Filter interviews by
I applied via Approached by Company and was interviewed before Apr 2023. There were 2 interview rounds.
Authentication is the process of verifying the identity of a user, while authorization is the process of determining what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like username and password.
Authorization determines the level of access a user has to resources or features.
Examples of authentication include login screens and biometric scans.
Examples of authori...
Basic principles of Software Testing include thoroughness, early testing, defect clustering, and exhaustive testing.
Thoroughness: Testing should cover all aspects of the software to ensure no bugs are missed.
Early testing: Testing should start as early as possible in the development process to catch and fix issues sooner.
Defect clustering: Most defects are found in a small number of modules or areas of the software.
Exh...
Top trending discussions
I applied via Campus Placement and was interviewed in Jan 2021. There were 3 interview rounds.
Swap two numbers with and without temporary variable
Without temporary variable: Use addition and subtraction
With temporary variable: Use a third variable to store the value of one of the numbers
Example without temporary variable: a=5, b=7; a=a+b; b=a-b; a=a-b;
Example with temporary variable: a=5, b=7; temp=a; a=b; b=temp;
I applied via Naukri.com and was interviewed in Oct 2020. There was 1 interview round.
Second level cache is a caching mechanism used to improve performance by storing frequently accessed data in memory.
Second level cache is implemented at the application level and can be configured using frameworks like Hibernate.
To optimize SQL queries, one can use indexes, avoid using SELECT *, and use JOINs instead of subqueries.
SOLID principles are a set of design principles for writing maintainable and scalable cod...
To deploy an application in AWS, you need to create an EC2 instance, configure security groups, install necessary software, and upload your application code.
Create an EC2 instance in the desired region and select the appropriate instance type
Configure security groups to allow traffic to and from the instance
Install necessary software and dependencies on the instance
Upload your application code to the instance
Start the ...
I applied via Recruitment Consultant and was interviewed in Nov 2020. There were 3 interview rounds.
I applied via Company Website and was interviewed before Aug 2020. There were 4 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2020. There were 4 interview rounds.
I applied via Recruitment Consulltant and was interviewed before Jun 2021. There was 1 interview round.
BigInteger is used for mathematical operations involving very large integers in Java.
BigInteger is used when the range of values supported by primitive data types like int and long is not sufficient.
It is commonly used in cryptography and security applications.
It provides methods for arithmetic, bitwise, and logical operations on large integers.
Example: calculating factorial of a large number, generating large prime nu
Merge Sort Algo code in java
Divide the array into two halves
Recursively sort the two halves
Merge the sorted halves
Time complexity: O(n log n)
based on 1 interview
Interview experience
TCS
Accenture
Wipro
Cognizant