Filter interviews by
I applied via Approached by Company and was interviewed in Jan 2024. There was 1 interview round.
Data can be secured through encryption, access controls, regular backups, and monitoring.
Implement encryption for sensitive data to protect it from unauthorized access.
Use access controls to restrict who can view, edit, or delete data.
Regularly backup data to prevent loss in case of system failures or cyber attacks.
Monitor data access and usage to detect any suspicious activities or breaches.
Implement strong password p...
Triggers are pieces of code that are executed before or after specific data manipulation events occur on Salesforce records.
Triggers are used to perform custom actions like validation, updating related records, or sending email notifications.
They can be written in Apex and are executed when records are inserted, updated, deleted, or undeleted.
Triggers can be used to enforce business rules and automate processes in Sale...
Top trending discussions
I applied via Walk-in and was interviewed before Dec 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Feb 2020. There were 6 interview rounds.
I applied via Company Website and was interviewed before Feb 2020. There was 1 interview round.
I applied via Campus Placement and was interviewed in Oct 2020. There were 4 interview rounds.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Start from the first element and compare it with the next element
If the next element is smaller, swap them
Repeat this process for all elements in the array
Continue this process until no more swaps are needed
A program to print all prime numbers
Take input from user for range of numbers
Loop through the range and check if each number is prime
Print the prime numbers
Hashmap is a data structure that stores key-value pairs and allows constant time access to values based on their keys.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when multiple keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Examples of hashmap implementations include Java's HashMap class and Python's dict type.
Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.
Inheritance allows code reuse and promotes code organization.
The existing class is called the parent or superclass, and the new class is called the child or subclass.
The child class inherits all the properties and methods of the parent class and can also add new properties and methods.
For...
I applied via Walk-in and was interviewed in Mar 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in Nov 2020. There were 5 interview rounds.
I applied via Recruitment Consultant and was interviewed in Mar 2021. There were 3 interview rounds.
based on 1 interview
Interview experience
Salesforce Developer
10
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Business Development Manager
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Software QA Engineer
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Infosys
TCS
Wipro
HCLTech