i
Ksolves India
Limited
Filter interviews by
Spring Boot is a framework for building Java-based web applications with minimal configuration.
Spring Boot simplifies the process of creating standalone, production-grade Spring-based applications.
It provides a range of features like embedded servers, auto-configuration, and production-ready metrics.
Spring Boot allows developers to quickly set up and run RESTful web services using annotations and minimal XML confi...
JVM is the Java Virtual Machine that executes Java bytecode. JRE is the Java Runtime Environment that includes JVM and libraries. JDK is the Java Development Kit that includes JRE and development tools.
JVM is the virtual machine that runs Java bytecode and provides a runtime environment for Java programs.
JRE includes JVM along with libraries and other components necessary to run Java applications.
JDK is a developm...
HashMap internally uses an array of linked lists to store key-value pairs, with keys hashed to determine the index.
HashMap uses hashing to determine the index of key-value pairs in the array.
Each index in the array can store multiple key-value pairs in a linked list.
When a key is inserted, its hash code is used to find the appropriate index in the array.
If multiple keys hash to the same index, they are stored in a...
Detect cycle in a linked list
Use two pointers approach - slow and fast pointers
If there is a cycle, the fast pointer will eventually catch up to the slow pointer
Check if the fast and slow pointers meet at some point to detect the cycle
Static keyword is used to create class-level variables and methods, while final keyword is used to make a variable constant.
Static keyword is used to create variables and methods that belong to the class itself, rather than to any specific instance of the class.
Final keyword is used to make a variable constant and cannot be changed once it has been assigned a value.
Static variables are shared among all instances o...
Polymorphism allows objects of different classes to be treated as objects of a common superclass. Interface is a contract that defines a set of methods that a class must implement.
Polymorphism allows for flexibility in programming by enabling a single interface to be used to represent multiple types of objects
Interfaces in Java are similar to abstract classes, but they cannot contain any implementation code
Abstrac...
I applied via Campus Placement and was interviewed in Feb 2024. There were 4 interview rounds.
They have 4 round total. In first round they take online Aptitide test in college labs.Aptitude topics are (Mcq on C,Java,C++ and quantitative aptitude,logical e.t.c), All rounds are Elimination round.
In 2nd Round they take coding test on your college systems.They don't have their plateform.You have to write code on any offline compiler.Coding question are based on linkedlist,array,string,hashmap only.They give 3 coding question if you solve 2 , you will be selected for next round.
Ques1: given an array of string and their frequency , find the string which have duplicate frequency.
Ques2: Find if an array contain any non empty subarray of zero sum in an array.
Ques 3: Find the string is isomorphic or Not.
Static keyword is used to create class-level variables and methods, while final keyword is used to make a variable constant.
Static keyword is used to create variables and methods that belong to the class itself, rather than to any specific instance of the class.
Final keyword is used to make a variable constant and cannot be changed once it has been assigned a value.
Static variables are shared among all instances of a c...
HashMap internally uses an array of linked lists to store key-value pairs, with keys hashed to determine the index.
HashMap uses hashing to determine the index of key-value pairs in the array.
Each index in the array can store multiple key-value pairs in a linked list.
When a key is inserted, its hash code is used to find the appropriate index in the array.
If multiple keys hash to the same index, they are stored in a link...
Detect cycle in a linked list
Use two pointers approach - slow and fast pointers
If there is a cycle, the fast pointer will eventually catch up to the slow pointer
Check if the fast and slow pointers meet at some point to detect the cycle
JVM is the Java Virtual Machine that executes Java bytecode. JRE is the Java Runtime Environment that includes JVM and libraries. JDK is the Java Development Kit that includes JRE and development tools.
JVM is the virtual machine that runs Java bytecode and provides a runtime environment for Java programs.
JRE includes JVM along with libraries and other components necessary to run Java applications.
JDK is a development k...
Spring Boot is a framework for building Java-based web applications with minimal configuration.
Spring Boot simplifies the process of creating standalone, production-grade Spring-based applications.
It provides a range of features like embedded servers, auto-configuration, and production-ready metrics.
Spring Boot allows developers to quickly set up and run RESTful web services using annotations and minimal XML configurat...
Polymorphism allows objects of different classes to be treated as objects of a common superclass. Interface is a contract that defines a set of methods that a class must implement.
Polymorphism allows for flexibility in programming by enabling a single interface to be used to represent multiple types of objects
Interfaces in Java are similar to abstract classes, but they cannot contain any implementation code
Abstract cla...
Top trending discussions
I applied via LinkedIn and was interviewed in May 2024. There were 2 interview rounds.
I am a passionate software developer with experience in Java, Python, and web development.
