i
Netcore Cloud Private Limited
Filter interviews by
I applied via Approached by Company and was interviewed before Apr 2022. There were 4 interview rounds.
Presentation on the products, company and few success stories and brands company has helped
I applied via Indeed and was interviewed in Dec 2020. There was 1 interview round.
Yes, I have worked before as a Sales Executive.
I have worked as a Sales Executive for 5 years at XYZ Company.
During my time at XYZ Company, I consistently exceeded sales targets by 20%.
I successfully managed a portfolio of key accounts and developed strong relationships with clients.
I have experience in cold calling, lead generation, and closing deals.
I am familiar with CRM software and have a proven track record of ef...
posted on 5 Sep 2023
I applied via Naukri.com and was interviewed before Sep 2022. There were 2 interview rounds.
posted on 19 Jul 2024
I applied via Naukri.com and was interviewed in Jun 2024. There were 2 interview rounds.
React is a JavaScript library for building user interfaces.
React allows developers to create reusable UI components.
It uses a virtual DOM for efficient rendering.
React uses JSX, a syntax extension that allows mixing HTML with JavaScript.
State and props are used to manage data and pass information between components.
App was given to create
posted on 20 Jan 2025
I applied via Naukri.com and was interviewed in Jul 2024. There were 2 interview rounds.
Paranoid is a programming flag used to enable additional security checks.
Paranoid is a flag used in programming languages like Ruby to enable additional security checks.
It is used when extra caution is needed to prevent security vulnerabilities.
For example, in Ruby on Rails, setting the paranoid flag to true adds additional security checks to prevent SQL injection attacks.
Message queues like AWS SQS are used for asynchronous communication between microservices. NoSQL is chosen for flexible schema and scalability, while SQL is chosen for structured data and complex queries.
Use message queues like AWS SQS for decoupling microservices and handling high volumes of messages asynchronously
Choose NoSQL for flexible schema, horizontal scalability, and handling unstructured or semi-structured da...
Learned to collaborate effectively with cross-functional teams and prioritize tasks based on project deadlines.
Improved communication skills by regularly updating team members on project progress
Enhanced problem-solving abilities by quickly identifying and resolving technical issues
Developed time management skills by efficiently juggling multiple tasks simultaneously
posted on 13 Feb 2025
I appeared for an interview in Aug 2024.
They ask me about the fundamentals of JavaScript, CSS, and HTML.
Asked request me to create an animated website.
posted on 24 May 2021
Entity Framework is an Object-Relational Mapping (ORM) framework that enables developers to work with relational databases using .NET objects.
EF is a tool for creating data access layer in .NET applications
It allows developers to work with databases using C# or VB.NET code instead of SQL
EF supports LINQ queries and provides automatic change tracking
EF can generate database schema from code-first approach
EF can also gen...
Dependency injection is a design pattern used to remove hard-coded dependencies and make code more modular and testable.
Dependencies are injected into a class rather than being hard-coded
This allows for easier testing and swapping of dependencies
Commonly used in frameworks like Spring and Angular
Generics and collections are fundamental concepts in Java programming.
Generics allow for type safety and reusability of code.
Collections are data structures that store and manipulate groups of objects.
Examples of collections include ArrayList, LinkedList, and HashMap.
Generics can be used with collections to ensure type safety.
Collections provide methods for adding, removing, and accessing elements.
SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.
SQL injection attacks exploit vulnerabilities in web applications that do not properly validate user input.
Attackers can use SQL injection to steal sensitive data, modify or delete data, or even take control of the entire database.
Preventing SQL injection involves using parameterized querie...
Security in REST API can be handled by implementing authentication, authorization, encryption, and input validation.
Implement authentication using tokens or OAuth2
Implement authorization by defining roles and permissions
Encrypt sensitive data using SSL/TLS
Validate input data to prevent injection attacks
Implement rate limiting to prevent DDoS attacks
SOAP is a protocol for exchanging structured information in the implementation of web services. REST is an architectural style for building web services.
SOAP stands for Simple Object Access Protocol
SOAP uses XML for message exchange
SOAP requires more bandwidth and processing power than REST
REST uses HTTP for communication
REST is more flexible and scalable than SOAP
RESTful APIs are easier to implement and maintain than
Table data can be retrieved in store procedures using SELECT statement.
Use SELECT statement to retrieve data from table in store procedures.
Specify the table name and columns to retrieve data from.
Use WHERE clause to filter data based on conditions.
