Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.
Interfaces define a contract for behavior, while abstract classes provide partial implementation.
Interfaces only define method signatures, while abstract classes can have both abstract and concrete methods.
A class can implement multiple interfaces, but can only inherit from one abstract class.
Interfaces are used for loose coupling and flexibility in design.
Abstract classes are used for code reuse and to enforce a commo
SOLID principles are a set of five design principles for writing maintainable and scalable code.
Single Responsibility Principle (SRP) - a class should have only one reason to change
Open-Closed Principle (OCP) - a class should be open for extension but closed for modification
Liskov Substitution Principle (LSP) - subtypes should be substitutable for their base types
Interface Segregation Principle (ISP) - clients should n...
Extension methods are static methods that allow adding new functionality to existing types without modifying the original type.
Extension methods are defined in a static class.
They must be declared with the 'this' keyword before the first parameter.
They can be called as if they were instance methods of the extended type.
Extension methods can be used to add functionality to built-in types or custom types.
Example: adding ...
No, C# does not support multiple inheritance.
C# only supports single inheritance, where a class can inherit from only one base class.
However, C# does support multiple interface inheritance, where a class can implement multiple interfaces.
This is achieved using the 'interface' keyword instead of 'class'.
Routing in MVC is done through the use of routes, which map URLs to controller actions.
Routes are defined in the RouteConfig.cs file in the App_Start folder
Routes consist of a URL pattern and a corresponding controller action
Routes can also include optional parameters and constraints
Routing is done through the use of the ASP.NET routing engine
Routing can be customized by creating custom route handlers
Filters in MVC are used to intercept and modify HTTP requests and responses.
Filters can be used to implement authentication and authorization.
They can also be used for caching and logging.
Examples of filters include AuthorizationFilter, ActionFilter, and ExceptionFilter.
Virtual keyword is used to declare a method in a base class that can be overridden in a derived class. Override keyword is used in the derived class to override the implementation of the virtual method.
Virtual keyword is used in the base class to declare a method that can be overridden in the derived class
Override keyword is used in the derived class to override the implementation of the virtual method
Virtual methods p...
Indexes in SQL are used to improve the performance of queries by allowing faster data retrieval.
Indexes are created on one or more columns of a table.
They work like a book index, allowing the database to quickly find the data.
Indexes can be clustered or non-clustered.
Clustered indexes determine the physical order of data in a table.
Non-clustered indexes create a separate structure to store the index data.
Indexes should...
Stored procedures are used to perform a set of actions, while functions return a single value.
Stored procedures are precompiled and stored in the database, while functions are compiled at runtime.
Functions can be used in SQL statements, while stored procedures cannot be used in SQL statements.
Functions can be called from within stored procedures, but stored procedures cannot be called from within functions.
Dependency injection is a design pattern used to remove hard-coded dependencies and make code more modular and testable.
Dependency injection involves injecting dependencies into a class rather than having the class create them itself.
This allows for easier testing and swapping out of dependencies.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Examples of ...
Singleton design pattern restricts the instantiation of a class to a single instance and provides a global point of access to it.
Used when only one instance of a class is required throughout the system
Provides a global point of access to the instance
Implemented using a private constructor, static method, and static variable
Example: Logger class in Java
Dependency injection is a design pattern that allows objects to receive dependencies from external sources rather than creating them internally.
Dependency injection helps to decouple components and make them more reusable and testable.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database connection object inside a class, w...
Singleton design pattern restricts the instantiation of a class to a single instance and provides a global point of access to it.
Used when only one instance of a class is required throughout the system
Provides a global point of access to the instance
Implemented using a private constructor, static method, and static variable
Example: Logger class, Database connection class
Solid Principles are a set of five design principles for writing clean, maintainable, and scalable code.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affe...
Design patterns are reusable solutions to common problems encountered in software design and development.
Design patterns provide a way to communicate solutions to common design problems
They help in making code more maintainable, scalable, and reusable
Examples include Singleton, Factory, Observer, and Strategy patterns
Our current project architecture follows a microservices design pattern with Docker containers and Kubernetes for orchestration.
Microservices architecture
Docker containers
Kubernetes for orchestration
I am interested in NCR because of its reputation for innovation and cutting-edge technology in the software industry.
NCR has a strong reputation for innovation and cutting-edge technology
I am excited about the opportunity to work on challenging projects at NCR
I believe NCR offers a great platform for career growth and development
I applied via Approached by Company and was interviewed in Oct 2024. There were 2 interview rounds.
Write a program to print first and last letters of words alternatively from am list
OOPs stands for Object-Oriented Programming. It is based on four main pillars: Inheritance, Encapsulation, Abstraction, and Polymorphism.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: class B extends class A.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: using private access modifiers to restrict access to certain data.
Abstract...
NCR Voyix interview questions for popular designations
Loop in a linked list refers to a situation where a node in the list points to a previous node, creating a cycle.
Check for a loop using Floyd's cycle detection algorithm
Use two pointers, one moving at twice the speed of the other
If the two pointers meet at some point, there is a loop
To delete a node in a linked list with a given pointer, update the node's value and next pointer to the next node's value and next pointer.
Set the value of the node to the value of the next node
Set the next pointer of the node to the next node's next pointer
Get interview-ready with Top NCR Voyix Interview Questions
I applied via Approached by Company and was interviewed in Dec 2024. There was 1 interview round.
Witten test DSA QUESTIONS along with aptitude
Find and print the missing number in a given array of strings.
Convert the array of strings to an array of integers for easier manipulation.
Iterate through the array to find the missing number by comparing consecutive elements.
Print the missing number once found.
Reverse a string in an array of strings
Iterate through each string in the array
Use a loop to reverse each string character by character
Store the reversed strings in a new array
To test a faulty ATM, simulate various scenarios like card reader failure, cash dispenser malfunction, network connectivity issues, etc.
Simulate card reader failure by inserting a damaged card or a card with a magnetic strip issue.
Test cash dispenser malfunction by requesting cash withdrawal and observing if the correct amount is dispensed.
Check for network connectivity issues by trying to access online banking service...
Experienced management consultant with a background in strategy, operations, and project management.
Worked at top consulting firms like McKinsey & Company and Bain & Company
Led cross-functional teams to implement cost-saving initiatives
Developed strategic plans for Fortune 500 companies
Strong analytical and problem-solving skills
MBA from a top business school
Top trending discussions
Some of the top questions asked at the NCR Voyix interview -
The duration of NCR Voyix interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 80 interviews
Interview experience
based on 1.5k reviews
Rating in categories
Software Engineer
374
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
239
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
176
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer2
164
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer III
147
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech