i
Nagarro
Filter interviews by
I applied via Approached by Company and was interviewed in Jan 2018. There were 4 interview rounds.
This question asks for displaying all possible substrings of a given string.
Iterate through the string and generate all possible substrings
Use nested loops to generate substrings of different lengths
Store the substrings in an array of strings
posted on 4 Dec 2024
I applied via Naukri.com and was interviewed in Nov 2024. There were 4 interview rounds.
If is purely coding language related mcq test
Leet code low to medium level problem.
posted on 2 Jul 2024
An IP address is a unique numerical label assigned to each device connected to a computer network.
IP address stands for Internet Protocol address.
It is used to identify and locate devices on a network.
There are two types of IP addresses - IPv4 and IPv6.
Example of IPv4 address: 192.168.1.1
Example of IPv6 address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
The OSI model stands for Open Systems Interconnection model
It helps in understanding how different networking protocols work together
Each layer has specific functions and communicates with adjacent layers
Examples of layers include physical layer, data link layer, network layer, e
The daily routine of an IT Support Engineer involves troubleshooting technical issues, providing support to end users, and maintaining IT systems.
Responding to help desk tickets and resolving technical issues
Installing and configuring hardware and software
Providing technical support to end users via phone, email, or in person
Performing routine maintenance on IT systems
Documenting solutions and procedures for future ref
posted on 7 Dec 2022
I applied via Naukri.com and was interviewed in Nov 2022. There were 3 interview rounds.
A trigger is an event or condition that initiates a specific action or process.
Triggers are commonly used in programming and databases.
They can be used to automate tasks or initiate processes based on certain conditions.
Examples include a trigger that sends an email when a new user registers on a website, or a trigger that updates a database record when a certain field is changed.
Triggers can also be used in marketing ...
Right outer join returns all records from the right table and matching records from the left table.
It includes all the records from the right table and only matching records from the left table.
If there is no match in the left table, the result will contain NULL values.
It is denoted by RIGHT OUTER JOIN or RIGHT JOIN keyword in SQL.
Example: SELECT * FROM right_table RIGHT JOIN left_table ON right_table.id = left_table.i
Types in Oracle are data types that define the type of data that can be stored in a column or variable.
Oracle has several built-in data types such as NUMBER, VARCHAR2, DATE, and CLOB.
NUMBER is used to store numeric values, VARCHAR2 is used to store character strings, DATE is used to store dates and times, and CLOB is used to store large character strings.
Oracle also supports user-defined data types, which can be create...
An array type is a data type that stores a collection of elements of the same data type in a contiguous memory location.
Arrays can be one-dimensional or multi-dimensional
Elements in an array can be accessed using an index
Arrays can be initialized with a fixed size or dynamically resized
Examples of array types include int[], double[], and string[]
posted on 4 Jun 2022
I applied via Approached by Company and was interviewed in Dec 2021. There were 2 interview rounds.
posted on 5 Nov 2021
I applied via Naukri.com and was interviewed in May 2021. There were 3 interview rounds.
posted on 4 Jun 2024
I handle security in my application by implementing encryption, access controls, regular security audits, and staying updated on security best practices.
Implement encryption for sensitive data to protect it from unauthorized access
Use access controls to restrict user permissions and limit exposure of sensitive information
Conduct regular security audits to identify and address vulnerabilities
Stay updated on security bes...
To make a class immutable, we can use final keyword for class, fields, and methods, make fields private, and avoid setters.
Use final keyword for class to prevent inheritance
Make fields private to restrict direct access
Avoid providing setter methods for fields
If fields are mutable objects, return a copy of the object instead of the original
I have used the Singleton, Factory, and Observer design patterns in my project.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object that will be created.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and upda
Memory management in Java involves automatic memory allocation and garbage collection.
Java uses automatic memory management through garbage collection to allocate and deallocate memory.
Memory is divided into stack and heap. Stack stores primitive types and references to objects, while heap stores objects.
Garbage collection in Java identifies and removes objects that are no longer needed, freeing up memory for new objec...
based on 29 reviews
Rating in categories
Associate Staff Engineer
2.9k
salaries
| ₹10 L/yr - ₹35.2 L/yr |
Staff Engineer
2.8k
salaries
| ₹14.8 L/yr - ₹43.2 L/yr |
Senior Engineer
2.3k
salaries
| ₹6.2 L/yr - ₹25 L/yr |
Senior Software Engineer
1.1k
salaries
| ₹6.6 L/yr - ₹30.7 L/yr |
Software Engineer
940
salaries
| ₹3 L/yr - ₹12.2 L/yr |
Deloitte
Cognizant
TCS
Accenture