i
Mphasis
Filter interviews by
Abstraction is hiding the implementation details while interface is a contract that defines the methods that a class must implement.
Abstraction focuses on hiding the internal implementation details of a class, allowing the user to only see the necessary information.
Interfaces define a set of methods that a class must implement, without specifying how those methods are implemented.
Abstraction can be achieved throug...
Authentication in web API is crucial for securing access to resources and ensuring data privacy.
Use token-based authentication like JWT for secure communication between client and server
Implement OAuth2 for authorization and access control
Use HTTPS to encrypt data transmission and prevent man-in-the-middle attacks
String is immutable in order to ensure data integrity and security.
Immutable strings prevent accidental changes to data, ensuring consistency in programs.
Immutable strings allow for more efficient memory management and optimization.
Example: In Java, once a string object is created, its value cannot be changed.
A database is a structured collection of data that is stored and accessed electronically.
Database organizes and stores data in tables
It allows for efficient retrieval, insertion, and updating of data
Examples include MySQL, Oracle, MongoDB
A trigger is a special kind of stored procedure that is automatically executed when certain events occur in a database.
Triggers are used to maintain data integrity by enforcing business rules or cascading changes.
They can be set to execute before or after INSERT, UPDATE, or DELETE operations.
Examples include auditing changes to a table, updating related records in other tables, or enforcing constraints.
Primary key is a unique identifier for each record in a database table.
Primary key ensures each record in a table is uniquely identified.
It must have a unique value for each record.
Primary key can be a single column or a combination of columns.
Examples: ID column in a user table, combination of first name and last name in an employee table.
Check if a string is a palindrome or not.
Reverse the string and compare it with the original string.
Use two pointers, one at the beginning and one at the end, and compare the characters.
Ignore non-alphanumeric characters and convert to lowercase before checking.
Sort array of strings based on custom logic
Define the custom logic for sorting
Implement a sorting algorithm such as bubble sort or quicksort
Apply the custom logic during the sorting process
Procedures and functions are stored routines in a database that can be called to perform specific tasks.
Procedures are a set of SQL statements that perform a specific task. They can have input and output parameters.
Functions are similar to procedures but return a value. They can be used in SQL queries like any other function.
Both procedures and functions can improve code reusability and maintainability in a databa...
Middleware in .NET Core is a component that can handle requests and responses in the application pipeline.
Middleware is a piece of software that can intercept and process HTTP requests and responses in the application pipeline.
Middleware can be used for logging, authentication, authorization, error handling, and more.
Middleware is added to the application pipeline using the app.UseMiddleware() method in the Config...
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
Procedures and functions are stored routines in a database that can be called to perform specific tasks.
Procedures are a set of SQL statements that perform a specific task. They can have input and output parameters.
Functions are similar to procedures but return a value. They can be used in SQL queries like any other function.
Both procedures and functions can improve code reusability and maintainability in a database sy...
A trigger is a special kind of stored procedure that is automatically executed when certain events occur in a database.
Triggers are used to maintain data integrity by enforcing business rules or cascading changes.
They can be set to execute before or after INSERT, UPDATE, or DELETE operations.
Examples include auditing changes to a table, updating related records in other tables, or enforcing constraints.
A database is a structured collection of data that is stored and accessed electronically.
Database organizes and stores data in tables
It allows for efficient retrieval, insertion, and updating of data
Examples include MySQL, Oracle, MongoDB
Primary key is a unique identifier for each record in a database table.
Primary key ensures each record in a table is uniquely identified.
It must have a unique value for each record.
Primary key can be a single column or a combination of columns.
Examples: ID column in a user table, combination of first name and last name in an employee table.
I applied via LinkedIn and was interviewed before Jan 2024. There was 1 interview round.
Abstraction is hiding the implementation details while interface is a contract that defines the methods that a class must implement.
Abstraction focuses on hiding the internal implementation details of a class, allowing the user to only see the necessary information.
Interfaces define a set of methods that a class must implement, without specifying how those methods are implemented.
Abstraction can be achieved through abs...
Ref vs Out parameters in C#
Ref parameters must be initialized before passing to a method, while Out parameters do not need to be initialized.
Ref parameters can be read and modified within the method, while Out parameters are typically used for output values only.
Example: void ModifyValue(ref int num) { num = 10; } vs void GetOutput(out int result) { result = 20; }
Middleware in .NET Core is a component that can handle requests and responses in the application pipeline.
Middleware is a piece of software that can intercept and process HTTP requests and responses in the application pipeline.
Middleware can be used for logging, authentication, authorization, error handling, and more.
Middleware is added to the application pipeline using the app.UseMiddleware() method in the Configure m...
Authentication in web API is crucial for securing access to resources and ensuring data privacy.
Use token-based authentication like JWT for secure communication between client and server
Implement OAuth2 for authorization and access control
Use HTTPS to encrypt data transmission and prevent man-in-the-middle attacks
I appeared for an interview before Jun 2024, where I was asked the following questions.
The JVM executes Java bytecode, providing platform independence and memory management through garbage collection.
The JVM converts Java bytecode into machine code using a Just-In-Time (JIT) compiler.
It manages memory through an automatic garbage collection process, reclaiming memory from objects no longer in use.
The JVM provides a runtime environment that includes a class loader for loading classes and a security manage...
Spring and Spring Boot simplify Java development with features like dependency injection, microservices support, and rapid application setup.
Dependency Injection: Promotes loose coupling and easier testing. Example: Using @Autowired to inject services.
Microservices Support: Spring Boot makes it easy to create stand-alone, production-grade Spring applications. Example: Building RESTful APIs.
Convention over Configuration...
Spring Security uses various annotations to manage security configurations and access control in applications.
@EnableWebSecurity: Enables Spring Security’s web security support and provides the Spring MVC integration.
@PreAuthorize: Used to specify method-level security, allowing access based on roles or expressions. Example: @PreAuthorize("hasRole('ADMIN')")
@PostAuthorize: Similar to @PreAuthorize but checks access aft...
I applied via Recruitment Consulltant and was interviewed before Jun 2023. There were 2 interview rounds.
String is immutable in order to ensure data integrity and security.
Immutable strings prevent accidental changes to data, ensuring consistency in programs.
Immutable strings allow for more efficient memory management and optimization.
Example: In Java, once a string object is created, its value cannot be changed.
Extrusion is a process used to create objects of a fixed cross-sectional profile.
Extrusion is a manufacturing process where a material is pushed through a die to create a specific shape.
Common materials used in extrusion include metals, plastics, and food products.
Examples of extruded products include pipes, rods, and window frames.
Sort array of strings based on custom logic
Define the custom logic for sorting
Implement a sorting algorithm such as bubble sort or quicksort
Apply the custom logic during the sorting process
Check if a string is a palindrome or not.
Reverse the string and compare it with the original string.
Use two pointers, one at the beginning and one at the end, and compare the characters.
Ignore non-alphanumeric characters and convert to lowercase before checking.
Top trending discussions
posted on 2 Jun 2022
I appeared for an interview before Jun 2021.
Had DSA and aptitude questions
posted on 29 Jan 2021
I applied via Naukri.com and was interviewed in Jul 2020. There were 4 interview rounds.
posted on 7 May 2022
I applied via Campus Placement and was interviewed before May 2021. There were 2 interview rounds.
Basic aptitude knowledge
Strong in java
posted on 15 Sep 2021
I appeared for an interview before Sep 2020.
Round duration - 90 minutes
Round difficulty - Easy
It happens in very friendly manner.
Given an 'M x N' matrix, print all the possible paths from the top-left corner to the bottom-right corner. You can only move either right (from (i,j) to (i,j+1)) or dow...
Print all possible paths from top-left to bottom-right in a matrix by moving only right or down.
Use backtracking to explore all possible paths from top-left to bottom-right in the matrix.
At each cell, recursively explore moving right and down until reaching the bottom-right corner.
Keep track of the current path and add it to the result when reaching the destination.
Yes, I can create 2 tables in SQL and perform operations like INSERT, SELECT, UPDATE, and DELETE.
Create Table 1: CREATE TABLE employees (id INT, name VARCHAR(50), salary DECIMAL(10,2));
Create Table 2: CREATE TABLE departments (dept_id INT, dept_name VARCHAR(50));
Insert Data: INSERT INTO employees VALUES (1, 'John Doe', 50000);
Select Data: SELECT * FROM employees WHERE salary > 40000;
Update Data: UPDATE employees SET...
Round duration - 90 minutes
Round difficulty - Medium
No problem occur very friendly environment.
Round duration - 90 minutes
Round difficulty - Hard
You need to determine all possible paths for a rat starting at position (0, 0) in a square maze to reach its destination at (N-1, N-1). The maze is represented as an N*N ma...
Find all possible paths for a rat in a maze from source to destination.
Use backtracking to explore all possible paths in the maze.
Keep track of visited cells to avoid revisiting them.
Explore all possible directions (up, down, left, right) from each cell.
Add the current direction to the path and recursively explore further.
If the destination is reached, add the path to the list of valid paths.
Tip 1 : Competitive programming plays a major role when you are appearing for coding rounds as a fresher. In the coding rounds, you won't get direct problems copied from Geeksforgeeks or Leetcode. You would be required to use your logical thinking to go ahead in the process. This is where competitive programming helps.
Tip 2 : Coding rounds are all about Coding + Timing. Most people fail to excel due to the pressure of a timer ticking on your head. So, instead of just solving problems, try to participate in timed contests. This will help you be used to the pressure of the timer.
Tip 3 : Many big companies like Microsoft, Amazon, and even Google expect you to be good at standard problems. So, once you are done with coding round by your logical skills and competitive programming, you must be well versed with some standard problems in order to excel.
Application resume tips for other job seekersTip 1 : Make it short, crisp, and simple. It is always good to have a 1 pager resume.
Tip 2 : Resume must comprise of the following: Educational Qualifications, Technical skills, Projects, Work experience (if any), Achievements. Other than this, you may include some extra co-curricular achievements.
based on 4 interview experiences
Difficulty level
Duration
based on 48 reviews
Rating in categories
Software Engineer
6.7k
salaries
| ₹4 L/yr - ₹8.4 L/yr |
Senior Software Engineer
6k
salaries
| ₹6.6 L/yr - ₹20 L/yr |
Associate Software Engineer
4.9k
salaries
| ₹2 L/yr - ₹5.6 L/yr |
Module Lead
2.5k
salaries
| ₹15.8 L/yr - ₹27 L/yr |
Transaction Processing Officer
2.3k
salaries
| ₹1.4 L/yr - ₹4.7 L/yr |
Cognizant
Wipro
Accenture
TCS