i
NewVision Software & Consultancy
Filter interviews by
I applied via Naukri.com and was interviewed before Dec 2020. There were 3 interview rounds.
Both .NET Core and .NET are frameworks for building Windows applications, but .NET Core is cross-platform and open-source.
.NET Core is a lightweight and modular framework that can run on Windows, Linux, and macOS.
.NET is a full-featured framework that is only available on Windows.
.NET Core is open-source and has a faster release cycle than .NET.
.NET Core is designed for building modern, cloud-based applications.
Both fr...
Advantages: Cross-platform, open-source, high performance. Disadvantages: Limited third-party library support, steep learning curve.
Advantages: Runs on Windows, Linux, and macOS. Supports multiple programming languages. Faster than .NET Framework. Open-source and community-driven.
Disadvantages: Limited third-party library support compared to .NET Framework. Steep learning curve for developers new to .NET Core. Not all ...
Top trending discussions
I applied via Naukri.com and was interviewed in Aug 2024. There were 3 interview rounds.
Spring injects dependencies through inversion of control and dependency injection.
Spring uses inversion of control to manage objects and their dependencies.
Dependencies are injected into a class through constructor injection, setter injection, or field injection.
Spring container is responsible for creating and managing objects and their dependencies.
Example: @Autowired annotation is used for dependency injection in Spr
Hibernate connects to the database using JDBC (Java Database Connectivity) API.
Hibernate uses JDBC API to establish a connection to the database.
It uses JDBC drivers to communicate with the database.
Hibernate configuration file contains database connection details.
SessionFactory in Hibernate is responsible for creating sessions and managing connections.
Securing APIs involves using authentication, authorization, encryption, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys
Use authorization to control access to APIs based on roles and permissions
Encrypt data transmission using HTTPS/TLS to prevent eavesdropping
Implement rate limiting and throttling to prevent abuse and DDoS attacks
Regularly monitor API traffic and logs for suspicious ac
Multiple DBs can be configured in an application by using database connection pooling, configuring multiple data sources, and managing transactions across databases.
Use database connection pooling to efficiently manage connections to multiple databases
Configure multiple data sources in the application to connect to different databases
Implement transaction management to ensure data consistency across multiple databases
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
I applied via Referral and was interviewed before Aug 2023. There were 4 interview rounds.
I applied via Campus Placement
General discussion on profile and work experience
I applied via Naukri.com and was interviewed before Nov 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2024. There were 3 interview rounds.
Spring injects dependencies through inversion of control and dependency injection.
Spring uses inversion of control to manage objects and their dependencies.
Dependencies are injected into a class through constructor injection, setter injection, or field injection.
Spring container is responsible for creating and managing objects and their dependencies.
Example: @Autowired annotation is used for dependency injection in Spr
Hibernate connects to the database using JDBC (Java Database Connectivity) API.
Hibernate uses JDBC API to establish a connection to the database.
It uses JDBC drivers to communicate with the database.
Hibernate configuration file contains database connection details.
SessionFactory in Hibernate is responsible for creating sessions and managing connections.
Securing APIs involves using authentication, authorization, encryption, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys
Use authorization to control access to APIs based on roles and permissions
Encrypt data transmission using HTTPS/TLS to prevent eavesdropping
Implement rate limiting and throttling to prevent abuse and DDoS attacks
Regularly monitor API traffic and logs for suspicious ac
Multiple DBs can be configured in an application by using database connection pooling, configuring multiple data sources, and managing transactions across databases.
Use database connection pooling to efficiently manage connections to multiple databases
Configure multiple data sources in the application to connect to different databases
Implement transaction management to ensure data consistency across multiple databases
based on 4 reviews
Rating in categories
Software Engineer
127
salaries
| ₹2.5 L/yr - ₹12.2 L/yr |
Senior Software Engineer
61
salaries
| ₹11.2 L/yr - ₹36 L/yr |
QA Engineer
47
salaries
| ₹2.7 L/yr - ₹9.9 L/yr |
Technical Lead
20
salaries
| ₹14.2 L/yr - ₹40 L/yr |
Software Developer
19
salaries
| ₹3.9 L/yr - ₹9.8 L/yr |
Infosys
TCS
Wipro
HCLTech