Filter interviews by
I applied via Referral and was interviewed before May 2023. There were 5 interview rounds.
Above average questions
Discussion on the Colour red for sometime
Print prime numbers from an array
Iterate through the array and check if each number is prime
A prime number is a number greater than 1 that is only divisible by 1 and itself
Examples: Input: [2, 3, 4, 5, 6], Output: [2, 3, 5]
Print Fibonacci series using iterative approach
Initialize variables for first two Fibonacci numbers (0 and 1)
Use a loop to calculate and print the next Fibonacci numbers by adding the previous two numbers
Continue the loop until the desired number of Fibonacci numbers are printed
Top trending discussions
SCD Type 2 implementation involves tracking historical changes in data by creating new records for each change.
Identify the columns that need to be tracked for changes
Add effective start and end dates to track the validity of each record
Insert new records for changes and update end dates for previous records
Maintain a surrogate key to uniquely identify each version of the record
I can join the team within 2 weeks.
I can start within 2 weeks of receiving the offer.
I need to give notice to my current employer.
I may need to relocate, which could affect my start date.
I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
The Aptitude Test session accesses mathematical and logical reasoning abilities
Vlookup is a function in Excel used to search for a value in a table and return a corresponding value from another column.
Vlookup stands for 'Vertical Lookup'
It is commonly used in Excel to search for a value in the leftmost column of a table and return a value in the same row from a specified column
Syntax: =VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])
Example: =VLOOKUP(A2, B2:D10, 3, FALSE) - searc...
My day in my previous organization involved analyzing large datasets, creating reports, and presenting findings to stakeholders.
Reviewing and cleaning large datasets to ensure accuracy
Creating visualizations and reports to communicate insights
Collaborating with team members to identify trends and patterns
Presenting findings to stakeholders in meetings or presentations
I possess strong technical skills in data analysis, including proficiency in programming languages, statistical analysis, and data visualization tools.
Proficient in programming languages such as Python, R, SQL
Skilled in statistical analysis and data modeling techniques
Experience with data visualization tools like Tableau, Power BI
Knowledge of machine learning algorithms and techniques
A Pivot Table is a data summarization tool used in spreadsheet programs to analyze, summarize, and present data in a tabular format.
Pivot tables allow users to reorganize and summarize selected columns and rows of data to obtain desired insights.
Users can easily group and filter data, perform calculations, and create visualizations using pivot tables.
Pivot tables are commonly used in Excel and other spreadsheet program...
To find the highest-paid employee in each department, we need to group employees by department and then select the employee with the highest salary in each group.
Group employees by department
Find the employee with the highest salary in each group
Retrieve the employee's name, salary, and department name
I applied via Walk-in and was interviewed in Nov 2024. There were 3 interview rounds.
It's walkin, so they conducted 1 technical mcqs round.
HashMap in Java is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values based on keys.
HashMap uses an array of buckets to store key-value pairs.
Keys are hashed to determine the index in the array where the key-value pair will be stored.
In case of hash collisions, a linked list or a balanced tree is used to store multiple key-value pairs in the same bucket.
HashMap allows null keys...
Function to find and return all non-repeating characters in an array of strings.
Iterate through the array and count the occurrences of each character using a HashMap.
Then iterate through the array again and check if the count of each character is 1, if so add it to the result list.
Return the list of non-repeating characters.
To find the 3rd highest salary in a database, we can use a SQL query with the 'LIMIT' and 'OFFSET' keywords.
Use a SQL query with 'ORDER BY salary DESC' to sort the salaries in descending order.
Use 'LIMIT 1 OFFSET 2' to skip the first two highest salaries and retrieve the third highest salary.
Example: SELECT salary FROM employees ORDER BY salary DESC LIMIT 1 OFFSET 2;
A qualifier in Java is used to specify additional information about a primary, which is the main data type or variable.
A primary in Java is the main data type or variable, while a qualifier provides additional information about the primary.
Qualifiers can be used to modify the behavior or characteristics of a primary.
For example, in Java, 'final' is a qualifier that can be used to make a variable constant.
The main difference is that @RestController is a specialized version of @Controller that is used for RESTful web services.
Both @Controller and @RestController are used in Spring MVC to handle HTTP requests, but @RestController is specifically used for RESTful web services.
@Controller is used to create web pages, while @RestController is used to return data in JSON or XML format.
@RestController is a convenience annotati...
OOP concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: class Dog extends Animal.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: private variables with public getter and setter methods.
Polymorphism: Ability for objects to be treated as instances of their paren...
Microservices communicate with each other through various communication protocols like HTTP, messaging queues, and gRPC.
Microservices can communicate over HTTP using RESTful APIs.
Messaging queues like RabbitMQ or Kafka can be used for asynchronous communication between microservices.
gRPC is a high-performance, open-source RPC framework that can be used for communication between microservices.
Service discovery mechanism...
