Filter interviews by
To check for JWT in Postman, use the 'Authorization' tab and select 'Bearer Token' type.
In Postman, go to the 'Authorization' tab of your request.
Select 'Bearer Token' from the dropdown menu.
Enter the JWT token in the provided field.
Send the request to authenticate using the JWT.
Use encryption to hide network data from inspection.
Implement SSL/TLS to encrypt data transmitted over the network
Use VPNs to create secure tunnels for data transmission
Utilize firewalls to restrict access to network data
Implement secure coding practices to prevent data leakage
Use encryption algorithms like AES to protect sensitive data
Software development life-cycle is a process used to design, develop, test, and deploy software applications.
SDLC consists of several phases such as planning, analysis, design, implementation, testing, and maintenance.
Each phase has its own set of activities and deliverables to ensure the successful completion of the project.
SDLC models include Waterfall, Agile, Scrum, and DevOps, each with its own approach to sof...
A library is a collection of functions or classes that can be called by an external program, while a framework is a set of libraries that provide a structure for building applications.
Library is used by the developer to perform specific tasks, while a framework dictates the overall structure of the application.
Libraries are more flexible and allow developers to pick and choose which components to use, while framew...
Developed a Java project for a school assignment on implementing a library management system.
Used Java programming language to create classes for books, users, and transactions
Implemented features such as adding/removing books, checking out books, and generating reports
Utilized JDBC for database connectivity to store book and user information
SEPM stands for Society for Sedimentary Geology, a global organization focused on the study of sedimentary rocks and their geological processes.
SEPM publishes scientific journals and books related to sedimentary geology.
The organization hosts conferences and workshops for geologists to share research and network.
SEPM provides grants and scholarships to support research in sedimentary geology.
Saas stands for Software as a Service, a cloud-based software delivery model where users can access applications via the internet.
Saas allows users to access software applications without the need for installation or maintenance.
Users pay a subscription fee to use the software on a pay-as-you-go basis.
Examples of Saas include Salesforce, Microsoft Office 365, and Google Workspace.
I applied via Walk-in and was interviewed in Nov 2024. There were 3 interview rounds.
Software development life-cycle is a process used to design, develop, test, and deploy software applications.
SDLC consists of several phases such as planning, analysis, design, implementation, testing, and maintenance.
Each phase has its own set of activities and deliverables to ensure the successful completion of the project.
SDLC models include Waterfall, Agile, Scrum, and DevOps, each with its own approach to software...
My hobbies include coding, playing video games, and hiking. In 2 years, I see myself as a Senior Software Developer working on challenging projects.
Hobbies: coding, playing video games, hiking
In 2 years: Senior Software Developer, working on challenging projects
A library is a collection of functions or classes that can be called by an external program, while a framework is a set of libraries that provide a structure for building applications.
Library is used by the developer to perform specific tasks, while a framework dictates the overall structure of the application.
Libraries are more flexible and allow developers to pick and choose which components to use, while frameworks ...
Use encryption to hide network data from inspection.
Implement SSL/TLS to encrypt data transmitted over the network
Use VPNs to create secure tunnels for data transmission
Utilize firewalls to restrict access to network data
Implement secure coding practices to prevent data leakage
Use encryption algorithms like AES to protect sensitive data
To check for JWT in Postman, use the 'Authorization' tab and select 'Bearer Token' type.
In Postman, go to the 'Authorization' tab of your request.
Select 'Bearer Token' from the dropdown menu.
Enter the JWT token in the provided field.
Send the request to authenticate using the JWT.
Saas stands for Software as a Service, a cloud-based software delivery model where users can access applications via the internet.
Saas allows users to access software applications without the need for installation or maintenance.
Users pay a subscription fee to use the software on a pay-as-you-go basis.
Examples of Saas include Salesforce, Microsoft Office 365, and Google Workspace.
