Filter interviews by
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
10 min, simple question on programming skills
I have used the asynchronous messaging pattern for Microservice communication.
Implemented messaging queues like RabbitMQ or Kafka for decoupled communication
Used message brokers to enable communication between Microservices
Leveraged event-driven architecture for real-time updates and scalability
I have used Application Insights for monitoring and analyzing the performance of .NET applications.
Used Application Insights to track application performance metrics
Analyzed telemetry data to identify performance bottlenecks
Set up alerts and notifications for critical issues
Integrated Application Insights with Azure DevOps for continuous monitoring
We use in-memory caching technique in our project to improve performance and reduce database load.
In-memory caching is used to store frequently accessed data in memory for quick retrieval
Helps reduce database load and improve application performance
Examples: using MemoryCache in .NET, Redis caching, caching frequently accessed data like user profiles or product information
Yes, API Gateways are used in Microservices to manage and secure communication between services.
API Gateways act as a single entry point for clients to access multiple microservices
They handle authentication, authorization, rate limiting, logging, and monitoring
Examples of API Gateways include Kong, Apigee, and AWS API Gateway
We are using OAuth 2.0 for single sign on in the project.
OAuth 2.0 is a widely used authorization framework that enables a third-party application to obtain limited access to an HTTP service.
It allows users to log in once and access multiple applications without having to log in again.
OAuth 2.0 provides secure delegated access to resources without sharing user credentials.
JWT token is a JSON Web Token used for secure transmission of information between parties.
JWT token is a compact and self-contained way to transmit information between parties.
It is digitally signed to verify its authenticity and integrity.
JWT tokens consist of three parts: header, payload, and signature.
They are commonly used for authentication and information exchange in web applications.
Example: JWT tokens are often
Exception handling and filters in .NET Core Web API
Use try-catch blocks to handle exceptions in the code
Implement global exception handling middleware to catch unhandled exceptions
Use filters like [Authorize] for authentication and [ValidateAntiForgeryToken] for CSRF protection
Create custom exception filters by implementing IExceptionFilter interface
Top trending discussions
I applied via Naukri.com and was interviewed in Oct 2022. There were 4 interview rounds.
Aptitude test with 2 sections
Two basic coding questions . First was about finding the distinct duplicate in an array
OOPs is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs stands for Object-Oriented Programming.
It focuses on creating objects that interact with each other to solve a problem.
Encapsulation, Inheritance, Polymorphism, and Abstraction are the four main pillars of OOPs.
Example: A car can be considered as an object that has properties like color, model, and features, and methods...
SOLID principles are a set of five design principles for writing maintainable and scalable code.
Single Responsibility Principle (SRP) - a class should have only one reason to change
Open/Closed Principle (OCP) - software entities should be open for extension but closed for modification
Liskov Substitution Principle (LSP) - objects of a superclass should be able to be replaced with objects of a subclass without breaking t...
SCD Type 2 implementation involves tracking historical changes in data by creating new records for each change.
Identify the columns that need to be tracked for changes
Add effective start and end dates to track the validity of each record
Insert new records for changes and update end dates for previous records
Maintain a surrogate key to uniquely identify each version of the record
I can join the team within 2 weeks.
I can start within 2 weeks of receiving the offer.
I need to give notice to my current employer.
I may need to relocate, which could affect my start date.
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There were 2 interview rounds.
Custom hook to fetch data in React
Create a custom hook using the 'useEffect' and 'useState' hooks
Use 'fetch' or any other method to fetch data from an API
Return the fetched data from the custom hook
posted on 17 Sep 2024
I applied via Referral and was interviewed in Aug 2024. There were 3 interview rounds.
Ppk and Cpk are process capability indices used in Six Sigma to measure the ability of a process to produce output within specification limits.
Ppk and Cpk are statistical measurements that assess how well a process is performing in relation to its specification limits.
Ppk measures the potential capability of a process to produce output within specification limits, while Cpk measures the actual capability of a process t...
Different types of risks include financial, operational, strategic, compliance, and reputational risks.
Financial risk: related to the potential loss of financial resources, such as market risk, credit risk, and liquidity risk.
Operational risk: arises from internal processes, systems, or people, leading to errors, fraud, or disruptions.
Strategic risk: involves the impact of business decisions on the organization's long-...
Probability plot curves denote the distribution of data points compared to a theoretical distribution.
Probability plot curves help visualize how well a dataset fits a particular distribution.
The curves can indicate if the data is normally distributed or follows a different distribution.
Examples of probability plots include Q-Q plots and P-P plots.
posted on 14 Oct 2024
I applied via Naukri.com and was interviewed in Jun 2024. There were 2 interview rounds.
Non functional requirements are criteria that specify how a system should behave, rather than what it should do.
Performance - system should respond within 2 seconds for all user interactions
Scalability - system should be able to handle 1000 concurrent users
Reliability - system should have a 99.99% uptime
Security - system should encrypt all sensitive data
Usability - system should have a user-friendly interface
Improve legacy app performance by optimizing code, implementing caching, and scaling resources.
Optimize code by identifying and removing bottlenecks
Implement caching to reduce database calls and improve response time
Scale resources by using containers or serverless architecture
Use asynchronous processing for long-running tasks
Upgrade hardware or infrastructure if necessary
Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices and external clients.
Implement monitoring and logging to detect and respond to security incidents.
Consider using API gateways for central...
Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.
Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.
Services communicate through APIs, allowing for flexibility and scalability.
Each microservice can be developed, deployed, and scaled independently, leading to faster develo...
I applied via Referral and was interviewed in May 2024. There were 3 interview rounds.
Hacker Rank test, problem solving. Java 8
posted on 3 Sep 2024
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 2 interview rounds.
My favorite movie is The Shawshank Redemption.
Directed by Frank Darabont
Based on a Stephen King novella
Set in a prison in Maine
Themes of hope, friendship, and redemption
Starring Tim Robbins and Morgan Freeman
My favorite color is blue because it reminds me of the calming ocean and clear skies.
Blue is associated with calmness and tranquility
It symbolizes trust, loyalty, and confidence
Examples: navy blue, sky blue, royal blue
Power draining refers to the excessive consumption of power by a device or system, leading to decreased battery life or performance.
Power draining can occur due to background apps running constantly on a device.
Faulty hardware components can also contribute to power draining.
Settings such as high screen brightness or frequent data syncing can increase power draining.
Examples include a smartphone losing battery quickly ...
VPN stands for Virtual Private Network. It is used to create a secure connection over the internet, allowing users to access private networks remotely.
VPN encrypts data to ensure privacy and security
It allows users to access restricted websites or content
Commonly used for remote work, accessing company networks, and bypassing geo-restrictions
Examples include NordVPN, ExpressVPN, and Cisco AnyConnect
I applied via Approached by Company and was interviewed in Aug 2024. There were 2 interview rounds.
Design a weather app using Android architecture components.
Use MVVM architecture pattern for separation of concerns
Implement LiveData for real-time data updates
Utilize Room database for offline data storage
Integrate Retrofit for network calls to fetch weather data
Use ViewModel to manage UI-related data in a lifecycle-conscious way
based on 1 interview
Interview experience
Software Engineer
6.3k
salaries
| ₹2 L/yr - ₹9.5 L/yr |
Senior Software Engineer
5.6k
salaries
| ₹6 L/yr - ₹23 L/yr |
Associate Software Engineer
4.6k
salaries
| ₹2 L/yr - ₹7 L/yr |
Module Lead
2.4k
salaries
| ₹8.2 L/yr - ₹35 L/yr |
Transaction Processing Officer
2.3k
salaries
| ₹1.5 L/yr - ₹4.5 L/yr |
Cognizant
Wipro
Accenture
TCS