collaborating effectively with colleagues)
Weakness: public speaking (e.g. nervousness when presenting to large groups)
Constructors are special methods used to initialize objects in a class.
Constructors have the same name as the class they belong to.
They are called automatically when an object is created.
They can be used to set default values for object properties.
Constructors can be overloaded to accept different parameters.
Example: public class Car { public Car() { //default constructor } public Car(String make) { //overloaded constr
A program on floating numbers in Java.
Declare a variable with float or double data type.
Perform arithmetic operations on floating point numbers.
Use formatting options to display floating point numbers.
Be aware of precision and rounding errors.
I enjoy reading, hiking, and playing board games.
Reading: I love getting lost in a good book, especially science fiction and fantasy.
Hiking: I enjoy exploring new trails and challenging myself physically.
Board games: I like playing strategy games with friends and family, such as Settlers of Catan and Ticket to Ride.
based on 1 interview
Interview experience
based on 3 reviews
Rating in categories
Associate Consultant
8.5k
salaries
| ₹1.9 L/yr - ₹11.5 L/yr |
Consultant
3.8k
salaries
| ₹8 L/yr - ₹28 L/yr |
Associate
1.7k
salaries
| ₹1.5 L/yr - ₹4.5 L/yr |
Senior Consultant
1.2k
salaries
| ₹12 L/yr - ₹38.1 L/yr |
Senior Associate
1.1k
salaries
| ₹1.8 L/yr - ₹7 L/yr |
TCS
Infosys
Wipro
HCLTech