i
Mphasis
Filter interviews by
Abstraction is hiding the implementation details while interface is a contract that defines the methods that a class must implement.
Abstraction focuses on hiding the internal implementation details of a class, allowing the user to only see the necessary information.
Interfaces define a set of methods that a class must implement, without specifying how those methods are implemented.
Abstraction can be achieved throug...
Authentication in web API is crucial for securing access to resources and ensuring data privacy.
Use token-based authentication like JWT for secure communication between client and server
Implement OAuth2 for authorization and access control
Use HTTPS to encrypt data transmission and prevent man-in-the-middle attacks
String is immutable in order to ensure data integrity and security.
Immutable strings prevent accidental changes to data, ensuring consistency in programs.
Immutable strings allow for more efficient memory management and optimization.
Example: In Java, once a string object is created, its value cannot be changed.
A database is a structured collection of data that is stored and accessed electronically.
Database organizes and stores data in tables
It allows for efficient retrieval, insertion, and updating of data
Examples include MySQL, Oracle, MongoDB
What people are saying about Mphasis
A trigger is a special kind of stored procedure that is automatically executed when certain events occur in a database.
Triggers are used to maintain data integrity by enforcing business rules or cascading changes.
They can be set to execute before or after INSERT, UPDATE, or DELETE operations.
Examples include auditing changes to a table, updating related records in other tables, or enforcing constraints.
Primary key is a unique identifier for each record in a database table.
Primary key ensures each record in a table is uniquely identified.
It must have a unique value for each record.
Primary key can be a single column or a combination of columns.
Examples: ID column in a user table, combination of first name and last name in an employee table.
Check if a string is a palindrome or not.
Reverse the string and compare it with the original string.
Use two pointers, one at the beginning and one at the end, and compare the characters.
Ignore non-alphanumeric characters and convert to lowercase before checking.
Sort array of strings based on custom logic
Define the custom logic for sorting
Implement a sorting algorithm such as bubble sort or quicksort
Apply the custom logic during the sorting process
Procedures and functions are stored routines in a database that can be called to perform specific tasks.
Procedures are a set of SQL statements that perform a specific task. They can have input and output parameters.
Functions are similar to procedures but return a value. They can be used in SQL queries like any other function.
Both procedures and functions can improve code reusability and maintainability in a databa...
Middleware in .NET Core is a component that can handle requests and responses in the application pipeline.
Middleware is a piece of software that can intercept and process HTTP requests and responses in the application pipeline.
Middleware can be used for logging, authentication, authorization, error handling, and more.
Middleware is added to the application pipeline using the app.UseMiddleware() method in the Config...
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
Procedures and functions are stored routines in a database that can be called to perform specific tasks.
Procedures are a set of SQL statements that perform a specific task. They can have input and output parameters.
Functions are similar to procedures but return a value. They can be used in SQL queries like any other function.
Both procedures and functions can improve code reusability and maintainability in a database sy...
A trigger is a special kind of stored procedure that is automatically executed when certain events occur in a database.
Triggers are used to maintain data integrity by enforcing business rules or cascading changes.
They can be set to execute before or after INSERT, UPDATE, or DELETE operations.
Examples include auditing changes to a table, updating related records in other tables, or enforcing constraints.
A database is a structured collection of data that is stored and accessed electronically.
Database organizes and stores data in tables
It allows for efficient retrieval, insertion, and updating of data
Examples include MySQL, Oracle, MongoDB
Primary key is a unique identifier for each record in a database table.
Primary key ensures each record in a table is uniquely identified.
It must have a unique value for each record.
Primary key can be a single column or a combination of columns.
Examples: ID column in a user table, combination of first name and last name in an employee table.
I applied via LinkedIn and was interviewed before Jan 2024. There was 1 interview round.
Abstraction is hiding the implementation details while interface is a contract that defines the methods that a class must implement.
Abstraction focuses on hiding the internal implementation details of a class, allowing the user to only see the necessary information.
Interfaces define a set of methods that a class must implement, without specifying how those methods are implemented.
Abstraction can be achieved through abs...
Ref vs Out parameters in C#
Ref parameters must be initialized before passing to a method, while Out parameters do not need to be initialized.
Ref parameters can be read and modified within the method, while Out parameters are typically used for output values only.
Example: void ModifyValue(ref int num) { num = 10; } vs void GetOutput(out int result) { result = 20; }
Middleware in .NET Core is a component that can handle requests and responses in the application pipeline.
