i
Invenio Business Solutions
Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
Top trending discussions
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There were 2 interview rounds.
Aptitude,reasoning,verbal,C language,Java,C++
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
To connect to the backend, you can use APIs, database connections, or web services.
Use APIs to send and receive data between the frontend and backend
Establish database connections to retrieve and store data
Utilize web services for communication between different systems
posted on 12 Jan 2024
I applied via Campus Placement and was interviewed in Dec 2023. There was 1 interview round.
A class is a blueprint for creating objects, while an object is an instance of a class. Private, protected, public, and default are access modifiers in object-oriented programming.
A class is a template or blueprint that defines the properties and behaviors of objects.
An object is an instance of a class, created using the class blueprint.
Private access modifier restricts access to class members within the same class.
Pro...
An object is a self-contained entity that consists of both data and behavior.
Objects are instances of classes in object-oriented programming.
They encapsulate data and provide methods to manipulate that data.
Objects can interact with each other through method calls and message passing.
Examples of objects include a car, a person, or a bank account.
Public is a keyword in programming languages that denotes the accessibility of a class, method, or variable.
Public is one of the access modifiers in object-oriented programming.
It allows the class, method, or variable to be accessed from any other class or package.
Public members are part of the public API of a software component.
Example: public class MyClass { ... }
Example: public void myMethod() { ... }
Example: public
In programming, private is an access modifier that restricts the visibility of a class member to within its own class.
Private is used to encapsulate data and prevent direct access from outside the class.
Private members can only be accessed through public methods or properties.
Private variables are often used to store internal state or implementation details.
Private methods are used for internal logic and are not meant
protected is an access modifier in object-oriented programming that restricts access to members within the same package or subclasses.
protected is one of the four access modifiers in Java, along with public, private, and default.
Members declared as protected can be accessed within the same package or by subclasses.
Protected members are not accessible outside the package unless accessed through inheritance.
Example: prot...
posted on 8 Aug 2024
They asked from all the concepts wer have covered till now in Engineering.
I applied via Approached by Company
posted on 26 Oct 2023
Dependency injection in C# is a design pattern where dependencies are injected into a class rather than the class creating them itself.
Dependency injection helps in achieving loose coupling between classes.
It makes the code more testable and maintainable.
There are different ways to implement dependency injection in C#, such as constructor injection, property injection, and method injection.
I was interviewed in Jan 2022.
Round duration - 90 minutes
Round difficulty - Medium
The task is to determine if a given singly linked list forms a cycle or not.
A cycle occurs when a node's next points back to a previous node in the list.
To solve this problem, we can use the Floyd's Cycle-Finding Algorithm.
The algorithm uses two pointers, one moving at a normal pace and the other moving twice as fast.
If there is a cycle, the fast pointer will eventually catch up to the slow pointer.
If the fast pointer ...
Round duration - 60 minutes
Round difficulty - Medium
The minimum depth of a binary tree is the number of nodes along the shortest path from the root node down to the nearest leaf node.
The minimum depth can be found by performing a breadth-first search (BFS) traversal of the binary tree
During the BFS traversal, keep track of the current level and increment the depth by 1 for each level
Stop the BFS traversal when a leaf node is encountered and return the depth as the minim
The problem is to find the intersection of two sorted arrays.
Use two pointers to iterate through the arrays.
Compare the elements at the current pointers and move the pointers accordingly.
If the elements are equal, add it to the intersection array and move both pointers.
If the element in the first array is smaller, move the first pointer.
If the element in the second array is smaller, move the second pointer.
Repeat until...
What is the difference between a mutex and a semaphore
A mutex is a binary semaphore used for mutual exclusion, while a semaphore is a generalized synchronization primitive.
Mutex is used to protect a critical section of code, allowing only one thread to access it at a time.
Semaphore is used to control access to a shared resource, allowing multiple threads to access it simultaneously.
Mutex has ownership, meaning the thread that locks it must unlock it.
Semaphore does not hav...
Round duration - 60 minutes
Round difficulty - Easy
Round duration - 25 minutes
Round difficulty - Easy
Tip 1 : Practice a lot of DSA questions on various online platforms.
Tip 2 : Regularly go back to some of the typical DSA questions.
Tip 3 : Give equal importance to OS, OOPS, and CN subjects.
Tip 1 : Be thorough with your resume to answer anything and everything from your resume.
Tip 2 : Do not put false information on your resume.
based on 1 review
Rating in categories
Associate Consultant
126
salaries
| ₹3 L/yr - ₹10 L/yr |
Consultant
81
salaries
| ₹5 L/yr - ₹19 L/yr |
Senior Consultant
78
salaries
| ₹10.3 L/yr - ₹23 L/yr |
SAP Abap Consultant
70
salaries
| ₹4 L/yr - ₹16.5 L/yr |
SAP Fico Consultant
36
salaries
| ₹4 L/yr - ₹14.7 L/yr |
TCS
Infosys
Wipro
HCLTech