Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by IndiaBonds Team. If you also belong to the team, you can get access from here

IndiaBonds Verified Tick

Compare button icon Compare button icon Compare
2.0

based on 4 Reviews

Filter interviews by

IndiaBonds Software Executive Interview Questions and Answers for Experienced

Updated 22 Mar 2022

IndiaBonds Software Executive Interview Experiences for Experienced

1 interview found

I applied via Recruitment Consulltant and was interviewed in Sep 2021. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different between Enumerable and Queryable
  • Ans. 

    Enumerable is in-memory collection while Queryable is a database query.

    • Enumerable is used for in-memory collections like arrays and lists.

    • Queryable is used for querying databases using LINQ.

    • Enumerable is slower than Queryable for large datasets.

    • Queryable supports deferred execution while Enumerable does not.

    • Examples of Enumerable methods include Where, Select, and OrderBy.

    • Examples of Queryable methods include Where, Se

  • Answered by AI
  • Q2. Explain Service oriented architecture.
  • Ans. 

    Service oriented architecture (SOA) is a design pattern for building software applications as a collection of loosely coupled services.

    • SOA allows for better scalability, flexibility, and reusability of software components.

    • Services communicate with each other using standardized protocols such as HTTP, SOAP, and REST.

    • SOA can be implemented using various technologies such as ESBs, microservices, and APIs.

    • Examples of SOA-b...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for IndiaBonds Software Executive interview:
  • C#
  • .netcore
Interview preparation tips for other job seekers - Should be able to explain your current software.

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

2 hrs probablity questions

Round 2 - Technical 

(2 Questions)

  • Q1. Find max element from array
  • Q2. Binary seeach algo
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed in Nov 2023. There were 2 interview rounds.

Round 1 - Coding Test 

They give a standard application to develop in mvvm or clean architecture, don't forget to write unit tests

Round 2 - One-on-one 

(5 Questions)

  • Q1. Mostly discuss on the implementation of the project you've done in round one
  • Q2. Flutter is addon
  • Ans. 

    Flutter is a UI toolkit for building natively compiled applications for mobile, web, and desktop from a single codebase.

    • Flutter is an open-source framework developed by Google.

    • It uses the Dart programming language.

    • Flutter allows for hot reload, which enables developers to see changes instantly.

    • It provides a rich set of pre-built widgets for building user interfaces.

    • Flutter can be used to create apps for iOS, Android, w

  • Answered by AI
  • Q3. Explain about compose way of thinking.
  • Ans. 

    Compose way of thinking involves breaking down complex problems into smaller, manageable parts and then combining them to create a solution.

    • Break down a problem into smaller components

    • Solve each component individually

    • Combine the solutions to create a complete solution

    • Example: Using functions to break down a complex task into smaller functions and then combining them to achieve the desired outcome

  • Answered by AI
  • Q4. Difference between presenter and viewmodel
  • Q5. Explain about lifecycle of view
  • Ans. 

    Lifecycle of view refers to the stages a view goes through from creation to destruction in an application.

    • Creation: View is initialized and loaded into memory.

    • Layout: View is positioned and sized on the screen.

    • Display: View is rendered and displayed to the user.

    • Interaction: User interacts with the view through input events.

    • Destruction: View is removed from memory when no longer needed.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Good experience, and practical questions and friendly talk.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Basic js and react
Round 2 - Technical 

(1 Question)

  • Q1. Advance Js and react
Round 3 - One-on-one 

(1 Question)

  • Q1. Data structure and managerial
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Not Selected

I applied via Referral and was interviewed in Jan 2024. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Java8 Concepts, Rest api concept
Round 2 - Technical 

(1 Question)

  • Q1. Microservices architecture
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(1 Question)

  • Q1. Oops, basic ,SQL ,ado
Round 2 - Coding Test 

Curd operation with SQL connectivity

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Basics of your technical skills
Round 3 - Technical 

(1 Question)

  • Q1. More Projects related questions

I was interviewed in May 2021.

Round 1 - Coding Test 

(2 Questions)

Round duration - 145 minutes
Round difficulty - Hard

The assessment consisted of four components, a code debugging section (20 minutes), a coding test (70 minutes), a workstyles assessment (20 minutes), and a reasoning ability section (35 minutes). The coding environment is very user-friendly and easy to use.

  • Q1. Rotate matrix to the right

    You have been given a matrix ‘MAT’ of size 'N' * 'M' (where 'N' and 'M' denote the number of rows and columns respectively) and a positive integer...

  • Ans. Row-wise rotation

    This approach is based on the fact that when we rotate an array to the right by ‘K’ times, it shifts ‘K’ elements from the end to the beginning of the array while the remaining elements shift towards the end. The effective rotations in ‘MAT’ can be from 0 to 'M' - 1, as we get the same matrix ‘MAT’ after every 'M' rotations. So, we will set ‘K’ to ‘K’ % ‘M’.

     

    Now, we traverse ‘MAT’ row-wise. We wil...

  • Answered by CodingNinjas
  • Q2. Palindrome Partitioning

    You are given a string 'S'. Your task is to partition 'S' such that every substring of the partition is a palindrome. You need to return all possible palindrome part...

  • Ans. Backtracking with Dynamic Programming
    • We are iterating each time to check whether a given substring is palindrome or not and there we are iterating the same substring of string again and again. So there are overlapping subproblems.
    • So we use dynamic programming. To overcome the overlapping subproblems we can initially create the DP table which stores if substring[i….j] is palindrome or not. We maintain a boolean dp[N][N]...
  • Answered by CodingNinjas
Round 2 - Face to Face 

(2 Questions)

Round duration - 60 Minutes
Round difficulty - Medium

The online round was held on the Amazon Chime platform. The interviewer was very friendly and eager to know what I was thinking for every problem which he asked and always tried to make me speak up my thoughts and approach for solving the specific problem and understand my point too.

  • Q1. Form the Biggest Number

    Given an array “A” of positive integers. Your task is to make the largest number possible formed by concatenating each of the array elements exactly once.

    Example:
    Let's say t...
  • Ans. Brute Force approach

    The idea is to try out all the possible answers one by one and find out the largest one among all of them.

     

    To implement this approach, we will generate all the permutations of the first 'N' positive integers and concatenate all the array elements in the order of the permutation.

     

    For e.g. N=3 and array A = [ 3, 34, 7 ].

     

    Let's generate all the possible answers using the permutations. Le...

  • Answered by CodingNinjas
  • Q2. Rat In A Maze

    You are given a starting position for a rat which is stuck in a maze at an initial point (0, 0) (the maze can be thought of as a 2-dimensional plane). The maze would be given in the form of a...

  • Ans. Bactracking

    Approach: We can start the traversal of the paths from the rat’s starting position, i.e. (0,0) keeping track of the visited cells during the traversal. We will recursively go through all the paths possible until the last index of the grid (destination) is reached, and add the path information using which the rat successfully reached the end.

     

    Algorithm is as follows:

     

    1. Take the starting position of th...
  • Answered by CodingNinjas
Round 3 - Face to Face 

(2 Questions)

Round duration - 75 minutes
Round difficulty - Medium

The online round was held on the Amazon Chime platform. The interviewer was very friendly and eager to know what I was thinking for every problem which he asked and always tried to make me speak up my thoughts and approach for solving the specific problem and understand my point too.

  • Q1.  Infix to Postfix

    You are given a string EXP which is a valid infix expression. Convert the given infix expression to postfix expression.

    Infix expression is of the form a op b. Where operator is is bet...

  • Ans. Stack

    We will scan the expression from left to write and if we encounter an operand we will append it to our answer. If we encounter an operator we will pop all the operators with equal or higher precedence and append them to our answer. And push the current operator. In the end, we will empty the stack.

    Order of precedence = [ ‘^’, ‘*’ and ‘/’, ‘+’ and ‘-’, ‘(’, ‘)’]

    Order of precedence [ link ]

    The algorithm will be-

    1. ANS ...
  • Answered by CodingNinjas
  • Q2. Level Order Traversal

    You have been given a Binary Tree of integers. You are supposed to return the level order traversal of the given tree.

    For example:
    For the given binary tree
    

    The level order tra...

  • Ans. Breadth First Search

    In the level order traversal, we will be using queue data structure which has the property FIRST IN FIRST OUT that’s why which nodes come first in current level the children of that node will also come first for the next level. So, we visit all the nodes one by one of the current level and push into the queue so that when we will be complete with the current level, then we can start exploring nodes ...

  • Answered by CodingNinjas
Round 4 - Face to Face 

(1 Question)

Round duration - 60 Minutes
Round difficulty - Medium

The online round was held on the Amazon Chime platform. The interviewer was very friendly and eager to know what I was thinking for every problem which he asked and always tried to make me speak up my thoughts and approach for solving the specific problem and understand my point too.

  • Q1. Fenwick Tree

    You are given an array/list 'ARR' of ‘N’ integers, and ‘Q’ queries. Each query can be of two types:

    Given 2 integers ‘L’,’R’ ( L>=0 and R<N ) find the sum of all the elements ...

  • Ans. Brute Force Approach
    • The key idea of the approach is to process the queries as asked. i.e If range sum is asked we do a range sum using a loop and update the values in the array if it is an update query.
    • Update will be a constant time operation but range sum can take time of order of ‘N’ .

     

    We can take the following approach:

     

    • For queries of type 1, we take a loop and iterate from ‘L’ to ‘R’ to find the sum and p...
  • Answered by CodingNinjas

Interview Preparation Tips

Professional and academic backgroundI applied for the job as SDE - 1 in HyderabadEligibility criteriaAbove 7 CGPAAmazon interview preparation:Topics to prepare for the interview - Data Structures, OOPs, Competitive programming, System Design, Core subjects, AlgorithmsTime required to prepare for the interview - 4 monthsInterview preparation tips for other job seekers

Tip 1 : Practice Leetcode medium level questions properly
Tip 2 : Low-level and high-level system design is very important
Tip 3 : Always make notes of core subjects like DBMS, OS, CN beforehand to be able to revise before interviews

Application resume tips for other job seekers

Tip 1 : Write the technology about which you know in detail and can discuss pros and cons of using it.
Tip 2 : Prepare your resume well and add 2 good projects for project discussion with good readme file on github.

Final outcome of the interviewSelected

Skills evaluated in this interview

Software Engineer Interview Questions & Answers

IBM user image shahanaza. umachagi

posted on 16 May 2021

Interview Questionnaire 

14 Questions

  • Q1. C programming vhdl mat ect
  • Q2. What is c? How it's function work
  • Ans. 

    C is a programming language used for system programming, embedded systems, and game development.

    • C was developed by Dennis Ritchie at Bell Labs in 1972.

    • It is a compiled language, meaning that the code is translated into machine-readable instructions before execution.

    • C is known for its efficiency and low-level control over hardware, making it a popular choice for operating systems and device drivers.

    • C functions are defin...

  • Answered by AI
  • Q3. C data type and some eg
  • Q4. Y use header file gv one eg
  • Ans. 

    Header files are used to declare functions, variables, and constants that are used in multiple source files.

    • Header files allow for modular programming and code reuse.

    • They help to avoid code duplication and reduce errors.

    • Examples of header files include stdio.h, math.h, and string.h.

    • Header files are included using the #include preprocessor directive.

  • Answered by AI
  • Q5. What is microprocessor and how its work
  • Ans. 

    A microprocessor is a small computer chip that performs arithmetic and logic operations.

    • Microprocessors are the heart of modern computers and electronic devices.

    • They are made up of millions of transistors that switch on and off to perform calculations.

    • Microprocessors fetch instructions from memory, decode them, and execute them.

    • Examples of microprocessors include Intel's Pentium and AMD's Ryzen processors.

    • Microprocesso...

  • Answered by AI
  • Q6. What is micro control and how its work
  • Ans. 

    Micro control is a type of control system that uses microprocessors to control various devices and processes.

    • Micro control systems are used in various applications such as home automation, industrial automation, and robotics.

    • They are designed to be compact and efficient, with low power consumption and high processing power.

    • Micro control systems can be programmed using various programming languages such as C, C++, and a...

  • Answered by AI
  • Q7. Embedded systems and how its work
  • Ans. 

    Embedded systems are computer systems designed to perform specific tasks within a larger system.

    • Embedded systems are often used in devices such as medical equipment, automobiles, and home appliances.

    • They typically have limited processing power and memory compared to general-purpose computers.

    • They are designed to be reliable and efficient, often running on low-power processors.

    • Programming languages commonly used for emb...

  • Answered by AI
  • Q8. Embedded systems applications
  • Q9. What is network and how many type are ther?
  • Ans. 

    A network is a group of interconnected devices that communicate with each other. There are three types of networks: LAN, WAN, and MAN.

    • A LAN (Local Area Network) is a network that covers a small area, like a home or office.

    • A WAN (Wide Area Network) is a network that covers a large area, like a city or country.

    • A MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, like...

  • Answered by AI
  • Q10. Lan,wan,men work
  • Q11. What is modulation
  • Ans. 

    Modulation is the process of varying a signal's characteristics to transmit information.

    • Modulation is used in various communication systems to transmit information over a distance.

    • It involves varying one or more of the signal's properties such as amplitude, frequency, or phase.

    • Examples of modulation techniques include amplitude modulation (AM), frequency modulation (FM), and phase modulation (PM).

  • Answered by AI
  • Q12. What is amplitude
  • Ans. 

    Amplitude is the measure of the height of a wave from its resting position.

    • Amplitude is the maximum displacement of a wave from its equilibrium position.

    • It is measured in units of length, such as meters or feet.

    • In sound waves, amplitude determines the loudness of the sound.

    • In light waves, amplitude determines the brightness of the light.

    • Amplitude can be positive or negative, depending on the direction of the displaceme

  • Answered by AI
  • Q13. What is use
  • Ans. 

    Use is the purpose or function of something.

    • Use defines the intended purpose of a product or service.

    • It helps users understand how to utilize the product effectively.

    • Use can also refer to the act of employing something for a specific task.

    • For example, the use of a hammer is to drive nails into wood.

  • Answered by AI
  • Q14. What is amplification
  • Ans. 

    Amplification is the process of increasing the magnitude of a signal.

    • Amplification is commonly used in audio systems to increase the volume of sound.

    • It can also refer to the process of increasing the power of an electrical signal.

    • Amplification can be achieved through the use of amplifiers or other electronic devices.

    • In genetics, amplification refers to the process of making multiple copies of a specific DNA sequence.

    • Am...

  • Answered by AI

Skills evaluated in this interview

I applied via Walk-in and was interviewed in Nov 2020. There were 5 interview rounds.

Interview Questionnaire 

25 Questions

  • Q1. Briefly explain the method you will use to execute an array linked list?
  • Ans. 

    An array linked list can be executed using a loop to traverse through the array and access the linked nodes.

    • Create an array to store the linked nodes

    • Assign the first node to the first element of the array

    • Use a loop to traverse through the array and access the linked nodes

    • To access the next node, use the index of the current node as the index of the next node in the array

    • Stop the loop when the last node is reached

  • Answered by AI
  • Q2. What are character constants in C++?
  • Ans. 

    Character constants are fixed values represented by a single character in C++.

    • They are enclosed in single quotes (' ')

    • Examples include 'a', 'B', '5', '$'

    • They are also known as character literals

  • Answered by AI
  • Q3. Define the terms OSI, TCP & IP.
  • Ans. 

