Filter interviews by
I applied via Job Portal
Implementing security measures to protect the application from unauthorized access and data breaches.
Implement secure authentication methods such as OAuth or JWT tokens
Use HTTPS protocol to encrypt data in transit
Implement input validation to prevent SQL injection and XSS attacks
Regularly update and patch software to fix security vulnerabilities
Implement role-based access control to restrict user permissions
I appeared for an interview before Mar 2024.
I applied via Referral and was interviewed in Jul 2022. There were 5 interview rounds.
This is first round, you just score good in aptitude test.
This is main round now. They will do some crud operation for fresher.
Use indexing, partitioning, and compression techniques to manage large data tables.
Use indexing to speed up data retrieval.
Partition the data into smaller chunks to improve query performance.
Use compression techniques to reduce storage space.
Consider using a distributed database system to handle the load.
Use caching to improve performance for frequently accessed data.
Misha Infotech interview questions for popular designations
Top trending discussions
posted on 30 Nov 2021
I applied via Campus Placement and was interviewed before Nov 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Mar 2020. There were 5 interview rounds.
JOINS are used in SQL to combine data from two or more tables based on a related column.
Inner JOIN returns only the matching rows from both tables
Equi JOIN is a type of Inner JOIN where the join condition is based on equality between two columns
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Divide array in two halves and keep each half in ascending order without using new Array.
Use Array.sort() method to sort the original array
Use Array.slice() method to divide the array into two halves
Use Array.reverse() method to reverse the second half of the array
Interfaces are contracts that define a set of methods and properties that a class must implement.
Interfaces provide a way to achieve abstraction and polymorphism in object-oriented programming.
They allow for loose coupling between classes and promote code reusability.
Interfaces can be used to define common behavior across multiple classes.
Example: IDisposable interface in C# ensures that an object can be properly dispo...
Inheritance is a mechanism in object-oriented programming where a class is based on another class.
Inheritance allows a subclass to inherit properties and methods from a superclass.
The subclass can also add its own properties and methods.
Examples include a Car class inheriting from a Vehicle class, or a Dog class inheriting from an Animal class.
I applied via Campus Placement and was interviewed in May 2021. There were 5 interview rounds.
Union combines and removes duplicates, Union All combines all rows including duplicates.
Union merges the results of two or more SELECT statements into a single result set.
Union All returns all rows from all SELECT statements, including duplicates.
Union requires the same number of columns in all SELECT statements, while Union All does not.
Union sorts the result set and removes duplicates, while Union All does not.
Union ...
Abstract methods are methods without implementation in abstract classes, while interfaces are contracts that define methods.
Abstract classes can have both abstract and non-abstract methods, while interfaces can only have abstract methods.
A class can implement multiple interfaces, but can only inherit from one abstract class.
Abstract classes can have constructors, while interfaces cannot.
Interfaces can have properties,
The optimal solution approach for the Travelling Salesman Problem involves using algorithms such as the Nearest Neighbor Algorithm and the 2-Opt Algorithm.
The Nearest Neighbor Algorithm starts at a random city and selects the nearest unvisited city as the next stop.
The 2-Opt Algorithm involves swapping two edges in the tour to see if it results in a shorter distance.
Other algorithms include the Genetic Algorithm and th...
No, only one primary key can be defined in a SQL table.
Primary key ensures uniqueness of each record in a table.
A table can have only one primary key constraint.
However, a composite primary key can be created using multiple columns.
I applied via Naukri.com and was interviewed before Sep 2022. There were 3 interview rounds.
posted on 27 Jun 2024
A computer is an electronic device that processes data to perform various tasks.
Electronic device that can store, retrieve, and process data
Consists of hardware components like CPU, memory, storage, and input/output devices
Runs software programs to execute specific tasks
Examples include desktops, laptops, tablets, and smartphones
Hardware refers to physical components of a computer system, while software refers to programs and applications that run on the hardware.
Hardware includes components like CPU, memory, motherboard, and storage devices.
Software includes operating systems, applications, and programs that enable users to perform tasks on the computer.
Examples of hardware: CPU - Central Processing Unit, RAM - Random Access Memory, HDD - Har...
Java programming is a high-level, object-oriented programming language used for developing applications and software.
Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM).
It is known for its simplicity, readability, and versatility.
Java is used for developing web applications, mobile apps, desktop applications, and enterprise software.
Examples of Java frameworks include Spring
posted on 7 Jun 2024
based on 4 interviews
Interview experience
based on 42 reviews
Rating in categories
PHP Developer
15
salaries
| ₹3 L/yr - ₹7.4 L/yr |
Software Engineer
13
salaries
| ₹1.7 L/yr - ₹8 L/yr |
Software Developer
10
salaries
| ₹1.5 L/yr - ₹6.5 L/yr |
Softwaretest Engineer
8
salaries
| ₹3 L/yr - ₹4.5 L/yr |
Business Development Manager
7
salaries
| ₹3 L/yr - ₹10 L/yr |
Cognizant
Sutherland Global Services
Optum Global Solutions
Hexaware Technologies