Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 2 interview rounds.
The assignment test was provided which i had to complete within 3 days of span.
Top trending discussions
I applied via campus placement at Sri Krishna College of Engineering and Technology, Coimbatore and was interviewed in Apr 2023. There were 3 interview rounds.
The first round happened on campus where we have solve 30 Mcq's + 1 coding question which was pretty basic. The duration of the test was 1 hr
posted on 17 Dec 2024
I applied via campus placement at Lovely Professional University (LPU) and was interviewed in Jul 2023. There were 5 interview rounds.
Easy to crack. Just basics needed.
There were easy to medium questions.
posted on 11 Nov 2022
I applied via Company Website and was interviewed in Oct 2022. There were 3 interview rounds.
About flow control and abstract classes and methods.
Simple logical codes and in syntax about.
I was interviewed in Mar 2022.
posted on 15 Sep 2021
I applied via Company Website and was interviewed in Aug 2021. There were 4 interview rounds.
I applied via Referral and was interviewed in Apr 2021. There were 4 interview rounds.
Authentication in .NET involves using various authentication mechanisms such as Forms Authentication, Windows Authentication, and OAuth.
Use Forms Authentication for web applications
Use Windows Authentication for intranet applications
Use OAuth for third-party authentication
Implement authentication using ASP.NET Identity
Use secure password storage mechanisms such as hashing and salting
Dependency injection is a design pattern where an object's dependencies are provided externally rather than created internally.
Dependency injection helps to decouple components and make them more modular.
It allows for easier testing and maintenance of code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database connection ob...
A pipe is a feature in Angular that allows you to transform data before displaying it.
Pipes are used in Angular templates with the '|' symbol.
There are built-in pipes like 'uppercase' and 'date'.
Custom pipes can be created using the 'Pipe' decorator and implementing the 'PipeTransform' interface.
Custom pipes can take arguments to modify their behavior.
Pipes can be chained together to perform multiple transformations on
Middleware is software that acts as a bridge between different applications, allowing them to communicate and exchange data.
Middleware is a layer of software that sits between applications and operating systems
It provides services such as message routing, authentication, and data transformation
Examples include Apache Tomcat, Microsoft IIS, and IBM WebSphere
No, assigning null to an array makes it empty and its length becomes 0.
Assigning null to an array makes it empty.
The length of an empty array is 0.
Trying to access length property of null will result in an error.
Null value in JavaScript represents absence of any object value.
Null is a primitive value in JavaScript.
It is assigned to a variable to indicate that it has no value.
It is different from undefined, which means a variable has been declared but not assigned a value.
Null is falsy in JavaScript, meaning it is considered false in a boolean context.
Null can be used to clear the value of an object property.
I applied via Naukri.com and was interviewed in Apr 2021. There was 1 interview round.
Inheritance, abstract class, override, and interface are all concepts in object-oriented programming.
Inheritance allows a class to inherit properties and methods from another class.
Abstract classes cannot be instantiated and are used as a blueprint for other classes.
Override is used to provide a new implementation for a method that is already defined in a parent class.
Interfaces define a set of methods that a class mus...
Full text index is a database index that allows for efficient text-based searching.
Full text index is used to search for specific words or phrases within a large amount of text data.
It is commonly used in search engines, document management systems, and social media platforms.
Full text index can be created on one or more columns of a table in a database.
It uses techniques such as stemming, stop words, and word proximit...
Constructors and destructors are special methods used in object-oriented programming languages to initialize and destroy objects.
Constructors are used to initialize objects when they are created.
Destructors are used to clean up resources used by an object when it is destroyed.
Constructors have the same name as the class and are called automatically when an object is created.
Destructors have the same name as the class p...
PHP 7 is faster, more secure and has new features compared to PHP 5.
PHP 7 has improved performance with up to 2x faster execution
PHP 7 has better error handling and type declarations
PHP 7 has new operators and functions like spaceship operator and null coalescing operator
PHP 7 has removed deprecated features like mysql extension
PHP 7 has improved support for Unicode
PHP 7 requires 64-bit architecture
PHP 7 has improved m...
PHP caching, session handling, and API token security
PHP caching techniques include opcode caching, data caching, and query caching
Session handling in PHP involves creating a unique session ID for each user and storing session data on the server
To prevent token hijacking in APIs, use HTTPS, set expiration times for tokens, and use token revocation
Other security measures include input validation, output encoding, and us
Store procedures, indexes, and virtual tables are important features of MySql.
Store procedures are pre-written code blocks that can be executed on demand.
Indexes are used to speed up database queries by creating a quick lookup table.
Virtual tables are temporary tables that are created on the fly and do not persist in the database.
Examples of store procedures include creating a new user or updating a record.
Examples of ...
posted on 13 Jan 2022
Explanation of concurrent hash map and compile time vs run time polymorphism
Concurrent hash map allows multiple threads to access and modify the map concurrently without any external synchronization
Method overloading is compile time polymorphism as the decision of which method to call is made by the compiler at compile time based on the number and types of arguments passed
Method overriding is run time polymorphism as t...
Software Engineer
66
salaries
| ₹3.5 L/yr - ₹5.2 L/yr |
Software Developer
51
salaries
| ₹3.9 L/yr - ₹5 L/yr |
Software Development Engineer
39
salaries
| ₹3.8 L/yr - ₹4.8 L/yr |
Full Stack Developer
23
salaries
| ₹3.6 L/yr - ₹4.8 L/yr |
Software Engineer Trainee
16
salaries
| ₹3 L/yr - ₹4.5 L/yr |
upGrad
Simplilearn
Great Learning
Jigsaw Academy