    OSI, TCP & IP are networking protocols used for communication between devices on a network.

    • OSI (Open Systems Interconnection) is a conceptual model that defines how data is transmitted over a network.

    • TCP (Transmission Control Protocol) is a protocol that ensures reliable transmission of data between devices.

    • IP (Internet Protocol) is a protocol that handles the addressing and routing of data packets between devices on a...

  • Answered by AI
  • Q4. What are streams in C++? What are predefined streams in C++?
  • Ans. 

    Streams in C++ are used for input and output operations. Predefined streams in C++ include cin, cout, cerr, and clog.

    • Streams in C++ are objects that allow reading from or writing to external sources or destinations.

    • cin is the standard input stream used for reading input from the user.

    • cout is the standard output stream used for printing output to the console.

    • cerr is the standard error stream used for printing error mess...

  • Answered by AI
  • Q5. Define RDBMS.
  • Ans. 

    RDBMS stands for Relational Database Management System.

    • It is a type of database management system that stores data in tables with relationships between them.

    • It uses SQL (Structured Query Language) to manipulate and retrieve data.

    • Examples include MySQL, Oracle, and Microsoft SQL Server.

  • Answered by AI
  • Q6. What do you mean by normalisation?
  • Ans. 

    Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.

    • It involves breaking down a table into smaller tables and defining relationships between them.

    • Normalization helps to eliminate data inconsistencies and anomalies.

    • There are different levels of normalization, with each level having specific rules to follow.

    • Examples of normalization include converting repeating gr...

  • Answered by AI
  • Q7. Where do we generally create INDEX?
  • Ans. 

    INDEX is generally created on columns that are frequently used in WHERE, JOIN, and ORDER BY clauses.

    • INDEX improves the performance of SELECT queries.

    • INDEX should be created on columns with high selectivity.

    • INDEX should not be created on columns with low selectivity.

    • Examples of columns to create INDEX on are primary keys, foreign keys, and columns used in search queries.

  • Answered by AI
  • Q8. What is object oriented model?
  • Ans. 

    Object oriented model is a programming paradigm that uses objects to represent real-world entities.

    • Objects have properties and methods that define their behavior

    • Encapsulation, inheritance, and polymorphism are key concepts in OOP

    • Examples of OOP languages include Java, C++, and Python

  • Answered by AI
  • Q9. What is the "top-n analysis" in DBMS?
  • Ans. 

    Top-n analysis is a technique used in DBMS to retrieve the top n records based on a specific criteria.

    • Used to retrieve top n records

    • Based on specific criteria

    • Commonly used in data analysis and reporting

  • Answered by AI
  • Q10. Why is DML provided?
  • Ans. 

    DML is provided to manipulate data in a database.

    • DML stands for Data Manipulation Language.

    • It is used to insert, update, delete, and retrieve data from a database.

    • DML commands include INSERT, UPDATE, DELETE, and SELECT.

    • DML is essential for managing and maintaining data in a database.

  • Answered by AI
  • Q11. What are reference variables and how is it defined in C++?
  • Ans. 

    Reference variables in C++ are aliases for other variables, allowing direct access and manipulation of the original data.

    • Reference variables are declared using an ampersand (&) symbol.

    • They must be initialized when declared and cannot be reassigned to refer to a different variable.

    • Changes made to a reference variable affect the original variable it refers to.

    • They are commonly used to pass variables by reference to funct...

  • Answered by AI
  • Q12. Differentiate RDBMS and DBMS.
  • Ans. 

    RDBMS is a type of DBMS that stores data in a structured manner using tables with relationships.

    • RDBMS stands for Relational Database Management System

    • Data is stored in tables with predefined relationships

    • Data is accessed using SQL (Structured Query Language)

    • Examples include MySQL, Oracle, and SQL Server

    • DBMS is a broader term that includes all types of database management systems

    • Examples of DBMS include MongoDB, Cassand

  • Answered by AI
  • Q13. What are the various forms of normalisation?
  • Ans. 