Experienced in Java, Python, and web development technologies
Strong problem-solving skills
Team player with excellent communication skills
OOP stands for Object-Oriented Programming, a programming paradigm based on the concept of objects.
OOP focuses on creating objects that contain data and methods to manipulate that data.
Encapsulation: Objects hide their internal state and require interaction through defined interfaces.
Inheritance: Objects can inherit attributes and methods from other objects.
Polymorphism: Objects can take on different forms or have mult...
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There were 2 interview rounds.
ref and out are C# keywords for passing arguments by reference, allowing methods to modify the original data.
ref requires the variable to be initialized before being passed. Example: 'int x = 10; SomeMethod(ref x);'
out does not require initialization before being passed. Example: 'int y; SomeMethod(out y);'
Both allow methods to modify the original variable, but ref is for existing data, while out is for returning new d...
I applied via Naukri.com and was interviewed in Sep 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in Oct 2021. There were 4 interview rounds.
A prime number is a natural number greater than 1 that cannot be formed by multiplying two smaller natural numbers.
A prime number has exactly two distinct positive divisors: 1 and itself.
Examples of prime numbers include 2, 3, 5, 7, 11, and 13.
The number 1 is not prime, and 2 is the only even prime number.
To check if a number n is prime, test divisibility from 2 to sqrt(n).
For example, to check if 29 is prime, test div...
Find the two maximum numbers in an array of strings.
Convert the array of strings to an array of integers.
Sort the array in descending order.
Return the first two elements of the sorted array.
Java is platform independent due to its bytecode and the Java Virtual Machine (JVM) that allows execution on any OS.
Java code is compiled into bytecode, which is platform-independent.
The Java Virtual Machine (JVM) interprets bytecode on any operating system.
This allows Java applications to run on Windows, macOS, Linux, etc., without modification.
Example: A Java program compiled on Windows can run on Linux without recom...
Primary key uniquely identifies a record in a table, while foreign key establishes a link between two tables.
Primary key is used to enforce data integrity and ensure uniqueness of records.
Foreign key is used to establish relationships between tables and enforce referential integrity.
A table can have only one primary key, while it can have multiple foreign keys.
Primary key can be used as a foreign key in another table.
E...
REST API is lightweight and flexible, while SOAP is more structured and secure.
REST uses HTTP protocol and supports multiple data formats like JSON, XML, etc.
SOAP uses XML protocol and supports only XML data format.
REST is faster and consumes less bandwidth than SOAP.
SOAP has built-in security features like WS-Security and WS-Trust.
REST is easier to implement and maintain than SOAP.
SOAP is better suited for enterprise-...
posted on 13 Nov 2021
I applied via Naukri.com and was interviewed in May 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in May 2021. There were 3 interview rounds.
To create a repository in GIT using command prompt, use the 'git init' command.
Open the command prompt and navigate to the directory where you want to create the repository
Type 'git init' command to initialize the repository
Add files to the repository using 'git add' command
Commit the changes using 'git commit' command
Create a remote repository on GitHub or any other hosting service
Add the remote repository using 'git ...
Primary key uniquely identifies a record in a table, while foreign key refers to a field in another table.
Primary key is a column or set of columns that uniquely identifies each row in a table
Foreign key is a column or set of columns in one table that refers to the primary key in another table
Primary key cannot have null values, while foreign key can have null values
Primary key can be used to create relationships betwe...
API stands for Application Programming Interface. It is a set of protocols, routines, and tools for building software applications.
API allows different software applications to communicate with each other
It defines how software components should interact
API provides a layer of abstraction between the application and the underlying system
Examples of APIs include Google Maps API, Twitter API, and Facebook API
Count the characters in a given string.
Iterate through the string and count each character
Use a hash table to store the count of each character
Handle edge cases such as empty string or null input
Load balancing is the process of distributing network traffic across multiple servers to improve performance and availability.
Load balancing helps prevent server overload and downtime
It can be achieved through hardware or software solutions
Examples include round-robin, least connections, and IP hash algorithms
REST is an architectural style while SOAP is a protocol. REST is lightweight and uses HTTP while SOAP is XML-based and uses other protocols.
REST is stateless while SOAP maintains state
REST uses HTTP verbs (GET, POST, PUT, DELETE) while SOAP uses XML messaging
REST is faster and easier to use while SOAP is more secure and reliable
REST is used for web services while SOAP is used for enterprise-level web services
Examples o...
I applied via Referral and was interviewed in Dec 2021. There were 5 interview rounds.
API stands for Application Programming Interface. REST and SOAP are two types of APIs.
REST is an architectural style that uses HTTP protocol for communication and supports multiple data formats like JSON, XML, etc.
SOAP is a protocol that uses XML for communication and supports only XML data format.
REST is lightweight and easy to use, while SOAP is more complex and requires more bandwidth.
REST is stateless, while SOAP m...
oAuth tokens are used for authentication and authorization purposes in web applications.
oAuth tokens are used to grant access to resources without sharing the user's credentials.
There are three types of oAuth tokens: access tokens, refresh tokens, and authorization codes.
Access tokens are short-lived tokens that are used to access protected resources.
Refresh tokens are long-lived tokens that are used to obtain new acce...
Stored Procedures are pre-compiled SQL statements stored in the database and executed on demand.
Stored Procedures are used to improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic and provide a consistent interface to the database.
They can be called from other PL/SQL code or from external applications.
Examples include procedures for inserting, updating, an...
Drop command removes a table from the database, truncate command removes all rows from a table, and delete command removes specific rows from a table.
Drop command removes the table structure and all associated data
Truncate command removes all rows from a table but keeps the table structure
Delete command removes specific rows from a table based on a condition
Drop and truncate are faster than delete as they do not genera...
Merge Sort and Quick Sort are sorting algorithms. Merge Sort is stable but slower. Quick Sort is faster but unstable.
Merge Sort divides the array into two halves, sorts them recursively, and then merges them.
Quick Sort selects a pivot element, partitions the array around the pivot, and then recursively sorts the subarrays.
Merge Sort has a time complexity of O(nlogn) and space complexity of O(n).
Quick Sort has a time co...
Object Oriented Programming is a programming paradigm that focuses on objects and their interactions.
OOP is based on the concepts of encapsulation, inheritance, and polymorphism.
It allows for modular and reusable code.
Objects have attributes (data) and methods (functions) that operate on that data.
Examples of OOP languages include Java, Python, and C++.
Armstrong number problem solved using double pointers.
Use double pointers to access each digit of the number.
Calculate the sum of each digit raised to the power of the number of digits.
Compare the sum with the original number to check if it is an Armstrong number.
VPC stands for Virtual Private Cloud, which is a virtual network in the cloud.
VPC allows users to create their own isolated network within the cloud
It provides control over network topology, IP address range, and subnets
VPC can be used to securely connect resources in the cloud and on-premises
Examples of cloud providers that offer VPC are Amazon Web Services and Google Cloud Platform
On-premises servers can be connected to the Cloud using VPN or Direct Connect.
Use a VPN to establish a secure connection between on-premises servers and the Cloud.
Direct Connect can be used for a dedicated, private connection between on-premises servers and the Cloud.
Ensure proper network configuration and security measures are in place.
Examples of VPN solutions include OpenVPN, Cisco AnyConnect, and AWS VPN.
Examples o...
Multithreading is the execution of multiple threads of a single process, while multiprocessing is the execution of multiple processes.
Multithreading involves multiple threads within a single process, while multiprocessing involves multiple processes.
Multithreading shares the same memory space, while multiprocessing has separate memory spaces.
Multithreading is suitable for I/O-bound tasks, while multiprocessing is suita...
I handle exceptions by catching them and handling them appropriately.
I use try-catch blocks to catch exceptions.
I log the exception details for debugging purposes.
I handle the exception based on the type and severity.
I throw custom exceptions when necessary.
I ensure that the application remains stable and doesn't crash due to exceptions.
Generators and decorators are two important features in Python that help in simplifying code and improving performance.
Generators are functions that can be paused and resumed, allowing for efficient memory usage and lazy evaluation.
Decorators are functions that modify the behavior of other functions, adding functionality without changing the original code.
Generators are created using the 'yield' keyword, while decorato...
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
Annotations in Spring Boot and their meanings
1. @SpringBootApplication - used to mark the main class of a Spring Boot application
2. @RestController - used to mark a class as a RESTful controller
3. @Autowired - used to inject dependencies into a class
4. @RequestMapping - used to map HTTP requests to methods in a controller
5. @PathVariable - used to extract values from the URI in a request mapping
6. @RequestBody - used t...
based on 1 interview experience
Difficulty level
Duration
based on 2 reviews
Rating in categories
Software Developer
198
salaries
| ₹2 L/yr - ₹9.8 L/yr |
Software Engineer
66
salaries
| ₹3.5 L/yr - ₹12.7 L/yr |
Senior Software Engineer
57
salaries
| ₹6.5 L/yr - ₹22 L/yr |
Softwaretest Engineer
49
salaries
| ₹3 L/yr - ₹10 L/yr |
Senior Software Developer
38
salaries
| ₹5 L/yr - ₹20 L/yr |
Tekwissen
Damco Solutions
smartData Enterprises
In Time Tec Visionsoft