Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Nov 2022. There were 2 interview rounds.
RLS implementation in Power BI allows for data security by restricting access based on user roles.
RLS stands for Row-Level Security.
It is a feature in Power BI that allows you to control access to data at the row level.
RLS can be implemented by defining roles and rules in Power BI Desktop or Power BI Service.
Roles can be assigned to users or groups, and rules determine which data they can access.
RLS can be based on use...
Top trending discussions
I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Oct 2024. There were 2 interview rounds.
I applied via Approached by Company and was interviewed in Oct 2024. There were 3 interview rounds.
One coding test happen
Using stream API for Data Structures and Algorithms
Stream API in Java can be used to perform operations on collections like filtering, mapping, reducing, etc.
It can be used for implementing various data structures and algorithms efficiently.
For example, you can use stream API to find the sum of all elements in an array or filter out even numbers from a list.
Using stream API to filter a list of numbers and find the sum of even numbers
Use Stream.filter() to filter out even numbers
Use Stream.mapToInt() to convert stream to IntStream
Use IntStream.sum() to find the sum of even numbers
posted on 11 Nov 2024
Closures are functions that have access to variables from their containing scope even after the scope has closed.
Closures allow functions to access variables from their outer function even after the outer function has finished executing.
They are commonly used in event handlers, callbacks, and asynchronous programming.
Closures help in maintaining state in functional programming.
Virtual DOM is a lightweight copy of the actual DOM used for efficient updates in web development.
Virtual DOM is a concept used in frameworks like React to improve performance by minimizing actual DOM manipulations.
When changes are made to the virtual DOM, a comparison is done with the actual DOM to determine the minimal updates needed.
This approach reduces the number of costly DOM operations, resulting in faster rende
Data types in JavaScript include number, string, boolean, object, function, undefined, and null.
Number - represents numeric data, e.g. 10, 3.14
String - represents textual data, e.g. 'hello', '123'
Boolean - represents true or false values, e.g. true, false
Object - represents complex data structures, e.g. { key: 'value' }
Function - represents executable code, e.g. function() { }
Undefined - represents a variable that has ...
React code for a simple counter
Create a functional component for the counter
Use useState hook to manage the count state
Render the count value and buttons to increment and decrement the count
posted on 3 Mar 2025
I was interviewed before Mar 2024.
Design patterns are reusable solutions to common problems in software design.
Design patterns help in creating flexible, maintainable, and scalable software.
Some common design patterns include Singleton, Factory, Observer, Strategy, and Decorator.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object...
Delegates are type-safe function pointers in C# used for implementing callbacks. async/await is used for asynchronous programming in C#.
Delegates in C# are similar to function pointers in C or C++. They allow methods to be passed as parameters to other methods.
Async/await in C# is used for asynchronous programming, allowing methods to run asynchronously without blocking the main thread.
Delegates can be used with async/
An interceptor is a design pattern commonly used in software development to capture and manipulate requests and responses.
Interceptors can be used for logging, authentication, authorization, caching, error handling, etc.
In Angular, interceptors can be used to modify HTTP requests before they are sent and responses before they are received.
In Spring framework, interceptors can be used to intercept client requests and se
Authentication is the process of verifying the identity of a user or system.
Authentication involves confirming the identity of a user through credentials such as passwords, biometrics, or security tokens.
Common methods of authentication include single-factor authentication (e.g. password) and multi-factor authentication (e.g. password + SMS code).
Authentication can be achieved through protocols like OAuth, OpenID, SAML...
posted on 27 Nov 2024
based on 1 interview
Interview experience
based on 18 reviews
Rating in categories
Desktop Support Engineer
214
salaries
| ₹1.4 L/yr - ₹4.1 L/yr |
Software Developer
186
salaries
| ₹2 L/yr - ₹10 L/yr |
Software Engineer
176
salaries
| ₹3 L/yr - ₹10 L/yr |
Network Engineer
167
salaries
| ₹1 L/yr - ₹6 L/yr |
Senior Software Engineer
137
salaries
| ₹5.1 L/yr - ₹16 L/yr |
Team Lease
Quess
Tech Mahindra
HCLTech