i
IDRBT
Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There was 1 interview round.
To swap two numbers without using a third variable, use arithmetic operations.
Assign the sum of the two numbers to the first number
Subtract the second number from the sum and assign it to the second number
Subtract the original first number (now stored in the second number) from the sum and assign it to the first number
I applied via Company Website and was interviewed in Sep 2021. There was 1 interview round.
I was interviewed before Nov 2021.
I applied via Referral and was interviewed in Aug 2020. There were 4 interview rounds.
Cipher suite is a set of cryptographic algorithms used to secure network connections.
Cipher suite determines the encryption and authentication algorithms used in a network connection.
It includes protocols like SSL and TLS.
Examples of cipher suites include TLS_RSA_WITH_AES_128_CBC_SHA and TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384.
IDRBT interview questions for popular designations
Top trending discussions
I applied via LinkedIn and was interviewed before Jul 2020. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2020. There were 5 interview rounds.
Functions return a value while stored procedures do not.
Functions can be used in SQL statements while stored procedures cannot.
Functions can be called from within stored procedures.
Functions can be used in views while stored procedures cannot.
Functions can have input parameters while stored procedures can have both input and output parameters.
A unique key is a field or combination of fields in a database table that uniquely identifies each record.
A unique key ensures that no two records in a table have the same values for the specified field(s).
It can be a single field or a combination of fields.
It is used to enforce data integrity and prevent duplicate records.
Examples include primary keys, candidate keys, and alternate keys.
There are four types of joining in SQL: Inner Join, Left Join, Right Join, and Full Join.
Inner Join returns only the matching rows from both tables.
Left Join returns all the rows from the left table and matching rows from the right table.
Right Join returns all the rows from the right table and matching rows from the left table.
Full Join returns all the rows from both tables, with NULL values in the columns where there ...
A constraint is a limitation or restriction on something.
Constraints can be applied in various fields such as software development, engineering, and project management.
In software development, constraints can include limitations on memory usage, processing speed, and storage capacity.
In engineering, constraints can include limitations on materials, dimensions, and weight.
In project management, constraints can include l...
ASP.NET life cycle is the series of events that occur during the processing of a request.
ASP.NET life cycle includes stages like initialization, page rendering, and disposal.
During initialization, the page and its controls are created and initialized.
During page rendering, the page is processed and HTML is generated.
During disposal, resources used by the page are released.
Events like Page_Load and Page_PreRender occur ...
View state is a hidden state of the page that stores values of controls and other page-specific data.
View state is used to maintain the state of server-side controls between postbacks.
It is stored in a hidden field on the page and is encrypted for security purposes.
View state can be disabled to improve performance, but this may cause issues with control state.
Example: A user fills out a form, but then navigates away fr...
Session is a way to store and retrieve user data between HTTP requests.
Session is a temporary storage of user data on the server side.
It is identified by a unique session ID which is stored in a cookie or URL parameter.
Session data can be used to maintain user state, such as login status or shopping cart contents.
response.redirect is a method used in web development to redirect the user to a different URL.
response.redirect is used to redirect the user to a different URL
It is commonly used in web applications to redirect users after a successful login or when accessing restricted pages
The method can be used with different programming languages and frameworks, such as ASP.NET, PHP, and Node.js
The redirected URL can be specified a
A query string is a part of a URL that contains data to be passed to a web server.
It starts with a question mark (?) and is followed by key-value pairs separated by ampersands (&).
It is commonly used to filter or sort data on a web page.
Example: www.example.com/search?q=apple&category=fruit
To use it, simply append the query string to the end of the URL.
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they were objects of the same class.
It is achieved through method overriding and method overloading.
Example: A parent class Animal can have child classes like Dog, Cat, and Bird. Each child class can have its own implementation of the method 'makeSound'.
Polymorphism makes code more flexibl
The 4 pillars of C++ are Abstraction, Encapsulation, Inheritance, and Polymorphism.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together to prevent external interference.
Inheritance: Creating new classes from existing ones, inheriting their properties and methods.
Polymorphism: Using a single interface to represent multiple types of objects.
To setup a network in a lab, you need equipment and a plan.
Determine the network topology and design
Choose appropriate networking equipment such as routers, switches, and cables
Configure network settings such as IP addresses and subnet masks
Test the network to ensure connectivity and functionality
Consider security measures such as firewalls and access control
Examples of equipment: Cisco routers, Juniper switches, Cat6
I was interviewed before Aug 2016.
I applied via Company Website and was interviewed before Dec 2021. There were 2 interview rounds.
Java stream api collection framework is used for processing collections of objects.
Stream API provides a functional approach to process collections in Java
It allows operations like filter, map, reduce, etc. to be performed on collections
Example: List
Collection framework provides interfaces like List, Set, Map,
based on 1 interview
Interview experience
Research Associate
31
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Associate
10
salaries
| ₹0 L/yr - ₹0 L/yr |
Administration Assistant
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Cyber Security Analyst
4
salaries
| ₹0 L/yr - ₹0 L/yr |
National Payments Corporation of India
Reserve Bank of India
Institute Development Research In Banking Technology
Securities and Exchange Board of India