i
Gif Technologies
Filter interviews by
I applied via LinkedIn and was interviewed before Nov 2023. There was 1 interview round.
A class is a blueprint for creating objects in object-oriented programming.
Classes define the properties and behaviors of objects.
Objects are instances of classes.
Classes can inherit properties and behaviors from other classes.
Example: Class 'Car' may have properties like 'color' and 'model', and behaviors like 'drive' and 'stop'.
An object is a self-contained entity that consists of properties and methods to perform specific tasks.
Objects are instances of classes in object-oriented programming.
They have attributes (properties) and behaviors (methods).
Example: A car object can have properties like color, model, and methods like start(), stop().
Constructor is a special type of method in a class that is automatically called when an object of that class is created.
Constructors have the same name as the class they belong to
They can be used to initialize the object's state or perform any necessary setup
Constructors can be parameterized to accept arguments during object creation
Example: public class Person { public Person(String name) { this.name = name; }}
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPs focuses on creating objects that contain both data and methods to manipulate that data.
The four main principles of OOPs are Inheritance, Encapsulation, Abstraction, and Polymorphism.
Types of OOPs include Class-based and Prototype-based.
Examples of OOPs languages include Java, C++, and Python.
Access modifiers are keywords in programming languages that define the accessibility of classes, methods, and other members.
Types of access modifiers in C# are public, private, protected, internal, protected internal.
Public - accessible from any other class.
Private - accessible only within the same class.
Protected - accessible within the same class or derived classes.
Internal - accessible within the same assembly.
Prote...
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have constructor, fields, and methods, while interface cannot have any implementation.
A class can inherit only one abstract class but can implement multiple interfaces.
Abstract class is used to provide a common base for multiple derived classes, while interface is used to define a contract f...
Garbage collection in C# is an automatic memory management process that deallocates memory that is no longer in use.
Garbage collection is a process where the runtime environment automatically deallocates memory that is no longer needed by the program.
It helps in preventing memory leaks and ensures efficient memory usage.
Garbage collection in C# is performed by the Common Language Runtime (CLR) and uses algorithms like ...
Ref and Out parameters are used in C# to pass arguments by reference instead of by value.
Ref parameters are used to pass arguments by reference, allowing the called method to modify the value of the argument.
Out parameters are similar to ref parameters, but they do not require the caller to initialize the parameter before calling the method.
Example: void CalculateArea(ref int length, int width) { length = length * widt...
Delegates are type-safe function pointers in C# that allow methods to be passed as parameters.
Delegates are similar to function pointers in C++.
Delegates can be used to create callback functions.
Delegates are used in event handling in C#.
Delegates can be multicast, meaning they can hold references to multiple methods.
Example: delegate void MyDelegate(string message);
Equality in SQL refers to comparing two values to see if they are the same.
In SQL, equality is determined using the = operator.
It is used in WHERE clauses to filter data based on specific values.
Example: SELECT * FROM table WHERE column_name = 'value';
Delete removes rows one by one and can be rolled back, while Truncate removes all rows at once and cannot be rolled back.
Delete is a DML command while Truncate is a DDL command.
Delete can be rolled back using a transaction, while Truncate cannot be rolled back.
Delete fires triggers on each row deletion, while Truncate does not fire triggers.
Delete is slower as it removes rows one by one, while Truncate is faster as it ...
Clustered index physically reorders the data in the table while non-clustered index creates a separate structure.
Clustered index determines the physical order of data rows in a table.
Non-clustered index creates a separate structure to store the index data.
A table can have only one clustered index but multiple non-clustered indexes.
Clustered index is faster for retrieval but slower for insert and update operations.
Non-c...
Indexes are data structures that improve the speed of data retrieval operations in databases.
Indexes are used to quickly locate data without having to search every row in a database table.
They are created on columns in a database table to speed up the data retrieval process.
Examples of indexes include primary keys, unique keys, and non-unique keys.
Different types of joins are Inner Join, Left Join, Right Join, and Full Join.
Inner Join: Returns rows when there is a match in both tables.
Left Join: Returns all rows from the left table and the matched rows from the right table.
Right Join: Returns all rows from the right table and the matched rows from the left table.
Full Join: Returns rows when there is a match in one of the tables.
Stored Procedure is a precompiled set of SQL statements while Function is a reusable code block that returns a value.
Stored Procedure can perform multiple operations and can return multiple values, while Function returns only one value.
Stored Procedure can have input and output parameters, while Function can only have input parameters.
Stored Procedure can call a Function, but a Function cannot call a Stored Procedure.
S...
I applied via Approached by Company and was interviewed in May 2024. There were 3 interview rounds.
WebDriver is a tool for automating web application testing.
WebDriver is a web automation tool that allows you to control a browser from your code.
It supports multiple programming languages like Java, Python, etc.
WebDriver can interact with web elements like buttons, text fields, etc.
It can simulate user interactions such as clicking, typing, etc.
WebDriver is commonly used for automated testing of web applications.
Top trending discussions
I applied via Naukri.com and was interviewed in Dec 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2021. There were 2 interview rounds.
They ask to many technical question and ask to code also
They ask for your background and thing you learnt in your past
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
I applied via LinkedIn and was interviewed in Nov 2020. There were 4 interview rounds.
based on 6 interviews
Interview experience
based on 46 reviews
Rating in categories
Software Developer
17
salaries
| ₹2.8 L/yr - ₹7.2 L/yr |
Senior Test Engineer
8
salaries
| ₹4.1 L/yr - ₹5.6 L/yr |
Softwaretest Engineer
6
salaries
| ₹3.2 L/yr - ₹6.8 L/yr |
Executive - Developer
6
salaries
| ₹5.2 L/yr - ₹8 L/yr |
System Engineer
4
salaries
| ₹4.5 L/yr - ₹6 L/yr |
Teleperformance
Optum Global Solutions
FIS
Nagarro