Microservice endpoints can be accessed using HTTP requests with the appropriate URL
Use HTTP methods like GET, POST, PUT, DELETE to interact with the microservice
Construct the URL with the base URL of the microservice and the specific endpoint path
Include any necessary headers or parameters in the request for authentication or data filtering
Microservices allow for modular, scalable, and flexible software development by breaking down applications into smaller, independent services.
Microservices enable easier maintenance and updates as each service can be developed, deployed, and scaled independently.
They improve fault isolation, as failures in one service do not necessarily affect the entire application.
Microservices promote agility and faster time-to-mark...
posted on 7 Jan 2025
I applied via Job Portal and was interviewed in Dec 2024. There was 1 interview round.
I applied via Walk-in and was interviewed in Dec 2024. There were 3 interview rounds.
English speaking test , one minute talk on particular topic , english grammar, typing test , reasoning and quants little
posted on 17 Dec 2024
I applied via Referral and was interviewed in Nov 2024. There was 1 interview round.
BGP is used for routing and exchanging routing information between different autonomous systems.
BGP allows for dynamic routing between different autonomous systems
It provides redundancy and load balancing by choosing the best path for data traffic
BGP helps in preventing network loops and ensuring efficient data routing
It is commonly used by Internet Service Providers (ISPs) to exchange routing information
BGP is essenti...
A switch stack is a group of network switches that are interconnected and operate as a single unit.
Switch stack simplifies network management by allowing multiple switches to be managed as one entity.
It provides high availability and redundancy by allowing one switch to take over if another fails.
Switch stack can also increase network performance by load balancing traffic across multiple switches.
Examples of switch sta...
Configurations required in wireless networking include SSID, security settings, encryption type, and channel selection.
Set up a unique SSID to identify the network
Choose appropriate security settings such as WPA2-PSK
Select encryption type like AES for secure data transmission
Optimize channel selection to avoid interference
Different types of VPNs include remote access VPN, site-to-site VPN, and client-to-site VPN.
Remote access VPN allows individual users to connect to a private network remotely.
Site-to-site VPN connects multiple networks together over the internet.
Client-to-site VPN allows individual devices to connect to a private network remotely.
Other types include MPLS VPN, SSL VPN, and IPsec VPN.
The purpose of native VLAN is to carry untagged traffic across a trunk link.
Native VLAN is used for untagged traffic on a trunk link
It allows devices that do not support VLAN tagging to communicate over the trunk link
Native VLAN should be the same on both ends of the trunk link to avoid VLAN hopping attacks
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
10 min, simple question on programming skills
I have used the asynchronous messaging pattern for Microservice communication.
Implemented messaging queues like RabbitMQ or Kafka for decoupled communication
Used message brokers to enable communication between Microservices
Leveraged event-driven architecture for real-time updates and scalability
I have used Application Insights for monitoring and analyzing the performance of .NET applications.
Used Application Insights to track application performance metrics
Analyzed telemetry data to identify performance bottlenecks
Set up alerts and notifications for critical issues
Integrated Application Insights with Azure DevOps for continuous monitoring
We use in-memory caching technique in our project to improve performance and reduce database load.
In-memory caching is used to store frequently accessed data in memory for quick retrieval
Helps reduce database load and improve application performance
Examples: using MemoryCache in .NET, Redis caching, caching frequently accessed data like user profiles or product information
Yes, API Gateways are used in Microservices to manage and secure communication between services.
API Gateways act as a single entry point for clients to access multiple microservices
They handle authentication, authorization, rate limiting, logging, and monitoring
Examples of API Gateways include Kong, Apigee, and AWS API Gateway
We are using OAuth 2.0 for single sign on in the project.
OAuth 2.0 is a widely used authorization framework that enables a third-party application to obtain limited access to an HTTP service.
It allows users to log in once and access multiple applications without having to log in again.
OAuth 2.0 provides secure delegated access to resources without sharing user credentials.
JWT token is a JSON Web Token used for secure transmission of information between parties.
JWT token is a compact and self-contained way to transmit information between parties.
It is digitally signed to verify its authenticity and integrity.
JWT tokens consist of three parts: header, payload, and signature.
They are commonly used for authentication and information exchange in web applications.
Example: JWT tokens are often
Exception handling and filters in .NET Core Web API
Use try-catch blocks to handle exceptions in the code
Implement global exception handling middleware to catch unhandled exceptions
Use filters like [Authorize] for authentication and [ValidateAntiForgeryToken] for CSRF protection
Create custom exception filters by implementing IExceptionFilter interface
based on 29 reviews
Rating in categories
Senior Software Engineer
74
salaries
| ₹4.2 L/yr - ₹12 L/yr |
Associate Technical Leader
45
salaries
| ₹7.2 L/yr - ₹16 L/yr |
Technical Lead
39
salaries
| ₹12 L/yr - ₹27 L/yr |
Software Engineer
28
salaries
| ₹3 L/yr - ₹7.8 L/yr |
Technology Specialist
26
salaries
| ₹10 L/yr - ₹17 L/yr |
Persistent Systems
Mphasis
LTIMindtree
TCS