Use ORDER BY clause to sort data based on column values.
An index in a table is a data structure that improves the speed of data retrieval operations.
Indexes are created on one or more columns of a table.
They allow for faster searching and sorting of data.
Indexes can be unique or non-unique.
Examples of indexes include primary keys, foreign keys, and clustered indexes.
Adding index on all columns in a table can slow down write operations and increase storage space.
Adding index on all columns can increase the storage space required for the table.
It can also slow down write operations as the index needs to be updated for every write operation.
It may improve read performance for queries that use all columns in the table.
It is generally not recommended to add index on all columns in a ta
A trigger is a piece of code that automatically executes in response to a specific event or change in a system.
Triggers are commonly used in databases to automatically perform actions when certain data is inserted, updated, or deleted.
Triggers can be used to enforce business rules, validate data, or perform complex calculations.
Examples of triggers include sending an email notification when a new record is added to a d...
Stored procedures are precompiled and can return multiple result sets, while functions are not precompiled and can only return a single value.
Stored procedures are used to perform a set of operations and can return multiple result sets.
Functions are used to perform a single operation and can only return a single value.
Stored procedures are precompiled and stored in the database, while functions are compiled at runtime.
...
Action filter is a feature in ASP.NET MVC that allows you to execute code before or after an action method is executed.
Action filters are attributes that can be applied to controller actions or globally to all actions in the application.
They can be used for authentication, caching, logging, exception handling, and more.
Examples of action filters include AuthorizeAttribute, OutputCacheAttribute, HandleErrorAttribute, an
Sequence of filters in software development
Define the problem and requirements
Choose appropriate filters based on the problem
Implement and test the filters in sequence
Refine and optimize the filters as needed
posted on 6 Jan 2022
I applied via LinkedIn and was interviewed in Dec 2021. There were 5 interview rounds.
posted on 3 May 2022
I applied via Company Website and was interviewed before May 2021. There were 3 interview rounds.
I have X years of experience in ____.
Worked with ____ for X years on various projects
Proficient in ____ with experience in developing complex applications
Have completed multiple courses and certifications in ____
Contributed to open-source projects in ____
posted on 31 Jan 2022
Instant clone is a feature in VMware Horizon that allows for rapid creation of virtual desktops.
Instant clones are created from a parent VM in a matter of seconds.
They share the same virtual disks as the parent VM, but have their own memory and virtual NICs.
Instant clones use a technology called VMFork to create a copy-on-write clone of the parent VM.
They are ideal for use cases where a large number of identical virtua...
Primary and secondary connections with port numbers are used for communication between client and agent machines.
Primary connection is established using a well-known port number, such as port 80 for HTTP.
Secondary connection is established using a random port number, which is assigned by the client machine.
Primary connection is used for initial communication and negotiation, while secondary connection is used for data ...
Yes, I have experience in deploying Horizon infrastructure.
I have deployed Horizon View infrastructure for virtual desktops.
I have configured and managed Horizon Connection Servers.
I have worked with Horizon Composer for image management.
I have experience in troubleshooting Horizon infrastructure issues.
I have implemented Horizon Workspace for application and data access.
Writable volumes are used to store user or application data separately from the OS and applications.
There are two types of writable volumes: User writable volumes and AppStack writable volumes.
User writable volumes are used to store user-specific data and settings.
AppStack writable volumes are used to store application-specific data and settings.
Writable volumes can be created using VMware App Volumes or Citrix App Lay...
Instant clone creates a copy of the VM while linked clone shares virtual disks with the parent VM.
Instant clone is faster to create than linked clone.
Instant clone uses a copy-on-write mechanism to create a new VM.
Linked clone shares virtual disks with the parent VM and only creates delta disks for changes.
Instant clone is useful for creating many identical VMs quickly.
Linked clone is useful for creating VMs with sligh
based on 1 interview
Interview experience
Senior Software Engineer
71
salaries
| ₹5.9 L/yr - ₹19.9 L/yr |
Software Engineer
69
salaries
| ₹3.3 L/yr - ₹11 L/yr |
Assistant Manager
60
salaries
| ₹6.7 L/yr - ₹23 L/yr |
Customer Success Manager
43
salaries
| ₹6 L/yr - ₹25 L/yr |
Manager Enterprise Sales
21
salaries
| ₹12 L/yr - ₹17.9 L/yr |
Softenger
Capital Numbers Infotech
JK Tech
DesignTech Systems