Middleware is a piece of software that can intercept and process HTTP requests and responses in the application pipeline.
Middleware can be used for logging, authentication, authorization, error handling, and more.
Middleware is added to the application pipeline using the app.UseMiddleware() method in the Configure m...
Authentication in web API is crucial for securing access to resources and ensuring data privacy.
Use token-based authentication like JWT for secure communication between client and server
Implement OAuth2 for authorization and access control
Use HTTPS to encrypt data transmission and prevent man-in-the-middle attacks
I appeared for an interview before Jun 2024, where I was asked the following questions.
The JVM executes Java bytecode, providing platform independence and memory management through garbage collection.
The JVM converts Java bytecode into machine code using a Just-In-Time (JIT) compiler.
It manages memory through an automatic garbage collection process, reclaiming memory from objects no longer in use.
The JVM provides a runtime environment that includes a class loader for loading classes and a security manage...
Spring and Spring Boot simplify Java development with features like dependency injection, microservices support, and rapid application setup.
Dependency Injection: Promotes loose coupling and easier testing. Example: Using @Autowired to inject services.
Microservices Support: Spring Boot makes it easy to create stand-alone, production-grade Spring applications. Example: Building RESTful APIs.
Convention over Configuration...
Spring Security uses various annotations to manage security configurations and access control in applications.
@EnableWebSecurity: Enables Spring Security’s web security support and provides the Spring MVC integration.
@PreAuthorize: Used to specify method-level security, allowing access based on roles or expressions. Example: @PreAuthorize("hasRole('ADMIN')")
@PostAuthorize: Similar to @PreAuthorize but checks access aft...
I applied via Recruitment Consulltant and was interviewed before Jun 2023. There were 2 interview rounds.
String is immutable in order to ensure data integrity and security.
Immutable strings prevent accidental changes to data, ensuring consistency in programs.
Immutable strings allow for more efficient memory management and optimization.
Example: In Java, once a string object is created, its value cannot be changed.
Extrusion is a process used to create objects of a fixed cross-sectional profile.
Extrusion is a manufacturing process where a material is pushed through a die to create a specific shape.
Common materials used in extrusion include metals, plastics, and food products.
Examples of extruded products include pipes, rods, and window frames.
Sort array of strings based on custom logic
Define the custom logic for sorting
Implement a sorting algorithm such as bubble sort or quicksort
Apply the custom logic during the sorting process
Check if a string is a palindrome or not.
Reverse the string and compare it with the original string.
Use two pointers, one at the beginning and one at the end, and compare the characters.
Ignore non-alphanumeric characters and convert to lowercase before checking.
posted on 26 Feb 2021
I applied via Company Website and was interviewed before Feb 2020. There were 4 interview rounds.
Handled high pressure from client by prioritizing tasks and communicating effectively.
Identified critical issues and addressed them first
Communicated regularly with the client to provide updates and manage expectations
Collaborated with team members to delegate tasks and ensure timely delivery
Maintained a calm and professional demeanor to avoid escalating the situation
Release management is the process of planning, scheduling, coordinating, and deploying software releases.
It involves identifying the scope of the release and the features to be included
Creating a release plan and schedule
Coordinating with different teams involved in the release process
Testing the release to ensure it meets quality standards
Deploying the release to production
Monitoring the release to ensure it is stable...
posted on 2 Jun 2022
I appeared for an interview before Jun 2021.
Had DSA and aptitude questions
posted on 29 Jan 2021
I applied via Naukri.com and was interviewed in Jul 2020. There were 4 interview rounds.
posted on 23 Jan 2022
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Jan 2021. There were 3 interview rounds.
based on 4 interview experiences
Difficulty level
Duration
based on 48 reviews
Rating in categories
Software Engineer
6.8k
salaries
| ₹4 L/yr - ₹9.5 L/yr |
Senior Software Engineer
6k
salaries
| ₹6.6 L/yr - ₹20 L/yr |
Associate Software Engineer
4.9k
salaries
| ₹2 L/yr - ₹5.6 L/yr |
Module Lead
2.5k
salaries
| ₹15.8 L/yr - ₹27 L/yr |
Transaction Processing Officer
2.3k
salaries
| ₹1.4 L/yr - ₹4.7 L/yr |
Cognizant
Wipro
Accenture
TCS