Filter interviews by
I applied via Walk-in and was interviewed in Sep 2024. There was 1 interview round.
Data migration involves transferring data from one system to another while ensuring data integrity and minimizing downtime.
Plan the migration process including identifying data to be migrated, mapping data fields, and setting up a timeline.
Backup all data before starting the migration to prevent data loss.
Use tools like ETL (Extract, Transform, Load) to extract data from the source system, transform it to fit the targe...
Next.js is a React framework that enables server-side rendering and other features for building fast and scalable web applications.
Next.js allows for server-side rendering of React components, improving performance and SEO.
It provides automatic code splitting for faster page loads.
Next.js supports static site generation and serverless functions for building dynamic websites.
It offers built-in routing and API routes for...
I have experience with data migration in my work, including transferring data between different systems and databases.
I have successfully migrated data from an on-premise database to a cloud-based database.
I have used ETL tools like Talend and Informatica to automate the data migration process.
I have experience mapping data fields and ensuring data integrity during the migration process.
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
Easy excel and sql questions
FRND interview questions for popular designations
Kotlin coroutine is a concurrency design pattern used in Android development for asynchronous programming.
Kotlin coroutine allows for easy and efficient handling of asynchronous tasks on Android.
It simplifies the code by avoiding callback hell and making the code more readable.
Coroutines can be used with suspend functions to perform asynchronous operations.
Example: launch { // code block } creates a new coroutine and r
I applied via Approached by Company and was interviewed in Jul 2023. There was 1 interview round.
I would address the issue promptly and professionally, ensuring the safety and comfort of both users.
Listen to the female user's concerns and validate her feelings
Investigate the situation thoroughly to understand the issue
Take appropriate action to address the problem, such as warning or banning the male user
Provide support and resources to the female user, such as counseling services or blocking the male user
I would educate a new user about FRND app by providing a step-by-step tutorial and offering personalized assistance.
Start by explaining the key features of the app such as messaging, group chats, and event planning.
Demonstrate how to create a profile, add friends, and join or create groups.
Provide tips on how to customize notifications, privacy settings, and security measures.
Offer hands-on assistance through a live de...
I applied via Campus Placement
Regex for email validation
Start with a string of characters followed by @ symbol
Followed by a string of characters and a period
End with a string of characters with a length of 2-6 characters
Allow for optional subdomains separated by periods
Disallow special characters except for . and _ in username
Print prime numbers in a given range and optimize the solution.
Use Sieve of Eratosthenes algorithm to generate prime numbers efficiently
Start with a boolean array of size n+1, mark all as true
Loop through the array and mark all multiples of each prime as false
Print all the indexes that are still marked as true
Find angle between hour and minute hand in a clock given the time.
Calculate the angle made by the hour hand with respect to 12 o'clock position
Calculate the angle made by the minute hand with respect to 12 o'clock position
Find the difference between the two angles and take the absolute value
If the angle is greater than 180 degrees, subtract it from 360 degrees to get the smaller angle
To un-hash a string, use a reverse algorithm to convert the hash back to the original string.
Create a reverse algorithm that takes the hash as input and outputs the original string
Use the same logic as the hash function but in reverse order
If the hash function used a specific algorithm, use the inverse of that algorithm to un-hash the string
I was interviewed before Mar 2016.
based on 7 interviews
Interview experience
Software Developer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Android Developer
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Ola Cabs
Flipkart
Paytm
Swiggy