i
NeoSOFT
Filter interviews by
Dependency Injection (DI) is a design pattern that allows for better code modularity and testing by injecting dependencies into classes.
Promotes loose coupling between classes, making them easier to manage.
Facilitates unit testing by allowing mock dependencies to be injected.
Commonly used in frameworks like ASP.NET Core for managing service lifetimes.
Example: Instead of creating a new instance of a service inside ...
Entity Framework is an ORM framework for .NET developers to work with databases using objects instead of SQL queries.
Entity Framework allows developers to work with databases using object-oriented programming.
It provides a set of APIs to perform CRUD operations on database entities.
EF generates SQL queries based on LINQ queries written in C#.
It supports code-first, database-first, and model-first approaches for da...
MVC routing directs incoming requests to the appropriate controller actions based on URL patterns.
1. Conventional Routing: Uses predefined URL patterns. Example: `routes.MapRoute(name: 'Default', url: '{controller}/{action}/{id}');`
2. Attribute Routing: Uses attributes to define routes directly on controller actions. Example: `[Route('products/{id}')] public ActionResult Details(int id) { ... }`
3. Custom Routing: ...
JWT Authentication is a secure method for transmitting information between parties as a JSON object, ensuring integrity and authenticity.
JWT stands for JSON Web Token, which is a compact, URL-safe means of representing claims to be transferred between two parties.
It consists of three parts: Header, Payload, and Signature. For example, the Header typically specifies the algorithm used for signing.
The Payload contai...
Unique, Primary Key, Clustered, and Non-Clustered Indices are all used in database management to enforce data integrity and improve query performance.
Unique constraint ensures that all values in a column are unique, but allows NULL values.
Primary Key constraint ensures that all values in a column are unique and not NULL. Each table can have only one Primary Key.
Clustered Index physically reorders the way records i...
App.Use() is used for adding middleware to the request pipeline, while App.Run() is used for handling the request directly.
App.Use() is used to add middleware components to the request pipeline.
App.Run() is used to handle the request directly without passing it to the next middleware component.
App.Use() is typically used for setting up middleware like authentication, logging, etc.
App.Run() is used for handling the...
Pipelines and Middlewares in .NET are used for request processing and can be configured using middleware components.
Pipelines in .NET are used to define a series of middleware components that process an HTTP request.
Middlewares are components that can handle requests and responses in the pipeline.
To configure pipelines and middlewares in .NET, you can use the 'UseMiddleware' method in the 'Configure' method of the...
Abstract class is used when there is a need for default implementation, while interfaces are used for multiple inheritance.
Abstract classes can have both abstract and non-abstract methods, while interfaces can only have abstract methods.
Abstract classes can provide default implementations for methods, while interfaces cannot.
Interfaces allow a class to implement multiple interfaces, but can only inherit from one a...
Both $.post and $.ajax are methods in jQuery used for making AJAX requests, but $.ajax is more versatile and customizable.
Both $.post and $.ajax are used for making AJAX requests in jQuery.
$.post is a shorthand method for $.ajax with predefined settings for POST requests.
$.ajax is more versatile and customizable, allowing for different types of requests and more options.
Example: $.post('example.php', {data: 'examp...
JWT authentication and OAuth example for API
Implement JWT authentication by generating a token upon user login and including it in the Authorization header of API requests
Use OAuth for user authorization by obtaining access tokens from a third-party provider like Google or Facebook
Ensure API endpoints validate JWT tokens and OAuth access tokens before allowing access to resources
I applied via LinkedIn and was interviewed in Nov 2024. There was 1 interview round.
JWT Authentication is a secure method for transmitting information between parties as a JSON object, ensuring integrity and authenticity.
JWT stands for JSON Web Token, which is a compact, URL-safe means of representing claims to be transferred between two parties.
It consists of three parts: Header, Payload, and Signature. For example, the Header typically specifies the algorithm used for signing.
The Payload contains th...
MVC routing directs incoming requests to the appropriate controller actions based on URL patterns.
1. Conventional Routing: Uses predefined URL patterns. Example: `routes.MapRoute(name: 'Default', url: '{controller}/{action}/{id}');`
2. Attribute Routing: Uses attributes to define routes directly on controller actions. Example: `[Route('products/{id}')] public ActionResult Details(int id) { ... }`
3. Custom Routing: Allow...
Entity Framework is an ORM framework for .NET developers to work with databases using objects instead of SQL queries.
Entity Framework allows developers to work with databases using object-oriented programming.
It provides a set of APIs to perform CRUD operations on database entities.
EF generates SQL queries based on LINQ queries written in C#.
It supports code-first, database-first, and model-first approaches for databas...
I applied via Approached by Company and was interviewed in Oct 2023. There were 2 interview rounds.
Abstract class is used when there is a need for default implementation, while interfaces are used for multiple inheritance.
Abstract classes can have both abstract and non-abstract methods, while interfaces can only have abstract methods.
Abstract classes can provide default implementations for methods, while interfaces cannot.
