i
HCLTech
Filter interviews by
Clear (1)
I applied via Walk-in
There are various types of constraints in DOT NET development, including primary key, foreign key, unique, check, and default constraints.
Primary key constraints ensure each record in a table is unique.
Foreign key constraints enforce referential integrity between tables.
Unique constraints ensure that all values in a column are distinct.
Check constraints validate the data before it is inserted or updated.
Default constra...
Independent class can be instantiated while abstract class cannot be instantiated directly.
Independent class can be directly instantiated using the 'new' keyword.
Abstract class cannot be instantiated directly, it can only be used as a base class for other classes.
Independent class does not require any derived class to implement its members.
Abstract class can have abstract methods that must be implemented by derived cla
Seeking new challenges, growth opportunities, and a better work-life balance.
Looking for new challenges and opportunities to learn and grow.
Seeking a better work-life balance.
Interested in working with new technologies or in a different industry.
Wanting to advance my career and take on more responsibilities.
Company restructuring or changes in management.
Lazy loading is a design pattern where data is loaded only when it is needed, improving performance and reducing resource consumption.
Lazy loading can be implemented by loading data on demand rather than loading all data at once.
One common way to implement lazy loading is by using proxy objects that only load data when a property is accessed.
Lazy loading can also be achieved using frameworks like Entity Framework in .N...
Sheiks class is a class in C# that allows for secure communication over a network using SSL/TLS protocols.
Sheiks class is part of the System.Security.Cryptography namespace in C#.
It provides methods for creating secure channels for communication.
It can be used to implement secure client-server communication in applications.
Examples include using Sheiks class to encrypt data sent over a network or to authenticate client
Shield class is used for encapsulating sensitive data and providing controlled access to it.
Shield class helps in protecting sensitive data from unauthorized access.
It allows for controlled access to the data through defined methods.
Examples include encrypting passwords in a Shield class to prevent direct access.
Abstraction is the concept of hiding complex implementation details and showing only the necessary features to the user.
Abstraction helps in reducing complexity and improving code readability.
In SQL, you can select even number rows using the MOD function.
Example: SELECT * FROM table_name WHERE MOD(row_number, 2) = 0;
HCLTech interview questions for designations
I applied via Job Portal
What people are saying about HCLTech
I applied via Walk-in and was interviewed before Dec 2020. There were 3 interview rounds.
I was interviewed in Mar 2021.
I applied via Company Website and was interviewed before Dec 2020. There were 4 interview rounds.
Some of the top questions asked at the HCLTech DOT NET Developer interview -
based on 8 interviews
1 Interview rounds
based on 5 reviews
Rating in categories
Software Engineer
23.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
21.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
15.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Engineer
14.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Analyst
14.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
Accenture
Cognizant