i
NEC
Filter interviews by
I applied via Company Website and was interviewed before Feb 2023. There were 2 interview rounds.
Array and string based questions
Top trending discussions
I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.
I was interviewed in Jan 2025.
posted on 18 Jan 2025
I applied via Approached by Company and was interviewed in Dec 2024. There were 4 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Oct 2024. There were 2 interview rounds.
posted on 7 Jan 2025
I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.
2nd round was about again Android but more focused on security features of android
3rd round was live coding . I was asked to make an app from scratch in 1 hour without even using google.
posted on 4 Oct 2024
Angular offers advantages such as two-way data binding, dependency injection, and modular architecture.
Two-way data binding allows automatic synchronization of data between the model and the view, reducing the need for manual DOM manipulation.
Dependency injection helps manage dependencies and promotes code reusability by allowing components to be easily injected with their dependencies.
Modular architecture enables deve...
ngModel is a directive in AngularJS that binds the value of HTML controls to application data.
ngModel is used for two-way data binding in AngularJS.
It can be used with input, select, textarea, and custom form controls.
Example:
posted on 30 Jan 2025
I was interviewed in Dec 2024.
posted on 30 May 2024
I applied via Naukri.com and was interviewed in Apr 2024. There were 3 interview rounds.
Streams in Java 8 provide a way to process collections of objects in a functional style.
Streams allow for functional-style operations on collections, such as map, filter, and reduce.
Streams can be sequential or parallel, allowing for efficient processing of large datasets.
Streams do not store elements, they are processed on-demand as needed.
Example: List
Authentication verifies the identity of a user, while authorization determines what a user can access.
Authentication confirms the user's identity through credentials like passwords or biometrics.
Authorization determines the user's permissions and access levels to resources.
Example: Logging into a system with a username and password is authentication. Being able to view certain files based on your role is authorization.
Hashmap is a data structure that stores key-value pairs and allows for quick retrieval of values based on keys.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when multiple keys hash to the same index, which can be resolved using techniques like chaining or open addressing.
Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval operations.
Example: HashM...
Use a hash set to keep track of seen elements and identify duplicates in an unsorted array of strings.
Iterate through the array and add each element to a hash set.
If an element is already in the hash set, it is a duplicate.
Example: ['apple', 'banana', 'apple', 'orange'] => 'apple' is a duplicate.
Handling http requests in Spring Boot involves creating controller classes, mapping endpoints, and using annotations like @RestController and @RequestMapping.
Create a controller class with @RestController annotation
Map endpoints using @RequestMapping annotation
Use @GetMapping, @PostMapping, @PutMapping, @DeleteMapping annotations for specific HTTP methods
Inject dependencies using @Autowired annotation
Microservices communicate with each other through APIs, message queues, or event-driven architecture.
APIs: Microservices can communicate with each other through RESTful APIs or GraphQL.
Message queues: Services can use message brokers like RabbitMQ or Kafka to send and receive messages.
Event-driven architecture: Services can publish events to a message broker and subscribe to events they are interested in.
Service discov...
Exception handling in Spring Boot involves using @ControllerAdvice, @ExceptionHandler, and ResponseEntity.
Use @ControllerAdvice to define global exception handling for all controllers
Use @ExceptionHandler to handle specific exceptions in individual controllers
Return ResponseEntity with appropriate status codes and error messages
Microservices can be deployed in AWS using services like ECS, EKS, Lambda, or Fargate.
Microservices can be deployed on AWS Elastic Container Service (ECS) for containerized applications.
AWS Elastic Kubernetes Service (EKS) can be used for deploying microservices using Kubernetes.
Serverless microservices can be deployed using AWS Lambda.
AWS Fargate provides serverless compute for containers, allowing for easy deployment
based on 1 interview
Interview experience
based on 47 reviews
Rating in categories
Member Technical Staff
365
salaries
| ₹3.2 L/yr - ₹8.5 L/yr |
Technical Lead
305
salaries
| ₹8.7 L/yr - ₹32 L/yr |
Senior Member of Technical Staff
190
salaries
| ₹5 L/yr - ₹18 L/yr |
Senior Software Engineer
171
salaries
| ₹7 L/yr - ₹27.2 L/yr |
Senior Technical Lead
161
salaries
| ₹12 L/yr - ₹39 L/yr |
Hitachi
Toshiba
Panasonic
Sony