Interfaces allow a class to implement multiple interfaces, but can only inherit from one abstra...
NET core is a cross-platform, open-source framework for building modern, cloud-based, internet-connected applications. NET framework is a Windows-only framework for building Windows desktop applications. NET is a general term encompassing both .NET core and .NET framework.
NET core is cross-platform and open-source, while .NET framework is Windows-only.
.NET core is modular and lightweight, allowing for faster performanc...
Pipelines and Middlewares in .NET are used for request processing and can be configured using middleware components.
Pipelines in .NET are used to define a series of middleware components that process an HTTP request.
Middlewares are components that can handle requests and responses in the pipeline.
To configure pipelines and middlewares in .NET, you can use the 'UseMiddleware' method in the 'Configure' method of the Star...
App.Use() is used for adding middleware to the request pipeline, while App.Run() is used for handling the request directly.
App.Use() is used to add middleware components to the request pipeline.
App.Run() is used to handle the request directly without passing it to the next middleware component.
App.Use() is typically used for setting up middleware like authentication, logging, etc.
App.Run() is used for handling the fina...
String is immutable, while StringBuilder is mutable. StringBuilder is faster and more memory efficient for string manipulation.
String is immutable, meaning once created, it cannot be changed. StringBuilder is mutable, allowing for efficient string manipulation.
StringBuilder is faster than String for concatenating multiple strings, as it does not create a new string object each time.
String uses more memory as it creates...
Unique, Primary Key, Clustered, and Non-Clustered Indices are all used in database management to enforce data integrity and improve query performance.
Unique constraint ensures that all values in a column are unique, but allows NULL values.
Primary Key constraint ensures that all values in a column are unique and not NULL. Each table can have only one Primary Key.
Clustered Index physically reorders the way records in the...
JWT authentication and OAuth example for API
Implement JWT authentication by generating a token upon user login and including it in the Authorization header of API requests
Use OAuth for user authorization by obtaining access tokens from a third-party provider like Google or Facebook
Ensure API endpoints validate JWT tokens and OAuth access tokens before allowing access to resources
Both $.post and $.ajax are methods in jQuery used for making AJAX requests, but $.ajax is more versatile and customizable.
Both $.post and $.ajax are used for making AJAX requests in jQuery.
$.post is a shorthand method for $.ajax with predefined settings for POST requests.
$.ajax is more versatile and customizable, allowing for different types of requests and more options.
Example: $.post('example.php', {data: 'example'},...
I appeared for an interview in Aug 2024.
Dependency Injection (DI) is a design pattern that allows for better code modularity and testing by injecting dependencies into classes.
Promotes loose coupling between classes, making them easier to manage.
Facilitates unit testing by allowing mock dependencies to be injected.
Commonly used in frameworks like ASP.NET Core for managing service lifetimes.
Example: Instead of creating a new instance of a service inside a cla...
Code for prime numbers
Dispose is used to release unmanaged resources, while finalize is used for cleanup before an object is destroyed.
Dispose is called explicitly by the developer, while finalize is called by the garbage collector.
Dispose should be implemented in classes that directly use unmanaged resources like file handles or database connections.
Finalize is used for cleanup tasks like closing files or releasing memory.
Implement IDispos...
Top trending discussions
posted on 11 Mar 2022
I appeared for an interview before Mar 2021.
Round duration - 60 minutes
Round difficulty - Medium
21 students were shortlisted from the 1st MCQ round and in this round we were asked to write the codes (function only) of 3 questions in 1 hour time.
You are given a grid containing oranges where each cell of the grid can contain one of the three integer values:
Find the minimum time required to rot all fresh oranges in a grid.
Use Breadth First Search (BFS) to simulate the rotting process
Track the time taken to rot all oranges and return -1 if any fresh oranges remain
Handle edge cases like no fresh oranges or all oranges already rotten
Consider using a queue to efficiently process adjacent oranges
Given an array/list 'ARR' consisting of 'N' integers, your task is to find the majority element in the array. If there is no majority element present, return -1.
Find the majority element in an array, return -1 if no majority element exists.
Iterate through the array and keep track of the count of each element using a hashmap.
Check if any element's count is greater than floor(N/2) to determine the majority element.
Return the majority element or -1 if no majority element exists.
You are provided with a non-empty binary tree in which each node contains a non-negative integer value. Your task is to find and return the maximum ...
Find the maximum path sum between two leaf nodes in a binary tree.
Traverse the tree to find the maximum path sum between two leaf nodes.
Keep track of the maximum sum found so far.
Consider all possible paths between leaf nodes.
Handle cases where the tree has only a single leaf node.
Implement a recursive function to calculate the maximum path sum.
Round duration - 60 minutes
Round difficulty - Medium
This was a technical round with DSA based questions.
You are given a Singly Linked List of integers. The task is to find the N-th node from the end of the list.
If the given list is (1 -> -2 -&g...
Find the N-th node from the end of a Singly Linked List of integers.
Traverse the list to find the length L of the list.
Calculate the position of the N-th node from the beginning as L - N + 1.