SEPM stands for Society for Sedimentary Geology, a global organization focused on the study of sedimentary rocks and their geological processes.
SEPM publishes scientific journals and books related to sedimentary geology.
The organization hosts conferences and workshops for geologists to share research and network.
SEPM provides grants and scholarships to support research in sedimentary geology.
Developed a Java project for a school assignment on implementing a library management system.
Used Java programming language to create classes for books, users, and transactions
Implemented features such as adding/removing books, checking out books, and generating reports
Utilized JDBC for database connectivity to store book and user information
Basic question of sql js
Top trending discussions
posted on 21 Jul 2022
I applied via Company Website and was interviewed in Jan 2022. There were 2 interview rounds.
There was 3 coding question with time limit of 10 minute each or total 30 minute time limit.
posted on 6 Feb 2023
I applied via Internshala and was interviewed in Aug 2022. There were 3 interview rounds.
Aptitude and coding test via Google form
Calculate the sum of prime numbers.
Iterate through numbers and check if each number is prime
If a number is prime, add it to the sum
Return the sum of prime numbers
posted on 4 Aug 2023
I applied via Naukri.com and was interviewed in Feb 2023. There were 4 interview rounds.
Basic to intermediate aptitude questions
In This you will be given basic 3-5 questions of freecodecamp
I applied via Campus Placement and was interviewed in Sep 2022. There were 4 interview rounds.
Given a pattern and we need to complete the pattern within 40mins, also allows completing this problem in any language ( c,c++, python, java).
I have a close-knit family and a supportive group of friends. I also have intermediate skills in various programming languages.
My family is very important to me and we have a strong bond.
I have a few close friends who have always been there for me.
In terms of programming, I have intermediate skills in languages like Java, Python, and JavaScript.
posted on 14 Dec 2023
I applied via Approached by Company and was interviewed before Dec 2022. There were 6 interview rounds.
In aptitute Test there will be some fundamental programing questions.
Need to solve some moderator level coding questions in any language.
A small project is given as a task and given time to complete it for further process.
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Inheritance allows for code reuse and promotes modularity.
The class that is being inherited from is called the superclass or base class.
The class that inherits from the superclass is called the subclass or derived class.
The subclass inherits all the public and protected members of the superclass.
Th...
A simple system architecture for a Junior Software Developer
Use a layered architecture with separate layers for presentation, business logic, and data access
Choose appropriate technologies and frameworks based on the requirements
Ensure scalability and maintainability by following best practices
Implement security measures to protect sensitive data
Consider fault tolerance and redundancy for high availability
Document the ...
Sensitive information in a web application can be secured through encryption, access controls, secure coding practices, and regular security audits.
Encrypt sensitive data at rest and in transit using strong encryption algorithms.
Implement access controls to restrict unauthorized access to sensitive information.
Follow secure coding practices to prevent common vulnerabilities like SQL injection and cross-site scripting.
R...
I approach problem solving in software development by breaking down the problem, researching, and testing solutions.
Break down the problem into smaller, manageable tasks
Research and gather information about the problem domain
Brainstorm and evaluate potential solutions
Implement and test the chosen solution
Iterate and refine the solution based on feedback
Questions are asked based on DS/Algo, and on my prior experience and projects
based on 6 interview experiences
Difficulty level
Duration
based on 93 reviews
Rating in categories
Software Developer
51
salaries
| ₹1.9 L/yr - ₹6.2 L/yr |
Angular Developer
13
salaries
| ₹2.6 L/yr - ₹5.5 L/yr |
QA Engineer
13
salaries
| ₹2.7 L/yr - ₹8.9 L/yr |
Salesforce Developer
11
salaries
| ₹2.5 L/yr - ₹6 L/yr |
Project Manager
9
salaries
| ₹3 L/yr - ₹7.5 L/yr |
Zidio Development
Northcorp Software
Accel Frontline
Elentec Power India (EPI) Pvt. Ltd.