    Normalization is a process of organizing data in a database to eliminate redundancy and improve data integrity.

    • First Normal Form (1NF) - Eliminate duplicate data by separating them into multiple tables.

    • Second Normal Form (2NF) - Remove partial dependencies by creating separate tables for sets of attributes.

    • Third Normal Form (3NF) - Eliminate transitive dependencies by creating separate tables for related attributes.

    • Boy...

  • Answered by AI
  • Q14. Can you tell us something about scope rules in C++?
  • Ans. 

    Scope rules in C++ determine the visibility and accessibility of variables and functions within a program.

    • Variables declared within a block have local scope and are only accessible within that block.

    • Global variables have file scope and can be accessed from any function within the file.

    • Function parameters have function scope and are only accessible within that function.

    • Nested blocks can have their own scope, and variabl...

  • Answered by AI
  • Q15. Do you think BCNF is better than 2NF & 3NF? Why?
  • Ans. 

    BCNF is not necessarily better than 2NF & 3NF, it depends on the specific requirements of the database.

    • BCNF is the highest normal form and ensures that there are no non-trivial functional dependencies between any subset of candidate keys.

    • 2NF and 3NF are also important and should be used when appropriate.

    • For example, if a database has a composite primary key and non-key attributes that depend on only one part of the key...

  • Answered by AI
  • Q16. What is Operating System?
  • Ans. 

    An operating system is a software that manages computer hardware and software resources.

    • It acts as an interface between the user and the computer hardware.

    • It provides services to applications and manages system resources.

    • Examples include Windows, macOS, Linux, Android, and iOS.

  • Answered by AI
  • Q17. Differentiate exclusive lock and shared lock.
  • Ans. 

    Exclusive lock is used when a resource is being modified and prevents other processes from accessing it. Shared lock allows multiple processes to read a resource simultaneously.

    • Exclusive lock is used for write operations, while shared lock is used for read operations.

    • Exclusive lock blocks other processes from acquiring both exclusive and shared locks on the same resource.

    • Shared lock allows multiple processes to acquire...

  • Answered by AI
  • Q18. What is difference between rand() and srand()?
  • Ans. 

    rand() generates a random number, srand() seeds the random number generator.

    • rand() generates a pseudo-random number between 0 and RAND_MAX

    • srand() sets the seed for the random number generator used by rand()

    • srand() should be called before rand() to ensure different sequences of random numbers

    • Example: srand(time(NULL)) sets the seed to the current time, ensuring a different sequence each time the program is run

  • Answered by AI
  • Q19. Define subquery.
  • Ans. 

    A subquery is a query within another query used to retrieve data that will be used in the main query.

    • Subqueries are enclosed in parentheses and placed within the WHERE clause of the main query.

    • They can be used to filter results based on a condition that involves data from another table.

    • Subqueries can also be used in the SELECT, FROM, and HAVING clauses.

    • Examples include finding the average salary of employees in a depar...

  • Answered by AI
  • Q20. Explain these terms - Linked List, Stack, Queue.
  • Ans. 

    Linked List is a linear data structure. Stack and Queue are abstract data types.

    • Linked List: A collection of nodes where each node points to the next node.

    • Stack: A data structure where elements are added and removed from the top only.

    • Queue: A data structure where elements are added at the rear and removed from the front only.

    • Example: Browser history can be implemented using a Linked List.

    • Example: Undo/Redo functionalit...

  • Answered by AI
  • Q21. Define triggers. Give its applications.
  • Ans. 

    Triggers are events that initiate an action or set of actions. They are commonly used in databases and automation systems.

    • Triggers are used in databases to automatically execute a set of actions when a certain event occurs, such as inserting or updating data.

    • They can also be used in automation systems to initiate a process or workflow when a specific event occurs, such as receiving an email or a file upload.

    • Triggers ca...