Traverse the list again to reach the calculated position and return the node's value.
You are given a binary tree consisting of distinct integers and two nodes, X
and Y
. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes...
Find the Lowest Common Ancestor (LCA) of two nodes in a binary tree.
Traverse the binary tree to find the paths from the root to nodes X and Y.
Compare the paths to find the last common node, which is the LCA.
Handle cases where one node is an ancestor of the other or when one node is the LCA itself.
You are given a string of length N
. Your task is to reverse the string word by word. The input may contain multiple spaces between words and may have leading o...
Reverse words in a string while handling leading/trailing spaces and multiple spaces between words.
Split the input string by spaces to get individual words
Reverse the list of words
Join the reversed words with a single space in between
Handle leading/trailing spaces by stripping them before and after reversing
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions based on DSA
Given 'N' subjects, each containing a certain number of problems, and 'K' friends, assign subjects to friends such that each subject goes to exactly one friend, maintain...
Assign subjects to friends to minimize maximum workload, find minimum time for most loaded friend.
Sort subjects in descending order
Assign subjects to friends one by one until all subjects are assigned
The maximum workload will be the sum of problems assigned to the friend with the most problems
Return the maximum workload as the minimum time required
Grammar in compiler design defines the syntax and structure of a programming language.
Grammar specifies the rules for forming valid statements in a programming language.
It consists of a set of production rules that define how valid programs can be constructed.
There are different types of grammars such as context-free grammar, regular grammar, etc.
Example: In C programming language, the grammar specifies that a for loop...
A token in compiler design is a basic unit of syntax that the compiler can understand and process.
Tokens are the smallest units of a program that are meaningful to the compiler.
Examples of tokens include keywords, identifiers, operators, and punctuation symbols.
Tokens are generated by the lexical analysis phase of the compiler.
Tokens are used by the parser to build the abstract syntax tree of the program.
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DSA and Compiler Design mainly. He told me that you’ll be having your final HR round in some time. I knew that I was going well because he seemed to be quite satisfied with my answers.
You are given an arbitrary binary tree consisting of N nodes, each associated with an integer value from 1 to 9. Each root-to-leaf path can be considered a number formed by concat...
Find the total sum of all root to leaf paths in a binary tree formed by concatenating node values.
Traverse the binary tree from root to leaf nodes, keeping track of the current path sum
Add the current path sum to the total sum when reaching a leaf node
Use modulo (10^9 + 7) to handle large outputs
A regular language is a language that can be recognized by a finite automaton.
Regular languages can be described by regular expressions.
Regular languages are closed under union, concatenation, and Kleene star operations.
Examples of regular languages include the set of all strings over an alphabet that contain an even number of 'a's.
NP problems are decision problems that can be verified in polynomial time, while NP-Hard problems are at least as hard as the hardest problems in NP.
NP problems can be verified in polynomial time but not necessarily solved in polynomial time.
NP-Hard problems are at least as hard as the hardest problems in NP, but may not be in NP themselves.
Examples of NP problems include the subset sum problem and the traveling salesm...
Round duration - 30 minutes
Round difficulty - Easy
That was the round for which I’ve been waiting for hours
She was very friendly and nice to talk to. It didn’t seem that I was talking to the HR. It was more like talking to a friend. Finally we discussed about the pay-scale and work culture in Accolite.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
posted on 24 Jan 2022
I applied via Campus Placement and was interviewed before Jan 2021. There were 3 interview rounds.
Code to split an array of integers into two subarrays with equal sum.
Iterate through the array and calculate the total sum.
Divide the sum by 2 to get the target sum for each subarray.
Use dynamic programming to find a subset of the array that adds up to the target sum.
Return the two subarrays.
Example: [1, 2, 3, 4, 5, 6] -> [1, 2, 3, 6], [4, 5]
Example: [1, 2, 3, 4, 5] -> [1, 4, 5], [2, 3]
Implementing a binary search tree and its traversal methods.
Start by defining a Node class with left and right child pointers.
Implement insert() method to add nodes to the tree.
Implement inorder(), preorder(), and postorder() traversal methods.
Implement search() method to find a node in the tree.
Implement delete() method to remove a node from the tree.
Consider edge cases like empty tree, duplicate nodes, etc.
posted on 27 Apr 2022
I applied via Campus Placement and was interviewed before Apr 2021. There were 2 interview rounds.
Some of the top questions asked at the NeoSOFT DOT NET Developer interview -
based on 7 interview experiences
Difficulty level
Duration
based on 14 reviews
Rating in categories
Software Engineer
2.1k
salaries
| ₹5.2 L/yr - ₹12 L/yr |
Senior Software Engineer
747
salaries
| ₹9.8 L/yr - ₹17 L/yr |
Software Developer
718
salaries
| ₹3.5 L/yr - ₹13.2 L/yr |
Softwaretest Engineer
504
salaries
| ₹3 L/yr - ₹10.4 L/yr |
Front end Developer
188
salaries
| ₹4.2 L/yr - ₹9.2 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant