i
Mphasis
Filter interviews by
SCD Type 2 implementation involves tracking historical changes in data by creating new records for each change.
Identify the columns that need to be tracked for changes
Add effective start and end dates to track the validity of each record
Insert new records for changes and update end dates for previous records
Maintain a surrogate key to uniquely identify each version of the record
I can join the team within 2 weeks.
I can start within 2 weeks of receiving the offer.
I need to give notice to my current employer.
I may need to relocate, which could affect my start date.
I was interviewed in Jan 2025.
The Java Virtual Machine (JVM) is an abstract computing machine that enables a computer to run Java programs.
JVM is platform-independent and converts Java bytecode into machine code.
It consists of class loader, runtime data areas, execution engine, and native method interface.
JVM memory is divided into method area, heap, stack, and PC register.
Examples of JVM implementations include Oracle HotSpot, OpenJ9, and GraalVM.
The default connection pooling in Spring Boot is HikariCP, which can be customized through properties in the application.properties file.
HikariCP is the default connection pooling library in Spring Boot, known for its high performance and low overhead.
To customize the connection pooling, you can modify properties like 'spring.datasource.hikari.*' in the application.properties file.
For example, you can set maximum pool ...
Best practices for optimizing a Spring Boot application
Use Spring Boot Actuator to monitor and manage application performance
Implement caching mechanisms like Spring Cache to reduce database calls
Optimize database queries and indexes for better performance
Use asynchronous processing with Spring's @Async annotation for non-blocking operations
Profile and analyze application performance using tools like VisualVM or JProfi
A heap dump is a snapshot of the memory usage of a Java application at a specific point in time.
Heap dumps can be generated using tools like jmap or VisualVM.
They provide detailed information about objects in memory, their sizes, and references.
Analyzing a heap dump can help identify memory leaks by pinpointing objects that are consuming excessive memory.
Common signs of memory leaks in a heap dump include a large numbe...
Diagonally iterate through and print elements of a 2D array of strings.
Use nested loops to iterate through rows and columns of the 2D array.
Calculate the diagonal elements by incrementing row and column indices together.
Print the elements as you iterate through the diagonal of the array.
posted on 17 Sep 2024
I applied via Referral and was interviewed in Aug 2024. There were 3 interview rounds.
Ppk and Cpk are process capability indices used in Six Sigma to measure the ability of a process to produce output within specification limits.
Ppk and Cpk are statistical measurements that assess how well a process is performing in relation to its specification limits.
Ppk measures the potential capability of a process to produce output within specification limits, while Cpk measures the actual capability of a process t...
Different types of risks include financial, operational, strategic, compliance, and reputational risks.
Financial risk: related to the potential loss of financial resources, such as market risk, credit risk, and liquidity risk.
Operational risk: arises from internal processes, systems, or people, leading to errors, fraud, or disruptions.
Strategic risk: involves the impact of business decisions on the organization's long-...
Probability plot curves denote the distribution of data points compared to a theoretical distribution.
Probability plot curves help visualize how well a dataset fits a particular distribution.
The curves can indicate if the data is normally distributed or follows a different distribution.
Examples of probability plots include Q-Q plots and P-P plots.
posted on 14 Oct 2024
I applied via Company Website and was interviewed in Oct 2024. There was 1 interview round.
Closure is a function that has access to its own scope, as well as the scope in which it was defined.
Closure allows a function to access variables from its outer function even after the outer function has finished executing.
It helps in maintaining state in asynchronous operations.
Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }
Hooks in React are functions that let you use state and other React features without writing a class.
Hooks were introduced in React 16.8 to allow functional components to have state and lifecycle methods.
useState() is a hook that allows you to add state to functional components.
useEffect() is a hook that allows you to perform side effects in functional components.
Custom hooks are reusable functions that can contain log...
I applied via Referral and was interviewed in May 2024. There were 3 interview rounds.
Hacker Rank test, problem solving. Java 8
I applied via Naukri.com and was interviewed in May 2024. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Aug 2024. There were 2 interview rounds.
Design a weather app using Android architecture components.
Use MVVM architecture pattern for separation of concerns
Implement LiveData for real-time data updates
Utilize Room database for offline data storage
Integrate Retrofit for network calls to fetch weather data
Use ViewModel to manage UI-related data in a lifecycle-conscious way
based on 1 interview
Interview experience
Software Engineer
6.3k
salaries
| ₹2 L/yr - ₹11.1 L/yr |
Senior Software Engineer
5.6k
salaries
| ₹6 L/yr - ₹23.5 L/yr |
Associate Software Engineer
4.6k
salaries
| ₹2 L/yr - ₹6 L/yr |
Module Lead
2.4k
salaries
| ₹9.5 L/yr - ₹34.3 L/yr |
Transaction Processing Officer
2.3k
salaries
| ₹1.5 L/yr - ₹4.5 L/yr |
Cognizant
Wipro
Accenture
TCS