Filter interviews by
I applied via Indeed and was interviewed in Oct 2023. There was 1 interview round.
Top trending discussions
I applied via Company Website and was interviewed in Mar 2024. There was 1 interview round.
Implement a stack using an array in a programming language of your choice.
Create a class or struct to represent the stack
Use an array to store the elements of the stack
Implement push, pop, and peek operations
Handle stack overflow and underflow cases
I was interviewed before Sep 2023.
Asked me to sort array 30 discussion how many hair cuts in 1year in india
Web socket is a communication protocol that provides full-duplex communication channels over a single TCP connection.
Web socket allows for real-time, bi-directional communication between a client and a server.
It is commonly used in applications that require live updates, such as chat applications or online gaming.
Web socket connections are initiated through a handshake process and can remain open for as long as needed.
...
It is impossible to accurately determine the number of haircuts in India in 24 hours without specific data.
The number of haircuts in India in 24 hours would depend on the population, number of hair salons, and average time taken for a haircut.
Factors such as holidays, weekends, and special events could also affect the number of haircuts in a day.
Without concrete data on the above factors, it is not possible to provide
OAuth2 is an authorization framework while JWT is a token format for authentication.
OAuth2 is an authorization framework used for delegated access to resources.
JWT is a token format that can be used for authentication and information exchange.
OAuth2 involves obtaining an access token from an authorization server.
JWT is a self-contained token that contains user information and can be verified without querying a database...
SSL works by encrypting data transmitted between a client and server, while a proxy acts as an intermediary for requests.
SSL (Secure Sockets Layer) encrypts data transmitted between a client and server to ensure privacy and security.
SSL uses cryptographic protocols to establish a secure connection, typically using public key infrastructure (PKI).
A proxy server acts as an intermediary between a client and server, forwar...
based on 1 interview
Interview experience
Intas Pharmaceuticals
Hetero
MSN Laboratories
Piramal Group