i
Globant
Filter interviews by
Clear (1)
I applied via Naukri.com and was interviewed in Feb 2021. There were 4 interview rounds.
Implemented the Observer design pattern.
Used to maintain consistency between related objects
Allows for one-to-many relationships between objects
Used in event-driven systems
Example: Used to update UI when data changes in backend
I have implemented a microservices architecture for scalability and flexibility.
Implemented microservices architecture using Docker and Kubernetes
Used API Gateway for routing and load balancing
Implemented service discovery using Consul
Implemented circuit breaker pattern using Hystrix
Implemented centralized logging using ELK stack
Implemented distributed tracing using Zipkin
Implemented event-driven architecture using Kaf...
I improved stored procedure performance by optimizing queries and indexes.
Identified and removed unnecessary joins and subqueries
Used appropriate indexing to speed up query execution
Reduced the number of round trips to the database by using batch processing
Rewrote complex queries to simpler ones
Used stored procedure parameters instead of variables to avoid recompilation
Used SET NOCOUNT ON to reduce network traffic
Used
I applied via Referral and was interviewed before Jan 2021. There were 3 interview rounds.
OOPs concepts are used in real life to model objects and their behavior.
Encapsulation: A car's engine is encapsulated and can only be accessed through specific methods.
Inheritance: A sports car is a type of car that inherits properties and methods from the car class.
Polymorphism: A person can be a student, teacher, or employee, each with their own unique behavior.
Abstraction: A TV remote has buttons that abstract the c...
Hashmap is a data structure that stores key-value pairs and uses hashing to locate values based on their keys.
Hashmap uses an array of linked lists to store key-value pairs.
The hash function is used to convert the key into an index of the array.
If two keys have the same hash value, they are stored in the same linked list.
Hashmap provides constant time complexity for insertion, deletion, and retrieval of values.
Java's H...
I applied via Company Website and was interviewed in Mar 2020. There were 3 interview rounds.
I applied via Company Website and was interviewed before Feb 2021. There were 2 interview rounds.
I applied via Walk-in and was interviewed before May 2021. There was 1 interview round.
I applied via Recruitment Consultant and was interviewed in Sep 2020. There were 3 interview rounds.
I applied via Referral and was interviewed before Apr 2021. There were 4 interview rounds.
I applied via Referral and was interviewed before Nov 2020. There were 5 interview rounds.
I applied via Approached by Company and was interviewed in Dec 2018. There were 3 interview rounds.
SOX Compliance is a set of regulations that public companies must follow to ensure accurate financial reporting.
SOX stands for Sarbanes-Oxley Act
It was enacted in 2002 after accounting scandals at Enron and WorldCom
It requires companies to establish and maintain internal controls over financial reporting
It also mandates regular audits and certifications of financial statements
Non-compliance can result in fines, legal a
PCI DSS stands for Payment Card Industry Data Security Standard.
It is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
It was created by major credit card companies such as Visa, Mastercard, American Express, Discover, and JCB International.
It includes requirements for network security, data protection, access...
ISO 27K is a set of standards for information security management systems.
ISO 27K provides guidelines for managing and protecting sensitive information.
It includes controls for risk management, access control, and incident management.
ISO 27K certification is often required for companies handling sensitive data.
Examples of ISO 27K standards include ISO 27001 and ISO 27002.
Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.
Identify potential threats and vulnerabilities
Evaluate the impact of each threat or vulnerability
Determine the likelihood of each threat or vulnerability occurring
Prioritize risks based on their impact and likelihood
Develop a plan to mitigate or manage each risk
based on 24 reviews
Rating in categories
Senior Software Engineer
1.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
291
salaries
| ₹0 L/yr - ₹0 L/yr |
Automation Test Engineer
239
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
235
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Automation Test Engineer
210
salaries
| ₹0 L/yr - ₹0 L/yr |
Accenture
TCS
Infosys
Wipro