Filter interviews by
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
Spring Boot is a framework that simplifies the development of Java applications by providing pre-configured settings and tools.
Spring Boot eliminates the need for manual configuration by providing defaults for most settings.
It allows for easy creation of standalone, production-grade Spring-based Applications.
Spring Boot uses embedded servers like Tomcat, Jetty, or Undertow to simplify deployment.
It provides a wide rang...
The question is asking for a code to format dates.
Use libraries like moment.js or date-fns for easy date formatting in JavaScript.
For example, to format a date in MM/DD/YYYY format using moment.js: moment(date).format('MM/DD/YYYY')
Make sure to handle different date formats and timezones appropriately.
API testing involves testing the various HTTP methods like GET, POST, PUT, DELETE, etc.
API testing ensures that the API functions correctly and meets the requirements
Common HTTP methods used in API testing include GET, POST, PUT, DELETE
Each HTTP method has a specific purpose in API testing, such as retrieving data with GET or updating data with PUT
API testing tools like Postman or SoapUI can be used to test HTTP method
To troubleshoot client side and server side errors, identify the source of the error, check logs, test connectivity, and consult documentation.
Identify the source of the error - determine if it is a client side or server side issue
Check logs for error messages and stack traces to pinpoint the issue
Test connectivity between client and server to ensure communication is working properly
Consult documentation or resources f...
The code represents the entry point of a Java program.
The 'public' keyword indicates that the method is accessible by any other class.
The 'static' keyword allows the method to be called without creating an instance of the class.
The 'void' keyword indicates that the method does not return any value.
The 'main' method is where the program starts execution.
The 'String[] args' parameter allows command-line arguments to be p
Top trending discussions
I applied via Naukri.com and was interviewed before Mar 2021. There was 1 interview round.
Quantitive question
I applied via LinkedIn and was interviewed in Oct 2021. There were 3 interview rounds.
I am a highly skilled and experienced Business Analyst with a strong background in data analysis and problem-solving.
Over 5 years of experience as a Business Analyst in various industries
Proficient in gathering and analyzing business requirements
Expertise in data modeling and visualization tools such as Tableau and Power BI
Strong communication and presentation skills
Proven track record of successfully implementing proc...
SRS and FRS are types of documentation used in software development.
SRS stands for Software Requirements Specification and outlines the functional and non-functional requirements of a software system.
FRS stands for Functional Requirements Specification and details the specific features and functionalities of a software system.
Other types of documentation include user manuals, technical specifications, and design docume...
I applied via Recruitment Consultant and was interviewed before Dec 2020. There was 1 interview round.
The future of business is digital transformation, sustainability, and customer-centricity.
Digital transformation will continue to shape the way businesses operate and interact with customers.
Sustainability will become a key focus for businesses as consumers demand more environmentally-friendly products and practices.
Customer-centricity will remain a top priority as businesses strive to provide personalized experiences ...
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
Tell me about yourself
I applied via Walk-in and was interviewed in Aug 2023. There were 2 interview rounds.
Where you to explain some business case study related product management
based on 1 interview
Interview experience
Senior Software Engineer
323
salaries
| ₹4 L/yr - ₹14 L/yr |
Software Engineer
223
salaries
| ₹2 L/yr - ₹9 L/yr |
Software Developer
109
salaries
| ₹2 L/yr - ₹9 L/yr |
Senior Software Developer
57
salaries
| ₹4.9 L/yr - ₹9.6 L/yr |
Network Engineer
48
salaries
| ₹1.5 L/yr - ₹4.4 L/yr |
Softenger
Foray Software
Black Knight
Alchemy Techsol India