Filter interviews by
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It divides network communication into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and interacts with adjacent layers for data transmission.
Exampl...
Data modeling with Star Schema involves organizing data into a central fact table surrounded by dimension tables.
Central fact table contains numerical data that is being analyzed
Dimension tables provide context to the data in the fact table
Each dimension table is connected to the fact table through foreign keys
Star Schema is commonly used in data warehousing for efficient querying
1 coding 1 sql questions
I applied via LinkedIn and was interviewed before Apr 2023. There were 4 interview rounds.
Live coding challenge
Top trending discussions
posted on 8 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
OOPS is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOPS focuses on the concept of classes and objects
Encapsulation: bundling data and methods that operate on the data within a single unit
Inheritance: allows a class to inherit properties and behavior from another class
Polymorphism: ability to present the same interface for diffe...
Comparable is an interface used for natural ordering, Comparator is an interface used for custom ordering. Abstract class can have method implementations, Interface cannot.
Comparable interface is used to define the natural ordering of objects. Example: String class implements Comparable interface for natural ordering based on alphabetical order.
Comparator interface is used to define custom ordering of objects. Example:...
Count occurrences of each character in a given string
Create an array to store the count of each character
Iterate through the string and increment the count of each character in the array
Return the array with counts for each character
Remove duplicates from an array of strings
Iterate through the array and store each element in a set to keep track of unique values
Create a new array with the unique values from the set
I applied via Campus Placement and was interviewed in Oct 2024. There were 3 interview rounds.
3 questions were there
Core concept of computer science is the study of algorithms and data structures.
Algorithms are step-by-step procedures for solving problems.
Data structures are ways to organize and store data efficiently.
Examples include sorting algorithms like bubble sort and data structures like arrays and linked lists.
Identify if a number is positive, negative, or zero
Check if the number is greater than 0 to determine if it is positive
Check if the number is less than 0 to determine if it is negative
If the number is neither greater nor less than 0, it is zero
OOPS concepts revolve around the principles of encapsulation, inheritance, polymorphism, and abstraction. Method overloading involves multiple methods with the same name but different parameters, while method overriding involves a subclass providing a specific implementation of a method defined in its superclass.
OOPS concepts include encapsulation, inheritance, polymorphism, and abstraction
Method overloading allows mul...
posted on 11 Dec 2023
I was interviewed in Jun 2023.
I have 5 years of experience in SQL and Node JS.
I have worked extensively with SQL databases, writing complex queries and optimizing performance.
I am proficient in using Node JS for server-side development, building RESTful APIs and handling database operations.
I have experience in integrating SQL databases with Node JS applications using libraries like Sequelize or Knex.
I have successfully delivered projects that invo...
Indexes in SQL are data structures that improve the speed of data retrieval operations on database tables.
Indexes are created on one or more columns of a table to allow faster searching and sorting of data.
They work similar to the index of a book, allowing the database engine to quickly locate the data.
Indexes can be created on primary keys, foreign keys, or any other frequently searched columns.
They reduce the amount ...
Normalization is a process in DBMS that eliminates data redundancy and ensures data integrity.
Normalization is used to organize data in a database efficiently.
There are different normal forms, such as 1NF, 2NF, 3NF, BCNF, and 4NF.
Each normal form has specific rules and dependencies to achieve data normalization.
Normalization helps in reducing data duplication, improving data consistency, and simplifying database mainte...
Views in mySQL are virtual tables that are based on the result of a query. They can be used to simplify complex queries and provide a layer of abstraction.
Views are created using the CREATE VIEW statement.
They are stored in the database and can be accessed like regular tables.
Views can be used to hide complexity by encapsulating complex queries into a single view.
They can also be used to restrict access to certain colu...
Stored Procedures are precompiled database objects that contain a set of SQL statements and can be executed with a single call.
Stored Procedures are used to encapsulate and execute frequently used SQL statements.
They improve performance by reducing network traffic and optimizing query execution.
They can accept input parameters and return output values.
Stored Procedures can be used for data manipulation, data retrieval,...
Internet of Things (IoT) refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity.
IoT enables devices to collect and exchange data over the internet.
It allows for remote monitoring and control of devices and systems.
IoT has applications in various industries such as healthcare, transportation, agriculture, and smart homes.
Examples of IoT device...
JWT stands for JSON Web Token. It is a compact, URL-safe means of representing claims between two parties.
JWT is used for authentication and authorization purposes in web applications.
It consists of three parts: header, payload, and signature.
The header contains the algorithm used to sign the token.
The payload contains the claims or information about the user.
The signature is used to verify the integrity of the token.
J...
Webtokens and APIs are both used in web development, but they serve different purposes.
Webtokens are used for authentication and authorization, providing a secure way to transmit user information between client and server.
APIs (Application Programming Interfaces) are sets of rules and protocols that allow different software applications to communicate and interact with each other.
Webtokens are often used within APIs to...
oAuth is an open standard for authorization. In my project, I used the oAuth 2.0 protocol for authentication and authorization.
oAuth is a protocol that allows users to grant limited access to their resources on one website to another website without sharing their credentials.
It provides a secure way for users to authenticate and authorize third-party applications to access their data.
oAuth 2.0 is the most widely used v...
Further optimization of normalized data can be achieved through indexing, denormalization, and caching.
Create appropriate indexes on frequently queried columns to improve query performance.
Consider denormalizing the data by combining related tables to reduce the number of joins required.
Implement caching mechanisms to store frequently accessed data in memory for faster retrieval.
Use materialized views or summary tables...
Indexing in a database improves query performance by creating a data structure that allows for faster data retrieval.
Indexing involves creating an index on one or more columns of a database table.
The column used for indexing should be chosen based on the frequency of data retrieval and the cardinality of the column.
Columns with high selectivity and frequent data retrieval are good candidates for indexing.
Examples of co...
Interview experience
based on 29 reviews
Rating in categories
Software Engineer
180
salaries
| ₹7.8 L/yr - ₹22 L/yr |
Senior Software Engineer
148
salaries
| ₹9.8 L/yr - ₹32 L/yr |
Lead Software Engineer
64
salaries
| ₹22 L/yr - ₹43 L/yr |
Associate Software Engineer
63
salaries
| ₹6.3 L/yr - ₹15.5 L/yr |
QA Engineer
58
salaries
| ₹8.5 L/yr - ₹19.7 L/yr |
TCS
Wipro
HCLTech
Tech Mahindra