Filter interviews by
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
Top trending discussions
I applied via Company Website and was interviewed in Nov 2024. There were 4 interview rounds.
Directions: Each of the following question has a question and two statements labelled as (i) and (ii). Use the data/information given in (i) and (ii) to decide whether the data are sufficient to answer the question record your answer as
A) If you can get the answer from (1)alone but not from (2)
B) If you can get the answer from (2)alone but not from (1)
C) If can get the answer from (1)and (2)together ,although neither statement by itself suffice
D) If statement (1)alone suffices and statement (2) alone also suffice.
E) If can\'t get the answer from statements (1) and (2) together and you need more data.
Copyright protection is given for a work having originality,i.e. it should be from the author and must have minimum degree of creativity. So it is the author who is the real creator of the work thereby first owner of the copyright and Indian law recognizes author as the firstowner of the copyright .But by the term ‘ownership it means it includes not only theauthor ,but also assignee and can even a legal entity even though not defined in the !ct. InBern convention the term !uthor is not defined, instead it says that the person under whose name the work is disclosed, which implies that it is not necessary that always theauthor should be the owner. "owever Indian copyright !ct defines the tern ‘!uthor withrespect to various works, but still leaves some problems. It becomes more comple# in theconte#t of changing technologies, i.e. cinematographic works, sound recording, broadcasting etc which is a combination of different works, also when author does thework in the course of employment. $hen new technologies emerge, different mode of communication simultaneously arise and the e#ploitation of the copyright by wayof assignment %licensing will add economic benefits to the copyright owner and the provisions of assignment and licensing becomes crucial. By amendments Indian Copyright!ct has taken care of such provisions, but still leaving lacunae % the role of &udiciary becomes crucial in interpreting such provisions for effectively protecting the rights of the authors.
What are the constraints and give example that's include all constraints? 2. Basic SQL queries were asked but I don't remember 3. Then asked questions from my college projects
Public, private, and protected are access modifiers used in object-oriented programming to control the visibility of class members.
Public: allows access to the member from outside the class
Private: restricts access to the member only within the class
Protected: allows access to the member within the class and its subclasses
SQL joins are used to combine rows from two or more tables based on a related column between them.
INNER JOIN: Returns rows when there is at least one match in both tables.
LEFT JOIN: Returns all rows from the left table, and the matched rows from the right table.
RIGHT JOIN: Returns all rows from the right table, and the matched rows from the left table.
FULL JOIN: Returns rows when there is a match in one of the tables.
C...
I applied via Campus Placement and was interviewed in Oct 2024. There were 3 interview rounds.
In first round 4 coding question like 1 dsa 2 database and one is api and question is very simple . coding round was conducted in hackerrank
Again same but dsa question and oops concept in deep level
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There were 2 interview rounds.
2 hours of duration and medium level leetcode questions
OS stands for Operating System. It is a software that manages computer hardware and provides services for computer programs.
OS is the software that acts as an intermediary between computer hardware and user applications.
It manages computer resources such as memory, processors, devices, and file systems.
Examples of popular operating systems include Windows, macOS, Linux, and Android.
Deadlock can be avoided by implementing proper resource allocation strategies and using techniques like deadlock prevention, avoidance, detection, and recovery.
Implement proper resource allocation strategies such as resource ordering, wait-die, wound-wait, etc.
Use techniques like deadlock prevention by ensuring that the system never enters a deadlock state, avoidance by ensuring that the system does not enter an unsafe...
posted on 10 Jun 2024
diff var let const
var is function-scoped, let and const are block-scoped
var can be redeclared and reassigned, let can be reassigned but not redeclared, const cannot be reassigned or redeclared
const must be initialized during declaration, let and var can be declared without initialization
I applied via Referral and was interviewed in Apr 2024. There was 1 interview round.
posted on 14 Apr 2024
General Aptitude Test
posted on 1 Dec 2024
Coding questions codility hacker ranl
The pillars of OOP are encapsulation, inheritance, and polymorphism.
Encapsulation: bundling of data and methods into a single unit
Inheritance: ability to create new classes from existing ones
Polymorphism: ability to use a single interface for multiple types
Web API security mechanisms protect against unauthorized access and ensure data integrity.
Authentication: Verify the identity of the user or client accessing the API.
Authorization: Determine what actions the authenticated user or client is allowed to perform.
Encryption: Securely transmit data over the network using encryption algorithms.
Input validation: Validate and sanitize user input to prevent common security vulne...
Deadlock in SQL occurs when two or more transactions permanently wait for each other to release resources.
Deadlock happens when two or more transactions acquire locks on resources and wait for each other indefinitely.
It can occur due to poor transaction scheduling, lock contention, or incorrect use of transactions.
To prevent deadlock, use proper transaction isolation levels, minimize lock contention, and ensure transac...
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Analyst
79
salaries
| ₹4 L/yr - ₹13.6 L/yr |
Software Engineer
70
salaries
| ₹6.4 L/yr - ₹17.8 L/yr |
Claims Adjudicator
69
salaries
| ₹3 L/yr - ₹6.5 L/yr |
Senior Analyst
64
salaries
| ₹5.5 L/yr - ₹19 L/yr |
Senior Software Engineer
50
salaries
| ₹12 L/yr - ₹25 L/yr |
Oracle Cerner
McKesson
Veradigm
Athenahealth Technology