  • Answered by AI
  • Q22. What is the difference between a "semaphore" and a "monitor"?
  • Ans. 

    Semaphore and monitor are synchronization tools used in concurrent programming.

    • Semaphore is a signaling mechanism that allows multiple threads to access a shared resource simultaneously.

    • Monitor is a synchronization construct that allows threads to have both mutual exclusion and the ability to wait (block) for a certain condition to become true.

    • Semaphore is a lower-level primitive, while monitor is a higher-level abstra...

  • Answered by AI
  • Q23. Discuss transparent DBMS.
  • Ans. 

    Transparent DBMS allows users to see and control the underlying database operations.

    • Transparent DBMS provides visibility into the database operations and allows users to monitor and control them.

    • It enables users to see how data is being stored, accessed, and manipulated in real-time.

    • Examples include Oracle Transparent Data Encryption and Microsoft SQL Server Transparent Data Encryption.

    • Transparent DBMS can improve secu...

  • Answered by AI
  • Q24. What is RDBMS KERNEL?
  • Ans. 

    RDBMS KERNEL is not a commonly used term in the industry.

    • There is no widely accepted definition of RDBMS KERNEL.

    • It may refer to the core components of a relational database management system.

    • It could also be a term used by a specific company or product.

    • Without more context, it is difficult to provide a specific answer.

  • Answered by AI
  • Q25. What is the difference between primary key, foreign key, candidate key & super key?
  • Ans. 

    Primary key uniquely identifies a record, foreign key links tables, candidate key can be primary key, super key is a set of attributes.

    • Primary key: Unique identifier for a record in a table

    • Foreign key: Links tables together by referencing the primary key of another table

    • Candidate key: A set of attributes that can be used as a primary key

    • Super key: A set of attributes that can uniquely identify a record

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Re-examine and Apply your Past Experience to the IT Industry.
Get Industry Certifications.
Your Degree in Another Field May Be a Huge Asset.
Be Open to Starting at the Bottom.
Don't Forget the Power of Networking.
Teach Yourself Relevant Tech Skills.
Look for Crossover Positions.
Network with the Right People.
Find the Right Internship.
Create an Effective Resume.

Skills evaluated in this interview

IndiaBonds Interview FAQs

How many rounds are there in IndiaBonds Software Executive interview for experienced candidates?
IndiaBonds interview process for experienced candidates usually has 2 rounds. The most common rounds in the IndiaBonds interview process for experienced candidates are Resume Shortlist and One-on-one Round.
What are the top questions asked in IndiaBonds Software Executive interview for experienced candidates?

Some of the top questions asked at the IndiaBonds Software Executive interview for experienced candidates -

  1. Different between Enumerable and Querya...read more
  2. Explain Service oriented architectu...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.1k Interviews
Accenture Interview Questions
3.9
 • 7.9k Interviews
Infosys Interview Questions
3.7
 • 7.4k Interviews
Wipro Interview Questions
3.7
 • 5.5k Interviews
Cognizant Interview Questions
3.8
 • 5.5k Interviews
Amazon Interview Questions
4.1
 • 4.9k Interviews
Capgemini Interview Questions
3.8
 • 4.7k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.7k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
Genpact Interview Questions
3.9
 • 3k Interviews
View all
Manager
4 salaries
unlock blur

₹7.5 L/yr - ₹18 L/yr

Assistant Manager
4 salaries
unlock blur

₹4.1 L/yr - ₹18 L/yr

Senior Executive
4 salaries
unlock blur

₹3.4 L/yr - ₹14.8 L/yr

Executive
4 salaries
unlock blur

₹3 L/yr - ₹6 L/yr

Assistant Vice President
4 salaries
unlock blur

₹21 L/yr - ₹32 L/yr

Explore more salaries
Compare IndiaBonds with

HDFC Bank

3.9
Compare

ICICI Bank

4.0
Compare

Axis Bank

3.8
Compare

State Bank of India

3.8
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview